必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.64.180.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20442
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.64.180.61.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 17:12:41 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 61.180.64.68.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 61.180.64.68.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.148.20.25 attack
Sep 25 16:03:23 meumeu sshd[24563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.148.20.25 
Sep 25 16:03:25 meumeu sshd[24563]: Failed password for invalid user operator from 46.148.20.25 port 35050 ssh2
Sep 25 16:11:44 meumeu sshd[25783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.148.20.25 
...
2019-09-26 00:45:53
178.46.209.200 attack
23/tcp
[2019-09-25]1pkt
2019-09-26 00:57:35
196.34.35.180 attack
Sep 25 21:11:52 gw1 sshd[28306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.34.35.180
Sep 25 21:11:54 gw1 sshd[28306]: Failed password for invalid user oracle from 196.34.35.180 port 40282 ssh2
...
2019-09-26 00:32:01
177.37.77.64 attackbotsspam
Sep 25 14:58:08 tuxlinux sshd[30255]: Invalid user uftp from 177.37.77.64 port 60105
Sep 25 14:58:08 tuxlinux sshd[30255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.37.77.64 
Sep 25 14:58:08 tuxlinux sshd[30255]: Invalid user uftp from 177.37.77.64 port 60105
Sep 25 14:58:08 tuxlinux sshd[30255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.37.77.64 
Sep 25 14:58:08 tuxlinux sshd[30255]: Invalid user uftp from 177.37.77.64 port 60105
Sep 25 14:58:08 tuxlinux sshd[30255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.37.77.64 
Sep 25 14:58:10 tuxlinux sshd[30255]: Failed password for invalid user uftp from 177.37.77.64 port 60105 ssh2
...
2019-09-26 00:40:35
124.16.136.100 attackbotsspam
Sep 25 16:19:29 OPSO sshd\[5232\]: Invalid user user1 from 124.16.136.100 port 14199
Sep 25 16:19:29 OPSO sshd\[5232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.136.100
Sep 25 16:19:31 OPSO sshd\[5232\]: Failed password for invalid user user1 from 124.16.136.100 port 14199 ssh2
Sep 25 16:23:29 OPSO sshd\[6158\]: Invalid user user from 124.16.136.100 port 24905
Sep 25 16:23:29 OPSO sshd\[6158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.16.136.100
2019-09-26 00:55:20
104.236.252.162 attackbotsspam
Sep 25 03:55:32 aiointranet sshd\[5810\]: Invalid user test1 from 104.236.252.162
Sep 25 03:55:32 aiointranet sshd\[5810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.252.162
Sep 25 03:55:34 aiointranet sshd\[5810\]: Failed password for invalid user test1 from 104.236.252.162 port 53522 ssh2
Sep 25 03:59:55 aiointranet sshd\[6177\]: Invalid user justin from 104.236.252.162
Sep 25 03:59:55 aiointranet sshd\[6177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.252.162
2019-09-26 01:06:46
117.207.206.123 attackspambots
" "
2019-09-26 01:18:40
158.69.184.2 attack
Sep 25 18:54:19 h2177944 sshd\[12883\]: Invalid user user0 from 158.69.184.2 port 44508
Sep 25 18:54:19 h2177944 sshd\[12883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.184.2
Sep 25 18:54:21 h2177944 sshd\[12883\]: Failed password for invalid user user0 from 158.69.184.2 port 44508 ssh2
Sep 25 18:58:31 h2177944 sshd\[13032\]: Invalid user yc from 158.69.184.2 port 57210
...
2019-09-26 01:03:22
121.230.64.165 attack
Unauthorised access (Sep 25) SRC=121.230.64.165 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=45711 TCP DPT=8080 WINDOW=18568 SYN 
Unauthorised access (Sep 25) SRC=121.230.64.165 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=45689 TCP DPT=8080 WINDOW=6083 SYN
2019-09-26 01:15:33
71.6.233.152 attackbotsspam
" "
2019-09-26 00:41:01
89.238.154.174 attack
SSHScan
2019-09-26 01:05:11
91.218.209.3 attack
Chat Spam
2019-09-26 01:04:13
85.172.13.206 attackbotsspam
2019-09-25T23:26:23.397801enmeeting.mahidol.ac.th sshd\[30472\]: Invalid user taolider from 85.172.13.206 port 56578
2019-09-25T23:26:23.411933enmeeting.mahidol.ac.th sshd\[30472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.172.13.206
2019-09-25T23:26:25.095867enmeeting.mahidol.ac.th sshd\[30472\]: Failed password for invalid user taolider from 85.172.13.206 port 56578 ssh2
...
2019-09-26 01:06:02
49.235.88.104 attackspambots
Sep 25 16:18:00 hcbbdb sshd\[10422\]: Invalid user rodolfo from 49.235.88.104
Sep 25 16:18:00 hcbbdb sshd\[10422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.88.104
Sep 25 16:18:03 hcbbdb sshd\[10422\]: Failed password for invalid user rodolfo from 49.235.88.104 port 42182 ssh2
Sep 25 16:24:50 hcbbdb sshd\[11117\]: Invalid user alex from 49.235.88.104
Sep 25 16:24:50 hcbbdb sshd\[11117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.88.104
2019-09-26 00:31:22
27.147.255.226 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/27.147.255.226/ 
 BD - 1H : (69)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BD 
 NAME ASN : ASN23688 
 
 IP : 27.147.255.226 
 
 CIDR : 27.147.254.0/23 
 
 PREFIX COUNT : 33 
 
 UNIQUE IP COUNT : 51200 
 
 
 WYKRYTE ATAKI Z ASN23688 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 5 
 24H - 9 
 
 INFO : SERVER - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-26 01:10:16

最近上报的IP列表

199.149.32.10 204.180.38.202 254.227.207.164 59.29.215.224
76.39.221.99 195.87.25.62 83.135.6.84 151.148.221.96
48.48.12.198 66.218.67.251 139.60.65.65 128.126.219.66
39.99.88.100 156.144.123.148 73.94.17.67 62.149.80.109
217.228.236.206 46.20.124.90 184.232.180.43 118.16.102.33