必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.40.105.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10350
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.40.105.61.			IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020301 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 07:47:10 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
61.105.40.68.in-addr.arpa domain name pointer c-68-40-105-61.hsd1.mi.comcast.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
61.105.40.68.in-addr.arpa	name = c-68-40-105-61.hsd1.mi.comcast.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.251.61.236 attack
Automated reporting of FTP Brute Force
2019-09-27 20:34:06
118.24.99.163 attackbotsspam
"Fail2Ban detected SSH brute force attempt"
2019-09-27 20:27:48
114.107.224.65 attackspam
Automated reporting of FTP Brute Force
2019-09-27 20:26:25
41.164.195.204 attackspambots
Sep 27 08:10:40 xtremcommunity sshd\[18761\]: Invalid user ntpupdate from 41.164.195.204 port 56878
Sep 27 08:10:40 xtremcommunity sshd\[18761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204
Sep 27 08:10:43 xtremcommunity sshd\[18761\]: Failed password for invalid user ntpupdate from 41.164.195.204 port 56878 ssh2
Sep 27 08:15:49 xtremcommunity sshd\[18837\]: Invalid user openproject from 41.164.195.204 port 41030
Sep 27 08:15:49 xtremcommunity sshd\[18837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.164.195.204
...
2019-09-27 20:29:50
167.71.158.65 attack
2019-09-27T12:15:54.339329abusebot-6.cloudsearch.cf sshd\[24003\]: Invalid user lionel from 167.71.158.65 port 59710
2019-09-27 20:26:01
222.186.30.152 attackbotsspam
2019-09-27T19:37:53.913503enmeeting.mahidol.ac.th sshd\[7573\]: User root from 222.186.30.152 not allowed because not listed in AllowUsers
2019-09-27T19:37:54.276605enmeeting.mahidol.ac.th sshd\[7573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.152  user=root
2019-09-27T19:37:57.050153enmeeting.mahidol.ac.th sshd\[7573\]: Failed password for invalid user root from 222.186.30.152 port 46631 ssh2
...
2019-09-27 20:41:35
93.43.118.33 attack
Sep 27 14:15:33 [munged] sshd[2589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.43.118.33
2019-09-27 20:47:14
152.136.90.196 attack
Sep 27 02:10:06 hiderm sshd\[11455\]: Invalid user abc123 from 152.136.90.196
Sep 27 02:10:06 hiderm sshd\[11455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.90.196
Sep 27 02:10:08 hiderm sshd\[11455\]: Failed password for invalid user abc123 from 152.136.90.196 port 42614 ssh2
Sep 27 02:15:57 hiderm sshd\[11928\]: Invalid user manu123456 from 152.136.90.196
Sep 27 02:15:57 hiderm sshd\[11928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.90.196
2019-09-27 20:23:05
166.111.68.168 attackspambots
Invalid user xt from 166.111.68.168 port 34566
2019-09-27 20:15:41
185.220.101.48 attack
langenachtfulda.de:80 185.220.101.48 - - \[27/Sep/2019:14:15:48 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 503 "-" "Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\; rv:61.0\) Gecko/20100101 Firefox/61.0"
langenachtfulda.de 185.220.101.48 \[27/Sep/2019:14:15:50 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 3777 "-" "Mozilla/5.0 \(Windows NT 6.1\; Win64\; x64\; rv:61.0\) Gecko/20100101 Firefox/61.0"
2019-09-27 20:28:16
179.238.216.48 attackspam
ssh bruteforce or scan
...
2019-09-27 20:46:59
198.245.50.81 attack
Sep 27 02:11:32 web9 sshd\[9872\]: Invalid user minecraft from 198.245.50.81
Sep 27 02:11:32 web9 sshd\[9872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81
Sep 27 02:11:34 web9 sshd\[9872\]: Failed password for invalid user minecraft from 198.245.50.81 port 49274 ssh2
Sep 27 02:15:56 web9 sshd\[10691\]: Invalid user brasov from 198.245.50.81
Sep 27 02:15:56 web9 sshd\[10691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81
2019-09-27 20:24:12
45.119.203.42 attackspambots
Unauthorised access (Sep 27) SRC=45.119.203.42 LEN=52 TTL=114 ID=20467 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-27 20:50:20
177.8.244.38 attackspambots
2019-09-27T11:52:56.147261abusebot-8.cloudsearch.cf sshd\[8198\]: Invalid user sinus from 177.8.244.38 port 52528
2019-09-27 20:09:30
92.222.33.4 attack
Sep 27 14:15:38 MK-Soft-Root2 sshd[32522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.33.4 
Sep 27 14:15:40 MK-Soft-Root2 sshd[32522]: Failed password for invalid user oleta from 92.222.33.4 port 42856 ssh2
...
2019-09-27 20:39:22

最近上报的IP列表

102.115.246.43 127.199.235.132 249.142.165.123 23.4.187.172
218.143.224.11 97.56.51.209 94.23.193.166 174.91.45.102
13.42.255.161 62.113.239.161 218.138.77.193 1.127.92.207
164.51.150.55 124.221.119.113 139.17.20.73 91.92.238.125
196.197.47.205 88.2.219.179 172.98.67.31 163.6.209.126