必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.222.92.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.222.92.43.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 04:52:17 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
43.92.222.68.in-addr.arpa domain name pointer adsl-68-222-92-43.jan.bellsouth.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
43.92.222.68.in-addr.arpa	name = adsl-68-222-92-43.jan.bellsouth.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.61.133.172 attack
Oct 15 15:35:57 lnxweb62 sshd[24786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.133.172
2019-10-15 22:14:25
185.220.29.129 attackbots
[ 🧯 ] From cote-agora@saude-ofertas-saude.com.br Tue Oct 15 08:43:59 2019
 Received: from host5.saude-ofertas-saude.com.br ([185.220.29.129]:57849)
2019-10-15 22:16:20
5.135.232.8 attack
Oct 15 02:11:00 friendsofhawaii sshd\[14216\]: Invalid user oracle-db from 5.135.232.8
Oct 15 02:11:00 friendsofhawaii sshd\[14216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.232.8
Oct 15 02:11:02 friendsofhawaii sshd\[14216\]: Failed password for invalid user oracle-db from 5.135.232.8 port 53280 ssh2
Oct 15 02:14:53 friendsofhawaii sshd\[14533\]: Invalid user Passw0rd from 5.135.232.8
Oct 15 02:14:53 friendsofhawaii sshd\[14533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.232.8
2019-10-15 22:10:09
188.225.57.89 attack
2019-10-15T08:39:58.236209ns525875 sshd\[25878\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.225.57.89  user=root
2019-10-15T08:40:00.236903ns525875 sshd\[25878\]: Failed password for root from 188.225.57.89 port 47616 ssh2
2019-10-15T08:44:16.363343ns525875 sshd\[31148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.225.57.89  user=root
2019-10-15T08:44:18.117839ns525875 sshd\[31148\]: Failed password for root from 188.225.57.89 port 59286 ssh2
...
2019-10-15 22:30:20
139.59.92.117 attack
Oct 15 15:46:02 ns37 sshd[25962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.92.117
2019-10-15 22:33:52
188.166.108.161 attack
Oct 15 07:55:22 xtremcommunity sshd\[543928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.108.161  user=root
Oct 15 07:55:25 xtremcommunity sshd\[543928\]: Failed password for root from 188.166.108.161 port 46258 ssh2
Oct 15 07:59:30 xtremcommunity sshd\[544008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.108.161  user=root
Oct 15 07:59:32 xtremcommunity sshd\[544008\]: Failed password for root from 188.166.108.161 port 57588 ssh2
Oct 15 08:03:28 xtremcommunity sshd\[544057\]: Invalid user user from 188.166.108.161 port 40678
Oct 15 08:03:28 xtremcommunity sshd\[544057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.108.161
...
2019-10-15 22:34:24
70.35.140.38 attackspam
Oct 15 13:39:29 mxgate1 postfix/postscreen[18142]: CONNECT from [70.35.140.38]:11704 to [176.31.12.44]:25
Oct 15 13:39:29 mxgate1 postfix/dnsblog[18143]: addr 70.35.140.38 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Oct 15 13:39:29 mxgate1 postfix/dnsblog[18146]: addr 70.35.140.38 listed by domain b.barracudacentral.org as 127.0.0.2
Oct 15 13:39:35 mxgate1 postfix/postscreen[18142]: DNSBL rank 2 for [70.35.140.38]:11704
Oct 15 13:39:35 mxgate1 postfix/tlsproxy[18271]: CONNECT from [70.35.140.38]:11704
Oct x@x
Oct 15 13:39:37 mxgate1 postfix/postscreen[18142]: DISCONNECT [70.35.140.38]:11704
Oct 15 13:39:37 mxgate1 postfix/tlsproxy[18271]: DISCONNECT [70.35.140.38]:11704


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=70.35.140.38
2019-10-15 22:05:48
45.77.116.223 attackbotsspam
Port 1433 Scan
2019-10-15 22:23:41
188.166.211.194 attack
Oct 15 15:47:08 pornomens sshd\[6894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.211.194  user=root
Oct 15 15:47:10 pornomens sshd\[6894\]: Failed password for root from 188.166.211.194 port 35501 ssh2
Oct 15 15:51:49 pornomens sshd\[6917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.211.194  user=root
...
2019-10-15 22:25:00
106.13.110.205 attackbotsspam
RDP Brute-Force (Grieskirchen RZ2)
2019-10-15 22:20:24
36.99.141.211 attackbots
Oct 15 14:42:51 microserver sshd[2125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.99.141.211  user=root
Oct 15 14:42:54 microserver sshd[2125]: Failed password for root from 36.99.141.211 port 57338 ssh2
Oct 15 14:48:08 microserver sshd[2780]: Invalid user tests from 36.99.141.211 port 47892
Oct 15 14:48:08 microserver sshd[2780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.99.141.211
Oct 15 14:48:10 microserver sshd[2780]: Failed password for invalid user tests from 36.99.141.211 port 47892 ssh2
Oct 15 15:21:07 microserver sshd[7153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.99.141.211  user=root
Oct 15 15:21:08 microserver sshd[7153]: Failed password for root from 36.99.141.211 port 47542 ssh2
Oct 15 15:26:35 microserver sshd[7841]: Invalid user 123 from 36.99.141.211 port 38073
Oct 15 15:26:35 microserver sshd[7841]: pam_unix(sshd:auth): authentication failure; l
2019-10-15 22:21:32
82.165.35.17 attack
Oct 15 16:31:39 [host] sshd[25935]: Invalid user ubuntu from 82.165.35.17
Oct 15 16:31:39 [host] sshd[25935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.165.35.17
Oct 15 16:31:41 [host] sshd[25935]: Failed password for invalid user ubuntu from 82.165.35.17 port 51726 ssh2
2019-10-15 22:37:15
23.95.106.97 attack
Automatic report - SSH Brute-Force Attack
2019-10-15 22:29:49
222.180.162.8 attackspam
Oct 15 19:26:30 areeb-Workstation sshd[12087]: Failed password for root from 222.180.162.8 port 48906 ssh2
...
2019-10-15 22:31:59
186.250.232.116 attackspambots
Oct 15 16:18:34 * sshd[16494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.250.232.116
Oct 15 16:18:36 * sshd[16494]: Failed password for invalid user kafka from 186.250.232.116 port 36696 ssh2
2019-10-15 22:18:51

最近上报的IP列表

118.121.72.83 94.84.75.245 137.84.169.167 181.181.21.229
56.101.118.71 43.147.106.149 137.118.111.180 206.178.94.217
9.223.54.92 140.175.97.248 150.119.196.97 162.184.180.32
75.183.90.111 12.98.140.28 249.34.194.96 137.168.19.73
5.209.31.28 98.76.77.37 87.83.197.118 23.46.181.189