必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.166.215.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3642
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.166.215.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:08:54 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
140.215.166.68.in-addr.arpa domain name pointer h-68-166-215-140.sttn.wa.globalcapacity.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.215.166.68.in-addr.arpa	name = h-68-166-215-140.sttn.wa.globalcapacity.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
136.34.218.11 attackspambots
Oct 31 05:40:06 meumeu sshd[28399]: Failed password for root from 136.34.218.11 port 17308 ssh2
Oct 31 05:44:12 meumeu sshd[28890]: Failed password for root from 136.34.218.11 port 18110 ssh2
...
2019-10-31 14:34:38
198.57.203.54 attackspam
Oct 31 13:07:46 webhost01 sshd[28894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.57.203.54
Oct 31 13:07:48 webhost01 sshd[28894]: Failed password for invalid user kiel from 198.57.203.54 port 40514 ssh2
...
2019-10-31 14:11:07
190.248.67.123 attackspam
2019-10-31T06:34:52.127130abusebot-7.cloudsearch.cf sshd\[19228\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.248.67.123  user=root
2019-10-31 14:38:54
49.232.40.236 attackbots
Oct 31 02:03:24 plusreed sshd[9716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.40.236  user=root
Oct 31 02:03:26 plusreed sshd[9716]: Failed password for root from 49.232.40.236 port 54208 ssh2
...
2019-10-31 14:19:37
89.248.168.170 attack
10/30/2019-23:53:50.708812 89.248.168.170 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-31 14:10:37
180.167.96.22 attackbotsspam
Oct 31 03:30:44 pi01 sshd[13840]: Connection from 180.167.96.22 port 35614 on 192.168.1.10 port 22
Oct 31 03:30:46 pi01 sshd[13840]: User r.r from 180.167.96.22 not allowed because not listed in AllowUsers
Oct 31 03:30:46 pi01 sshd[13840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.96.22  user=r.r
Oct 31 03:30:47 pi01 sshd[13840]: Failed password for invalid user r.r from 180.167.96.22 port 35614 ssh2
Oct 31 03:30:47 pi01 sshd[13840]: Received disconnect from 180.167.96.22 port 35614:11: Bye Bye [preauth]
Oct 31 03:30:47 pi01 sshd[13840]: Disconnected from 180.167.96.22 port 35614 [preauth]
Oct 31 03:46:56 pi01 sshd[14655]: Connection from 180.167.96.22 port 34124 on 192.168.1.10 port 22
Oct 31 03:46:57 pi01 sshd[14655]: User r.r from 180.167.96.22 not allowed because not listed in AllowUsers
Oct 31 03:46:57 pi01 sshd[14655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.1........
-------------------------------
2019-10-31 14:35:56
210.5.90.66 attackspam
SSH bruteforce
2019-10-31 14:37:58
45.120.51.111 attackbots
Unauthorized access detected from banned ip
2019-10-31 14:22:28
66.249.69.70 attack
Automatic report - Banned IP Access
2019-10-31 14:26:52
218.29.42.220 attackspam
2019-10-31T06:06:36.223436abusebot-5.cloudsearch.cf sshd\[28480\]: Invalid user sabnzbd from 218.29.42.220 port 35847
2019-10-31 14:32:28
196.196.147.150 attackspambots
Unauthorized access detected from banned ip
2019-10-31 14:14:49
37.59.114.113 attackspambots
2019-10-31T06:00:09.205376abusebot-5.cloudsearch.cf sshd\[28409\]: Invalid user sabnzbd from 37.59.114.113 port 56880
2019-10-31 14:17:33
116.71.130.253 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-10-31 14:29:48
189.101.129.222 attack
Oct 31 08:08:10 server sshd\[9438\]: User root from 189.101.129.222 not allowed because listed in DenyUsers
Oct 31 08:08:10 server sshd\[9438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.101.129.222  user=root
Oct 31 08:08:11 server sshd\[9438\]: Failed password for invalid user root from 189.101.129.222 port 37417 ssh2
Oct 31 08:13:18 server sshd\[29250\]: User root from 189.101.129.222 not allowed because listed in DenyUsers
Oct 31 08:13:18 server sshd\[29250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.101.129.222  user=root
2019-10-31 14:20:26
146.88.240.38 attack
port scan and connect, tcp 443 (https)
2019-10-31 14:32:44

最近上报的IP列表

204.247.139.149 69.124.211.137 62.175.195.185 214.109.108.117
85.41.78.28 135.20.119.59 83.50.190.147 244.133.216.134
63.153.175.210 251.217.188.14 235.83.122.89 108.185.177.10
116.220.110.53 129.192.251.3 242.89.99.162 237.240.224.74
157.246.236.51 174.60.247.249 62.107.115.90 97.150.69.211