必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): AT&T

主机名(hostname): unknown

机构(organization): AT&T Services, Inc.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.22.136.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6860
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.22.136.91.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051800 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat May 18 21:19:49 CST 2019
;; MSG SIZE  rcvd: 116

HOST信息:
91.136.22.68.in-addr.arpa domain name pointer adsl-68-22-136-91.dsl.akrnoh.ameritech.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
91.136.22.68.in-addr.arpa	name = adsl-68-22-136-91.dsl.akrnoh.ameritech.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.138.100.138 attackbotsspam
Chat Spam
2020-09-21 02:35:20
69.55.49.187 attackbotsspam
Invalid user tf2mgeserver from 69.55.49.187 port 41784
2020-09-21 02:09:41
192.42.116.22 attack
Sep 20 08:22:48 vpn01 sshd[10728]: Failed password for root from 192.42.116.22 port 44304 ssh2
Sep 20 08:22:50 vpn01 sshd[10728]: Failed password for root from 192.42.116.22 port 44304 ssh2
...
2020-09-21 02:45:56
180.167.240.210 attackbotsspam
Invalid user test from 180.167.240.210 port 38487
2020-09-21 02:38:48
102.165.30.37 attackbotsspam
TCP port : 5289
2020-09-21 02:24:01
74.82.47.57 attack
Found on   Github Combined on 3 lists    / proto=6  .  srcport=60723  .  dstport=631  .     (1709)
2020-09-21 02:33:38
91.121.81.12 attackbots
Sep 20 23:53:00 mx sshd[824580]: Invalid user guest from 91.121.81.12 port 45610
Sep 20 23:53:00 mx sshd[824580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.81.12 
Sep 20 23:53:00 mx sshd[824580]: Invalid user guest from 91.121.81.12 port 45610
Sep 20 23:53:02 mx sshd[824580]: Failed password for invalid user guest from 91.121.81.12 port 45610 ssh2
Sep 20 23:53:19 mx sshd[824582]: Invalid user guest from 91.121.81.12 port 33044
...
2020-09-21 02:38:11
217.208.28.66 attackspambots
Port Scan detected!
...
2020-09-21 02:08:54
124.156.55.21 attackbots
 TCP (SYN) 124.156.55.21:53865 -> port 8085, len 44
2020-09-21 02:29:44
117.254.63.154 attackbotsspam
1600534725 - 09/19/2020 18:58:45 Host: 117.254.63.154/117.254.63.154 Port: 445 TCP Blocked
...
2020-09-21 02:46:42
112.85.42.176 attack
Sep 20 20:26:09 abendstille sshd\[4526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Sep 20 20:26:10 abendstille sshd\[4544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Sep 20 20:26:11 abendstille sshd\[4526\]: Failed password for root from 112.85.42.176 port 26291 ssh2
Sep 20 20:26:13 abendstille sshd\[4544\]: Failed password for root from 112.85.42.176 port 10992 ssh2
Sep 20 20:26:14 abendstille sshd\[4526\]: Failed password for root from 112.85.42.176 port 26291 ssh2
...
2020-09-21 02:28:10
104.244.77.95 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-21 02:13:28
184.105.247.216 attackbots
 UDP 184.105.247.216:64113 -> port 389, len 80
2020-09-21 02:39:45
112.199.118.195 attack
Sep 20 14:07:33 abendstille sshd\[26015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.199.118.195  user=root
Sep 20 14:07:36 abendstille sshd\[26015\]: Failed password for root from 112.199.118.195 port 63320 ssh2
Sep 20 14:12:05 abendstille sshd\[30566\]: Invalid user test from 112.199.118.195
Sep 20 14:12:05 abendstille sshd\[30566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.199.118.195
Sep 20 14:12:07 abendstille sshd\[30566\]: Failed password for invalid user test from 112.199.118.195 port 62893 ssh2
...
2020-09-21 02:34:50
49.232.8.218 attackspam
20 attempts against mh-ssh on pcx
2020-09-21 02:25:42

最近上报的IP列表

13.80.2.37 181.65.37.147 124.184.128.210 95.196.62.232
93.45.65.175 111.93.232.66 188.122.203.41 73.191.142.5
198.125.199.53 84.164.50.102 31.108.138.227 2.216.203.161
44.10.112.87 113.180.0.224 113.161.76.27 55.219.210.126
57.30.250.63 14.241.39.155 210.68.232.56 76.113.188.193