必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Atlanta

省份(region): Georgia

国家(country): United States

运营商(isp): Sprint

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.242.143.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.242.143.11.			IN	A

;; AUTHORITY SECTION:
.			504	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040600 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 06 23:12:36 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 11.143.242.68.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.143.242.68.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.206.30.83 attackspam
Lines containing failures of 123.206.30.83
Oct 27 09:09:10 Tosca sshd[32452]: User r.r from 123.206.30.83 not allowed because none of user's groups are listed in AllowGroups
Oct 27 09:09:10 Tosca sshd[32452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.30.83  user=r.r
Oct 27 09:09:13 Tosca sshd[32452]: Failed password for invalid user r.r from 123.206.30.83 port 47846 ssh2
Oct 27 09:09:13 Tosca sshd[32452]: Received disconnect from 123.206.30.83 port 47846:11: Bye Bye [preauth]
Oct 27 09:09:13 Tosca sshd[32452]: Disconnected from invalid user r.r 123.206.30.83 port 47846 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=123.206.30.83
2019-10-28 04:31:05
95.213.129.164 attackspambots
10/27/2019-16:29:48.880391 95.213.129.164 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-28 04:41:29
213.190.31.210 attackbotsspam
Oct 27 20:19:12 server2 sshd\[13974\]: Invalid user oracle from 213.190.31.210
Oct 27 20:19:40 server2 sshd\[13976\]: Invalid user user from 213.190.31.210
Oct 27 20:20:29 server2 sshd\[14164\]: Invalid user user from 213.190.31.210
Oct 27 20:20:55 server2 sshd\[14175\]: Invalid user user from 213.190.31.210
Oct 27 20:22:06 server2 sshd\[14228\]: Invalid user user from 213.190.31.210
Oct 27 20:22:33 server2 sshd\[14235\]: Invalid user user from 213.190.31.210
2019-10-28 04:29:57
45.6.93.222 attackbots
Oct 24 23:08:08 eola sshd[11993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.93.222  user=r.r
Oct 24 23:08:10 eola sshd[11993]: Failed password for r.r from 45.6.93.222 port 51534 ssh2
Oct 24 23:08:10 eola sshd[11993]: Received disconnect from 45.6.93.222 port 51534:11: Bye Bye [preauth]
Oct 24 23:08:10 eola sshd[11993]: Disconnected from 45.6.93.222 port 51534 [preauth]
Oct 24 23:26:26 eola sshd[12452]: Invalid user 3389 from 45.6.93.222 port 35936
Oct 24 23:26:26 eola sshd[12452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.93.222 
Oct 24 23:26:28 eola sshd[12452]: Failed password for invalid user 3389 from 45.6.93.222 port 35936 ssh2
Oct 24 23:26:28 eola sshd[12452]: Received disconnect from 45.6.93.222 port 35936:11: Bye Bye [preauth]
Oct 24 23:26:28 eola sshd[12452]: Disconnected from 45.6.93.222 port 35936 [preauth]
Oct 24 23:31:05 eola sshd[12618]: Invalid user 123 ........
-------------------------------
2019-10-28 04:50:51
178.128.24.84 attack
Oct 27 10:41:58 hanapaa sshd\[2173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.24.84  user=root
Oct 27 10:41:59 hanapaa sshd\[2173\]: Failed password for root from 178.128.24.84 port 49358 ssh2
Oct 27 10:46:16 hanapaa sshd\[2497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.24.84  user=root
Oct 27 10:46:18 hanapaa sshd\[2497\]: Failed password for root from 178.128.24.84 port 59536 ssh2
Oct 27 10:50:36 hanapaa sshd\[2821\]: Invalid user steam from 178.128.24.84
Oct 27 10:50:36 hanapaa sshd\[2821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.24.84
2019-10-28 05:00:00
217.68.214.206 attackspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 04:24:03
143.0.69.14 attackbotsspam
Oct 27 15:20:50 localhost sshd\[4663\]: Invalid user uploader from 143.0.69.14 port 27284
Oct 27 15:20:50 localhost sshd\[4663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.0.69.14
Oct 27 15:20:51 localhost sshd\[4663\]: Failed password for invalid user uploader from 143.0.69.14 port 27284 ssh2
...
2019-10-28 04:30:45
222.186.180.8 attackbotsspam
Oct 27 21:40:01 dedicated sshd[24479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Oct 27 21:40:03 dedicated sshd[24479]: Failed password for root from 222.186.180.8 port 58778 ssh2
2019-10-28 04:42:27
62.117.57.150 attackspambots
DB server: rude login attack
2019-10-28 04:56:27
217.68.214.176 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 04:31:41
192.144.169.228 attackbots
Oct 27 18:10:59 vps sshd[21234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.169.228 
Oct 27 18:11:01 vps sshd[21234]: Failed password for invalid user pisica from 192.144.169.228 port 46172 ssh2
Oct 27 18:28:25 vps sshd[21928]: Failed password for root from 192.144.169.228 port 44388 ssh2
...
2019-10-28 04:30:13
156.199.40.55 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/156.199.40.55/ 
 
 EG - 1H : (262)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : EG 
 NAME ASN : ASN8452 
 
 IP : 156.199.40.55 
 
 CIDR : 156.199.0.0/18 
 
 PREFIX COUNT : 833 
 
 UNIQUE IP COUNT : 7610368 
 
 
 ATTACKS DETECTED ASN8452 :  
  1H - 16 
  3H - 48 
  6H - 104 
 12H - 181 
 24H - 252 
 
 DateTime : 2019-10-27 21:29:56 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-28 04:34:27
111.38.82.64 attackspam
19/10/27@16:29:23: FAIL: IoT-Telnet address from=111.38.82.64
...
2019-10-28 04:59:16
173.245.202.211 attackspam
Chat Spam
2019-10-28 04:49:09
129.211.14.39 attackspam
Oct 27 21:29:17 v22019058497090703 sshd[26185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.14.39
Oct 27 21:29:19 v22019058497090703 sshd[26185]: Failed password for invalid user killall from 129.211.14.39 port 42526 ssh2
Oct 27 21:35:36 v22019058497090703 sshd[26632]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.14.39
...
2019-10-28 04:45:32

最近上报的IP列表

103.58.148.215 103.58.149.96 103.59.100.190 103.6.12.171
103.6.198.194 103.6.198.37 103.6.198.79 103.6.198.88
103.6.207.183 103.60.124.26 103.60.145.85 103.60.164.239
103.61.2.225 103.63.212.36 103.65.181.66 103.65.20.164
103.66.219.202 103.7.57.115 56.227.43.174 103.70.125.142