必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ann Arbor

省份(region): Michigan

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.40.207.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17080
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.40.207.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 09 15:55:36 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
41.207.40.68.in-addr.arpa domain name pointer c-68-40-207-41.hsd1.mi.comcast.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.207.40.68.in-addr.arpa	name = c-68-40-207-41.hsd1.mi.comcast.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
199.195.252.213 attack
Aug 11 00:33:46 ks10 sshd[17176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213 
Aug 11 00:33:47 ks10 sshd[17176]: Failed password for invalid user ab from 199.195.252.213 port 44088 ssh2
...
2019-08-11 07:08:39
124.156.164.41 attackspam
Automated report - ssh fail2ban:
Aug 11 00:29:23 authentication failure 
Aug 11 00:29:25 wrong password, user=stevo, port=43374, ssh2
2019-08-11 06:57:26
223.203.9.181 attack
Apr 10 07:12:36 motanud sshd\[16767\]: Invalid user jboss from 223.203.9.181 port 37310
Apr 10 07:12:36 motanud sshd\[16767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.203.9.181
Apr 10 07:12:38 motanud sshd\[16767\]: Failed password for invalid user jboss from 223.203.9.181 port 37310 ssh2
2019-08-11 07:07:14
103.8.149.78 attackbotsspam
Aug 11 00:39:04 srv206 sshd[16571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.8.149.78  user=root
Aug 11 00:39:06 srv206 sshd[16571]: Failed password for root from 103.8.149.78 port 60289 ssh2
...
2019-08-11 06:59:01
223.16.216.92 attackspam
Mar  5 00:38:54 motanud sshd\[26695\]: Invalid user ub from 223.16.216.92 port 60570
Mar  5 00:38:54 motanud sshd\[26695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.16.216.92
Mar  5 00:38:56 motanud sshd\[26695\]: Failed password for invalid user ub from 223.16.216.92 port 60570 ssh2
2019-08-11 07:19:26
223.206.42.113 attackspam
Mar  6 11:18:11 motanud sshd\[2909\]: Invalid user nagvis from 223.206.42.113 port 47202
Mar  6 11:18:11 motanud sshd\[2909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.206.42.113
Mar  6 11:18:14 motanud sshd\[2909\]: Failed password for invalid user nagvis from 223.206.42.113 port 47202 ssh2
2019-08-11 07:05:07
82.64.122.120 attackspambots
Automatic report - Banned IP Access
2019-08-11 06:54:01
223.202.201.220 attack
Feb 27 00:53:16 motanud sshd\[3125\]: Invalid user sms from 223.202.201.220 port 50005
Feb 27 00:53:16 motanud sshd\[3125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.202.201.220
Feb 27 00:53:18 motanud sshd\[3125\]: Failed password for invalid user sms from 223.202.201.220 port 50005 ssh2
2019-08-11 07:09:25
27.154.225.186 attackspambots
Aug 10 23:52:37 mail sshd\[16029\]: Invalid user it1 from 27.154.225.186 port 40058
Aug 10 23:52:37 mail sshd\[16029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.154.225.186
...
2019-08-11 07:00:25
89.248.174.52 attackspam
10 failed attempt(s) in the last 24h
2019-08-11 07:22:17
68.52.92.160 attackbots
DATE:2019-08-11 00:34:31, IP:68.52.92.160, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-08-11 06:48:26
106.12.93.138 attack
2019-08-10T23:00:46.048046Z 4ac5b0a3e2d3 New connection: 106.12.93.138:35672 (172.17.0.3:2222) [session: 4ac5b0a3e2d3]
2019-08-10T23:09:23.725990Z ae2ea257a987 New connection: 106.12.93.138:56150 (172.17.0.3:2222) [session: ae2ea257a987]
2019-08-11 07:12:08
51.38.57.78 attackbotsspam
Aug 10 18:59:13 vps200512 sshd\[28767\]: Invalid user performer from 51.38.57.78
Aug 10 18:59:13 vps200512 sshd\[28767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78
Aug 10 18:59:15 vps200512 sshd\[28767\]: Failed password for invalid user performer from 51.38.57.78 port 41788 ssh2
Aug 10 19:02:52 vps200512 sshd\[28881\]: Invalid user tester from 51.38.57.78
Aug 10 19:02:52 vps200512 sshd\[28881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78
2019-08-11 07:03:18
46.143.204.253 attackbots
Automatic report - Port Scan Attack
2019-08-11 07:26:15
213.136.78.224 attackbots
SSH-BruteForce
2019-08-11 06:48:10

最近上报的IP列表

168.43.28.235 143.56.21.187 253.242.63.167 9.142.162.17
187.122.130.164 38.184.167.194 179.19.41.234 73.166.185.74
40.26.219.188 84.43.249.189 108.223.33.36 205.151.47.43
212.91.24.184 115.65.212.173 237.118.0.57 237.230.97.222
216.210.127.126 7.111.227.140 61.202.114.174 227.139.161.16