必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.244.194.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5612
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.244.194.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 05:22:24 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 49.194.244.68.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 49.194.244.68.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.19.13.237 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 06:16:20
41.196.0.189 attackbotsspam
Jul  1 21:44:08 Ubuntu-1404-trusty-64-minimal sshd\[7459\]: Invalid user marry from 41.196.0.189
Jul  1 21:44:08 Ubuntu-1404-trusty-64-minimal sshd\[7459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.196.0.189
Jul  1 21:44:11 Ubuntu-1404-trusty-64-minimal sshd\[7459\]: Failed password for invalid user marry from 41.196.0.189 port 46158 ssh2
Jul  1 21:53:44 Ubuntu-1404-trusty-64-minimal sshd\[14652\]: Invalid user lin from 41.196.0.189
Jul  1 21:53:44 Ubuntu-1404-trusty-64-minimal sshd\[14652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.196.0.189
2019-07-02 06:33:34
60.191.52.254 attackbotsspam
Port scan: Attack repeated for 24 hours
2019-07-02 06:18:29
167.57.58.219 attack
Trying to deliver email spam, but blocked by RBL
2019-07-02 06:02:08
128.199.136.129 attackspam
Invalid user dpisklo from 128.199.136.129 port 39486
2019-07-02 06:25:43
180.183.221.101 attack
Unauthorized connection attempt from IP address 180.183.221.101 on Port 445(SMB)
2019-07-02 05:51:55
173.201.196.10 attackspam
C1,WP GET /humor/shop/wp-includes/wlwmanifest.xml
2019-07-02 06:27:23
60.211.83.226 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 06:20:07
59.174.149.148 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 05:53:34
186.113.116.154 attackbots
SSH-BRUTEFORCE
2019-07-02 05:58:29
87.98.147.104 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-07-02 06:29:13
112.164.194.31 attackspam
port scan and connect, tcp 22 (ssh)
2019-07-02 05:57:56
59.9.117.244 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 06:01:06
104.236.215.3 attack
proto=tcp  .  spt=37564  .  dpt=25  .     (listed on Blocklist de  Jul 01)     (1235)
2019-07-02 06:24:34
122.195.200.148 attackspam
Jul  1 18:14:25 Ubuntu-1404-trusty-64-minimal sshd\[13075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148  user=root
Jul  1 18:14:27 Ubuntu-1404-trusty-64-minimal sshd\[13075\]: Failed password for root from 122.195.200.148 port 37661 ssh2
Jul  1 18:14:39 Ubuntu-1404-trusty-64-minimal sshd\[13163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148  user=root
Jul  1 18:14:42 Ubuntu-1404-trusty-64-minimal sshd\[13163\]: Failed password for root from 122.195.200.148 port 39230 ssh2
Jul  1 18:14:52 Ubuntu-1404-trusty-64-minimal sshd\[13205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148  user=root
2019-07-02 06:32:46

最近上报的IP列表

195.36.44.207 163.31.191.204 17.19.12.88 26.25.85.128
177.124.144.5 182.167.95.91 249.98.231.2 172.106.152.47
144.54.36.55 100.254.167.226 7.160.127.229 22.61.211.80
57.198.200.197 202.50.66.234 200.36.37.48 116.49.46.83
96.209.62.204 130.106.133.123 162.113.101.220 143.162.219.87