必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.30.248.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39895
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.30.248.141.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 01:53:17 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 141.248.30.68.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 141.248.30.68.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.232.140.146 attack
Mar  4 01:51:06 hosting sshd[22171]: Invalid user red from 49.232.140.146 port 46830
...
2020-03-04 07:47:32
88.84.209.145 attackbotsspam
Automatic report - Port Scan Attack
2020-03-04 07:20:30
62.46.61.249 attackspam
Mar  3 20:16:41 nandi sshd[12130]: Invalid user team3 from 62.46.61.249
Mar  3 20:16:41 nandi sshd[12130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-46-61-249.adsl.highway.telekom.at 
Mar  3 20:16:43 nandi sshd[12130]: Failed password for invalid user team3 from 62.46.61.249 port 34342 ssh2
Mar  3 20:16:44 nandi sshd[12130]: Received disconnect from 62.46.61.249: 11: Bye Bye [preauth]
Mar  3 20:28:57 nandi sshd[17468]: Connection closed by 62.46.61.249 [preauth]
Mar  3 20:35:02 nandi sshd[20067]: Did not receive identification string from 62.46.61.249
Mar  3 20:40:55 nandi sshd[23477]: Connection closed by 62.46.61.249 [preauth]
Mar  3 20:46:50 nandi sshd[26403]: Did not receive identification string from 62.46.61.249
Mar  3 20:52:46 nandi sshd[28989]: Invalid user matt from 62.46.61.249
Mar  3 20:52:46 nandi sshd[28989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-46-61-249.........
-------------------------------
2020-03-04 07:22:01
222.186.42.136 attackbots
Mar 4 00:42:18 *host* sshd\[21215\]: User *user* from 222.186.42.136 not allowed because none of user's groups are listed in AllowGroups
2020-03-04 07:43:13
186.42.197.114 attackbotsspam
Mar  3 12:57:46 hpm sshd\[4180\]: Invalid user redmine from 186.42.197.114
Mar  3 12:57:46 hpm sshd\[4180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.42.197.114
Mar  3 12:57:48 hpm sshd\[4180\]: Failed password for invalid user redmine from 186.42.197.114 port 43976 ssh2
Mar  3 13:07:24 hpm sshd\[5179\]: Invalid user ident from 186.42.197.114
Mar  3 13:07:24 hpm sshd\[5179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.42.197.114
2020-03-04 07:18:05
178.128.121.180 attackbotsspam
2020-03-04T00:12:59.850376ns386461 sshd\[15386\]: Invalid user mysql from 178.128.121.180 port 54214
2020-03-04T00:12:59.855208ns386461 sshd\[15386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.180
2020-03-04T00:13:01.446425ns386461 sshd\[15386\]: Failed password for invalid user mysql from 178.128.121.180 port 54214 ssh2
2020-03-04T00:38:34.212723ns386461 sshd\[5970\]: Invalid user storm from 178.128.121.180 port 50612
2020-03-04T00:38:34.217208ns386461 sshd\[5970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.180
...
2020-03-04 07:41:33
94.158.23.66 attack
B: Magento admin pass test (wrong country)
2020-03-04 07:27:36
181.30.28.59 attackspam
SASL PLAIN auth failed: ruser=...
2020-03-04 07:13:08
158.69.160.191 attackbots
$f2bV_matches
2020-03-04 07:46:50
202.29.80.133 attack
Mar  4 01:37:58 server sshd\[8193\]: Invalid user www-data from 202.29.80.133
Mar  4 01:37:58 server sshd\[8193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.80.133 
Mar  4 01:38:00 server sshd\[8193\]: Failed password for invalid user www-data from 202.29.80.133 port 50700 ssh2
Mar  4 01:39:20 server sshd\[8388\]: Invalid user bit_users from 202.29.80.133
Mar  4 01:39:20 server sshd\[8388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.29.80.133 
...
2020-03-04 07:17:08
106.13.103.128 attack
Mar  3 13:19:34 eddieflores sshd\[27410\]: Invalid user ovhuser from 106.13.103.128
Mar  3 13:19:34 eddieflores sshd\[27410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.128
Mar  3 13:19:36 eddieflores sshd\[27410\]: Failed password for invalid user ovhuser from 106.13.103.128 port 40184 ssh2
Mar  3 13:28:34 eddieflores sshd\[28160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.103.128  user=sync
Mar  3 13:28:37 eddieflores sshd\[28160\]: Failed password for sync from 106.13.103.128 port 58570 ssh2
2020-03-04 07:47:19
89.35.39.60 attackspam
C1,WP GET /wp-login.php
2020-03-04 07:18:59
188.166.165.228 attackbots
$f2bV_matches
2020-03-04 07:37:36
159.203.82.179 attackspam
Mar  4 00:20:46 localhost sshd\[28448\]: Invalid user kristofvps from 159.203.82.179 port 57916
Mar  4 00:20:46 localhost sshd\[28448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.82.179
Mar  4 00:20:49 localhost sshd\[28448\]: Failed password for invalid user kristofvps from 159.203.82.179 port 57916 ssh2
2020-03-04 07:34:52
209.141.41.96 attackbotsspam
Mar  3 13:04:16 web1 sshd\[30226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.96  user=root
Mar  3 13:04:18 web1 sshd\[30226\]: Failed password for root from 209.141.41.96 port 58014 ssh2
Mar  3 13:10:59 web1 sshd\[30931\]: Invalid user onion from 209.141.41.96
Mar  3 13:10:59 web1 sshd\[30931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.41.96
Mar  3 13:11:01 web1 sshd\[30931\]: Failed password for invalid user onion from 209.141.41.96 port 46694 ssh2
2020-03-04 07:26:47

最近上报的IP列表

84.248.90.208 59.9.209.141 235.255.201.112 7.82.238.243
44.135.93.91 43.0.66.7 146.171.59.226 204.101.167.114
128.225.176.241 251.107.158.246 46.156.219.41 63.47.130.56
51.1.242.29 143.80.156.191 168.133.77.217 231.251.35.67
189.37.49.40 170.244.28.126 186.171.41.215 85.194.134.78