必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.56.66.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.56.66.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:24:00 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
99.66.56.68.in-addr.arpa domain name pointer c-68-56-66-99.hsd1.mi.comcast.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.66.56.68.in-addr.arpa	name = c-68-56-66-99.hsd1.mi.comcast.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.169.255.16 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/14.169.255.16/ 
 
 VN - 1H : (45)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : VN 
 NAME ASN : ASN45899 
 
 IP : 14.169.255.16 
 
 CIDR : 14.169.224.0/19 
 
 PREFIX COUNT : 2411 
 
 UNIQUE IP COUNT : 7209216 
 
 
 ATTACKS DETECTED ASN45899 :  
  1H - 9 
  3H - 10 
  6H - 12 
 12H - 16 
 24H - 24 
 
 DateTime : 2019-11-12 23:36:42 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-13 06:51:33
51.91.48.22 attackspam
Nov 13 00:07:02 SilenceServices sshd[10360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.48.22
Nov 13 00:07:05 SilenceServices sshd[10360]: Failed password for invalid user ubuntu from 51.91.48.22 port 34688 ssh2
Nov 13 00:07:23 SilenceServices sshd[10711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.48.22
2019-11-13 07:08:48
167.114.152.139 attack
Nov 13 00:36:34 sauna sshd[164842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.152.139
Nov 13 00:36:35 sauna sshd[164842]: Failed password for invalid user login from 167.114.152.139 port 54840 ssh2
...
2019-11-13 06:56:48
223.197.250.72 attackspambots
2019-11-12T15:36:57.269952-07:00 suse-nuc sshd[30382]: Invalid user luva from 223.197.250.72 port 52700
...
2019-11-13 06:43:56
106.13.45.212 attackspambots
Nov 13 00:08:16 localhost sshd\[10971\]: Invalid user ftp from 106.13.45.212 port 47998
Nov 13 00:08:16 localhost sshd\[10971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.45.212
Nov 13 00:08:19 localhost sshd\[10971\]: Failed password for invalid user ftp from 106.13.45.212 port 47998 ssh2
2019-11-13 07:14:56
103.30.151.17 attackbotsspam
34 failed attempt(s) in the last 24h
2019-11-13 07:04:46
45.82.153.133 attackbots
IP: 45.82.153.133
ASN: AS202984 Chernyshov Aleksandr Aleksandrovich
Port: Message Submission 587
Found in one or more Blacklists
Date: 12/11/2019 10:36:42 PM UTC
2019-11-13 06:52:46
68.116.41.6 attackspam
Nov 12 23:36:55 localhost sshd\[6293\]: Invalid user gautvik from 68.116.41.6 port 39076
Nov 12 23:36:55 localhost sshd\[6293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.116.41.6
Nov 12 23:36:57 localhost sshd\[6293\]: Failed password for invalid user gautvik from 68.116.41.6 port 39076 ssh2
2019-11-13 06:43:25
123.206.87.154 attack
Nov 12 13:01:49 auw2 sshd\[4869\]: Invalid user kalsom from 123.206.87.154
Nov 12 13:01:49 auw2 sshd\[4869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.87.154
Nov 12 13:01:52 auw2 sshd\[4869\]: Failed password for invalid user kalsom from 123.206.87.154 port 59754 ssh2
Nov 12 13:05:37 auw2 sshd\[5327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.87.154  user=root
Nov 12 13:05:40 auw2 sshd\[5327\]: Failed password for root from 123.206.87.154 port 39148 ssh2
2019-11-13 07:07:35
192.236.209.46 attackspam
from p-mtain004.msg.pkvw.co.charter.net ([107.14.70.244])
          by dnvrco-fep08.email.rr.com
          (InterMail vM.8.04.03.24 201-2389-100-172-20151028) with ESMTP
          id <20191112130238.HCEZ7114.dnvrco-fep08.email.rr.com@p-mtain004.msg.pkvw.co.charter.net>
          for ;
          Tue, 12 Nov 2019 13:02:38 +0000
Received: from p-impin020.msg.pkvw.co.charter.net ([47.43.26.161])
          by p-mtain004.msg.pkvw.co.charter.net
          (InterMail vM.9.01.00.037.1 201-2473-137-122-172) with ESMTP
          id <20191112130238.RADO29926.p-mtain004.msg.pkvw.co.charter.net@p-impin020.msg.pkvw.co.charter.net>
          for ;
          Tue, 12 Nov 2019 13:02:38 +0000
Received: from sportsnews.pro ([192.236.209.46])
2019-11-13 06:37:35
129.204.94.81 attackbots
2019-11-12T10:24:03.219164ns547587 sshd\[17811\]: Invalid user pn from 129.204.94.81 port 32872
2019-11-12T10:24:03.224769ns547587 sshd\[17811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.94.81
2019-11-12T10:24:05.464639ns547587 sshd\[17811\]: Failed password for invalid user pn from 129.204.94.81 port 32872 ssh2
2019-11-12T10:29:11.074360ns547587 sshd\[24310\]: Invalid user massimiliano from 129.204.94.81 port 49783
...
2019-11-13 06:37:04
182.61.13.129 attack
Nov 12 23:30:33 ns41 sshd[18705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.13.129
Nov 12 23:30:36 ns41 sshd[18705]: Failed password for invalid user nfs from 182.61.13.129 port 39304 ssh2
Nov 12 23:36:32 ns41 sshd[18924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.13.129
2019-11-13 06:59:10
119.163.196.146 attackspam
Nov 13 01:00:20 server sshd\[27420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.196.146  user=root
Nov 13 01:00:22 server sshd\[27420\]: Failed password for root from 119.163.196.146 port 28568 ssh2
Nov 13 01:32:58 server sshd\[2950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.196.146  user=root
Nov 13 01:33:00 server sshd\[2950\]: Failed password for root from 119.163.196.146 port 4466 ssh2
Nov 13 01:36:20 server sshd\[3997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.163.196.146  user=root
...
2019-11-13 07:04:24
62.210.89.231 attackbotsspam
SIPVicious Scanner Detection, PTR: 62-210-89-231.rev.poneytelecom.eu.
2019-11-13 06:57:53
103.90.227.164 attackbotsspam
Failed password for invalid user qqqqq from 103.90.227.164 port 33826 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.90.227.164  user=root
Failed password for root from 103.90.227.164 port 41420 ssh2
Invalid user home from 103.90.227.164 port 49034
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.90.227.164
2019-11-13 06:57:29

最近上报的IP列表

241.158.253.241 69.186.251.157 8.246.204.110 235.16.151.228
110.44.225.127 208.119.126.2 250.219.8.20 37.136.23.212
153.113.24.226 67.198.126.248 108.95.173.111 3.10.252.64
143.220.7.244 226.207.194.132 238.16.85.89 25.157.27.86
81.110.34.122 232.78.62.196 202.103.231.172 235.243.139.35