必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Atlanta

省份(region): Georgia

国家(country): United States

运营商(isp): AT&T

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.209.14.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13641
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.209.14.243.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 11:22:37 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
243.14.209.68.in-addr.arpa domain name pointer adsl-068-209-014-243.sip.asm.bellsouth.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
243.14.209.68.in-addr.arpa	name = adsl-068-209-014-243.sip.asm.bellsouth.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.160.216.190 attackspam
[portscan] Port scan
2019-09-07 20:37:22
182.127.72.69 attack
Lines containing failures of 182.127.72.69
Sep  7 11:27:03 shared09 sshd[757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.127.72.69  user=r.r
Sep  7 11:27:05 shared09 sshd[757]: Failed password for r.r from 182.127.72.69 port 59315 ssh2
Sep  7 11:27:07 shared09 sshd[757]: Failed password for r.r from 182.127.72.69 port 59315 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=182.127.72.69
2019-09-07 20:12:01
49.88.112.77 attackspambots
2019-09-07T11:48:54.928515abusebot-3.cloudsearch.cf sshd\[903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.77  user=root
2019-09-07 20:06:43
27.98.205.188 attackspambots
Unauthorized connection attempt from IP address 27.98.205.188 on Port 3306(MYSQL)
2019-09-07 20:48:07
148.66.135.173 attackspambots
$f2bV_matches
2019-09-07 19:53:52
138.197.188.101 attackbots
Sep  7 01:39:03 lcdev sshd\[11124\]: Invalid user abc123 from 138.197.188.101
Sep  7 01:39:03 lcdev sshd\[11124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.188.101
Sep  7 01:39:05 lcdev sshd\[11124\]: Failed password for invalid user abc123 from 138.197.188.101 port 56937 ssh2
Sep  7 01:43:27 lcdev sshd\[11504\]: Invalid user 123 from 138.197.188.101
Sep  7 01:43:27 lcdev sshd\[11504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.188.101
2019-09-07 19:56:06
115.213.142.168 attackspam
Port scan on 1 port(s): 23
2019-09-07 19:57:13
218.98.40.140 attack
Sep  7 08:14:13 TORMINT sshd\[27493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.140  user=root
Sep  7 08:14:16 TORMINT sshd\[27493\]: Failed password for root from 218.98.40.140 port 26737 ssh2
Sep  7 08:14:22 TORMINT sshd\[27497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.140  user=root
...
2019-09-07 20:17:19
54.36.150.12 attackbotsspam
Automatic report - Banned IP Access
2019-09-07 20:04:22
49.151.190.114 attackspam
Unauthorized connection attempt from IP address 49.151.190.114 on Port 445(SMB)
2019-09-07 20:06:05
107.155.84.30 attackbotsspam
1 pkts, ports: TCP:8080
2019-09-07 20:43:47
184.105.139.91 attackspambots
firewall-block, port(s): 11211/udp
2019-09-07 20:14:16
62.174.236.98 attackspam
Sep  7 18:56:18 our-server-hostname postfix/smtpd[7614]: connect from unknown[62.174.236.98]
Sep  7 18:56:22 our-server-hostname sqlgrey: grey: new: 62.174.236.98(62.174.236.98), x@x -> x@x
Sep  7 18:56:23 our-server-hostname postfix/policy-spf[15473]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=brehmer%40apex.net.au;ip=62.174.236.98;r=mx1.cbr.spam-filtering-appliance 
Sep x@x
Sep  7 18:56:24 our-server-hostname postfix/smtpd[7614]: lost connection after DATA from unknown[62.174.236.98]
Sep  7 18:56:24 our-server-hostname postfix/smtpd[7614]: disconnect from unknown[62.174.236.98]
Sep  7 18:56:47 our-server-hostname postfix/smtpd[12806]: connect from unknown[62.174.236.98]
Sep  7 18:56:48 our-server-hostname sqlgrey: grey: new: 62.174.236.98(62.174.236.98), x@x -> x@x
Sep  7 18:56:48 our-server-hostname postfix/policy-spf[14618]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=bertd%40goldweb.com.au;ip=62.174.236.98;r=mx1.cb........
-------------------------------
2019-09-07 20:45:32
112.85.42.195 attackbotsspam
Sep  7 15:01:46 pkdns2 sshd\[38591\]: Failed password for root from 112.85.42.195 port 33135 ssh2Sep  7 15:03:14 pkdns2 sshd\[38644\]: Failed password for root from 112.85.42.195 port 42444 ssh2Sep  7 15:05:34 pkdns2 sshd\[38756\]: Failed password for root from 112.85.42.195 port 27926 ssh2Sep  7 15:07:00 pkdns2 sshd\[38799\]: Failed password for root from 112.85.42.195 port 32675 ssh2Sep  7 15:07:02 pkdns2 sshd\[38799\]: Failed password for root from 112.85.42.195 port 32675 ssh2Sep  7 15:07:04 pkdns2 sshd\[38799\]: Failed password for root from 112.85.42.195 port 32675 ssh2
...
2019-09-07 20:31:05
121.234.62.75 attackbots
firewall-block, port(s): 22/tcp
2019-09-07 20:25:10

最近上报的IP列表

135.96.253.136 147.236.37.133 250.140.113.174 117.225.74.143
207.55.112.101 248.243.76.145 45.219.205.210 77.179.2.56
66.209.195.52 138.186.147.239 178.204.18.143 185.64.105.93
43.12.105.124 202.68.254.182 48.101.254.31 154.40.109.143
187.218.111.154 113.83.109.223 233.172.5.13 103.52.132.6