必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.194.150.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.194.150.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 05:30:08 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
169.150.194.68.in-addr.arpa domain name pointer ool-44c296a9.dyn.optonline.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.150.194.68.in-addr.arpa	name = ool-44c296a9.dyn.optonline.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.224.151.74 attackspam
Unauthorized connection attempt from IP address 45.224.151.74 on Port 445(SMB)
2019-11-20 23:31:48
76.73.206.90 attackbotsspam
Nov 20 17:46:05 hosting sshd[27150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.73.206.90  user=root
Nov 20 17:46:07 hosting sshd[27150]: Failed password for root from 76.73.206.90 port 40314 ssh2
...
2019-11-20 23:44:01
50.70.229.239 attackbotsspam
Nov 20 20:43:33 vibhu-HP-Z238-Microtower-Workstation sshd\[14615\]: Invalid user aile from 50.70.229.239
Nov 20 20:43:33 vibhu-HP-Z238-Microtower-Workstation sshd\[14615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.70.229.239
Nov 20 20:43:35 vibhu-HP-Z238-Microtower-Workstation sshd\[14615\]: Failed password for invalid user aile from 50.70.229.239 port 50112 ssh2
Nov 20 20:47:29 vibhu-HP-Z238-Microtower-Workstation sshd\[15475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.70.229.239  user=uucp
Nov 20 20:47:30 vibhu-HP-Z238-Microtower-Workstation sshd\[15475\]: Failed password for uucp from 50.70.229.239 port 58452 ssh2
...
2019-11-20 23:27:11
180.191.85.180 attackbots
Unauthorized connection attempt from IP address 180.191.85.180 on Port 445(SMB)
2019-11-20 23:29:29
189.211.188.47 attackbots
Unauthorized connection attempt from IP address 189.211.188.47 on Port 445(SMB)
2019-11-20 23:49:14
223.206.251.32 attackbots
Unauthorized connection attempt from IP address 223.206.251.32 on Port 445(SMB)
2019-11-20 23:40:54
45.173.224.22 attackbotsspam
Unauthorized connection attempt from IP address 45.173.224.22 on Port 445(SMB)
2019-11-21 00:02:53
104.131.15.189 attack
2019-11-20T15:22:24.090746abusebot-6.cloudsearch.cf sshd\[28467\]: Invalid user platao from 104.131.15.189 port 40827
2019-11-20 23:26:54
211.150.70.18 attackspam
211.150.70.18 was recorded 67 times by 29 hosts attempting to connect to the following ports: 1471,10038,1521,3299,30005,113,4369,1947,11300,4040,13579,9500,520,32400,2376,995,9030,626,6664,4070,8089,9200,9300,8002,500,3690,465,10000,27036,5555,7170,1311,161,34569,80,21,636,45668,60001,3283,85,8069,1433,8181,4567,1720,6001,9999,3306,23023,2123,50000,62078,8888,4800,389,1026,6379. Incident counter (4h, 24h, all-time): 67, 361, 2751
2019-11-21 00:03:18
87.216.151.137 attackspam
Telnet Server BruteForce Attack
2019-11-20 23:48:03
186.0.109.126 attackbotsspam
Unauthorized connection attempt from IP address 186.0.109.126 on Port 445(SMB)
2019-11-20 23:28:34
49.88.112.65 attack
Nov 20 05:37:02 hanapaa sshd\[30688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Nov 20 05:37:03 hanapaa sshd\[30688\]: Failed password for root from 49.88.112.65 port 58234 ssh2
Nov 20 05:38:16 hanapaa sshd\[30788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Nov 20 05:38:18 hanapaa sshd\[30788\]: Failed password for root from 49.88.112.65 port 58392 ssh2
Nov 20 05:39:26 hanapaa sshd\[30983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
2019-11-20 23:52:13
93.171.33.32 attackspam
11/20/2019-15:46:15.379458 93.171.33.32 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-20 23:39:10
77.115.226.218 attackbots
2019-11-20 14:40:58 H=apn-77-115-226-218.dynamic.gprs.plus.pl [77.115.226.218]:29699 I=[10.100.18.21]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=77.115.226.218)
2019-11-20 14:40:59 unexpected disconnection while reading SMTP command from apn-77-115-226-218.dynamic.gprs.plus.pl [77.115.226.218]:29699 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-11-20 15:31:35 H=apn-77-115-226-218.dynamic.gprs.plus.pl [77.115.226.218]:52227 I=[10.100.18.21]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=77.115.226.218)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.115.226.218
2019-11-20 23:59:20
81.22.45.219 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 73 - port: 29689 proto: TCP cat: Misc Attack
2019-11-20 23:53:14

最近上报的IP列表

164.235.25.117 251.235.243.98 45.19.3.159 41.49.142.49
248.60.65.129 96.235.66.172 241.243.12.109 199.146.174.41
99.86.163.150 22.215.75.237 201.57.171.19 236.30.230.170
19.2.138.246 79.226.214.91 149.174.223.23 160.74.187.251
60.74.118.190 95.160.0.148 173.126.112.156 86.197.102.138