必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.40.211.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.40.211.253.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 17:52:41 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
253.211.40.68.in-addr.arpa domain name pointer c-68-40-211-253.hsd1.mi.comcast.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
253.211.40.68.in-addr.arpa	name = c-68-40-211-253.hsd1.mi.comcast.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
134.209.7.179 attack
Aug  9 08:21:52 server sshd\[15337\]: Invalid user ftpuser from 134.209.7.179
Aug  9 08:21:52 server sshd\[15337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.7.179
Aug  9 08:21:54 server sshd\[15337\]: Failed password for invalid user ftpuser from 134.209.7.179 port 50598 ssh2
...
2019-08-21 14:45:55
188.131.218.175 attackbotsspam
Aug 20 16:45:55 aiointranet sshd\[26928\]: Invalid user ionut123 from 188.131.218.175
Aug 20 16:45:55 aiointranet sshd\[26928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.218.175
Aug 20 16:45:57 aiointranet sshd\[26928\]: Failed password for invalid user ionut123 from 188.131.218.175 port 44236 ssh2
Aug 20 16:47:32 aiointranet sshd\[27097\]: Invalid user ryo from 188.131.218.175
Aug 20 16:47:32 aiointranet sshd\[27097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.218.175
2019-08-21 14:55:10
89.108.84.80 attackbots
Aug 20 20:15:04 hpm sshd\[7886\]: Invalid user sunsun from 89.108.84.80
Aug 20 20:15:04 hpm sshd\[7886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=francesco.ru
Aug 20 20:15:06 hpm sshd\[7886\]: Failed password for invalid user sunsun from 89.108.84.80 port 55440 ssh2
Aug 20 20:19:34 hpm sshd\[8256\]: Invalid user testi from 89.108.84.80
Aug 20 20:19:34 hpm sshd\[8256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=francesco.ru
2019-08-21 14:27:53
203.100.87.75 attackbotsspam
" "
2019-08-21 14:45:13
222.186.15.197 attackspambots
Aug 21 09:02:57 eventyay sshd[13490]: Failed password for root from 222.186.15.197 port 60420 ssh2
Aug 21 09:02:59 eventyay sshd[13490]: Failed password for root from 222.186.15.197 port 60420 ssh2
Aug 21 09:03:02 eventyay sshd[13490]: Failed password for root from 222.186.15.197 port 60420 ssh2
...
2019-08-21 15:05:50
193.32.160.138 attackspambots
SPAM Delivery Attempt
2019-08-21 15:16:29
222.186.52.89 attackspam
Aug 21 08:44:45 legacy sshd[11426]: Failed password for root from 222.186.52.89 port 42314 ssh2
Aug 21 08:44:47 legacy sshd[11426]: Failed password for root from 222.186.52.89 port 42314 ssh2
Aug 21 08:44:50 legacy sshd[11426]: Failed password for root from 222.186.52.89 port 42314 ssh2
...
2019-08-21 14:47:05
193.32.160.142 attackspambots
Aug 21 08:05:52 webserver postfix/smtpd\[22315\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.142\]: 450 4.1.8 \: Sender address rejected: Domain not found\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.135\]\>
Aug 21 08:05:52 webserver postfix/smtpd\[22315\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.142\]: 450 4.1.8 \: Sender address rejected: Domain not found\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.135\]\>
Aug 21 08:05:52 webserver postfix/smtpd\[22315\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.142\]: 450 4.1.8 \: Sender address rejected: Domain not found\; from=\ to=\ proto=ESMTP helo=\<\[193.32.160.135\]\>
Aug 21 08:05:52 webserver postfix/smtpd\[22315\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.142\]: 450 4.1.
...
2019-08-21 15:15:12
84.23.55.221 attack
[portscan] Port scan
2019-08-21 14:24:32
196.52.43.53 attackspam
Honeypot hit.
2019-08-21 15:10:59
112.85.42.195 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-08-21 14:59:33
125.99.120.166 attackspam
proto=tcp  .  spt=55872  .  dpt=25  .     (listed on Blocklist de  Aug 20)     (201)
2019-08-21 15:10:36
202.29.70.46 attackbots
2019-08-15T17:50:55.587310wiz-ks3 sshd[12175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mgt2.pnu.ac.th  user=root
2019-08-15T17:50:57.308866wiz-ks3 sshd[12175]: Failed password for root from 202.29.70.46 port 37784 ssh2
2019-08-15T17:51:20.150274wiz-ks3 sshd[12177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mgt2.pnu.ac.th  user=root
2019-08-15T17:51:21.636145wiz-ks3 sshd[12177]: Failed password for root from 202.29.70.46 port 41570 ssh2
2019-08-15T17:51:40.447160wiz-ks3 sshd[12180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mgt2.pnu.ac.th  user=root
2019-08-15T17:51:42.013136wiz-ks3 sshd[12180]: Failed password for root from 202.29.70.46 port 45362 ssh2
2019-08-15T17:52:00.771609wiz-ks3 sshd[12182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mgt2.pnu.ac.th  user=root
2019-08-15T17:52:03.416521wiz-ks3 sshd[12182]: Failed password
2019-08-21 14:41:28
188.166.83.120 attack
Aug 20 20:55:20 php1 sshd\[21082\]: Invalid user skynet from 188.166.83.120
Aug 20 20:55:20 php1 sshd\[21082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.83.120
Aug 20 20:55:23 php1 sshd\[21082\]: Failed password for invalid user skynet from 188.166.83.120 port 47672 ssh2
Aug 20 20:59:35 php1 sshd\[21431\]: Invalid user administrator from 188.166.83.120
Aug 20 20:59:35 php1 sshd\[21431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.83.120
2019-08-21 15:00:50
209.17.97.74 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-08-21 14:33:45

最近上报的IP列表

146.10.101.253 131.133.129.166 63.206.144.111 227.70.173.90
231.107.50.99 26.139.226.101 203.208.78.245 172.213.171.130
198.71.100.17 53.105.18.91 125.12.9.45 135.123.209.191
33.130.174.240 214.223.103.255 47.140.166.26 213.93.245.212
17.80.197.95 139.23.212.161 138.119.232.127 87.14.175.236