必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.72.26.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.72.26.61.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 20:45:04 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
61.26.72.68.in-addr.arpa domain name pointer 68-72-26-61.lightspeed.knvltn.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
61.26.72.68.in-addr.arpa	name = 68-72-26-61.lightspeed.knvltn.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
87.197.154.176 attackbotsspam
Jun 19 21:14:57 minden010 sshd[30597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.197.154.176
Jun 19 21:14:59 minden010 sshd[30597]: Failed password for invalid user tcu from 87.197.154.176 port 40338 ssh2
Jun 19 21:18:24 minden010 sshd[333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.197.154.176
...
2020-06-20 04:01:19
171.118.164.250 attackbots
Email rejected due to spam filtering
2020-06-20 04:09:07
106.13.50.145 attack
Invalid user prova from 106.13.50.145 port 49036
2020-06-20 04:18:04
152.136.119.164 attackspambots
Jun 19 12:04:16 pbkit sshd[68636]: Invalid user bamboo from 152.136.119.164 port 40734
Jun 19 12:04:18 pbkit sshd[68636]: Failed password for invalid user bamboo from 152.136.119.164 port 40734 ssh2
Jun 19 12:11:22 pbkit sshd[68818]: Invalid user asi from 152.136.119.164 port 58088
...
2020-06-20 03:45:22
94.102.51.95 attackbots
06/19/2020-15:41:50.247063 94.102.51.95 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-20 03:58:07
49.82.192.227 attackspam
Email rejected due to spam filtering
2020-06-20 04:10:20
138.197.180.102 attackbotsspam
Jun 19 17:27:24 cdc sshd[20859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.180.102 
Jun 19 17:27:26 cdc sshd[20859]: Failed password for invalid user paul from 138.197.180.102 port 60956 ssh2
2020-06-20 04:08:08
103.123.8.75 attackspam
Jun 19 14:07:37 OPSO sshd\[5752\]: Invalid user csserver from 103.123.8.75 port 48924
Jun 19 14:07:37 OPSO sshd\[5752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.75
Jun 19 14:07:40 OPSO sshd\[5752\]: Failed password for invalid user csserver from 103.123.8.75 port 48924 ssh2
Jun 19 14:11:09 OPSO sshd\[6414\]: Invalid user sam from 103.123.8.75 port 42998
Jun 19 14:11:09 OPSO sshd\[6414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.75
2020-06-20 03:53:40
74.82.47.7 attack
 TCP (SYN) 74.82.47.7:60826 -> port 3389, len 40
2020-06-20 04:09:47
61.177.172.41 attackspambots
Jun 19 21:35:05 santamaria sshd\[29707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.41  user=root
Jun 19 21:35:08 santamaria sshd\[29707\]: Failed password for root from 61.177.172.41 port 19788 ssh2
Jun 19 21:35:11 santamaria sshd\[29707\]: Failed password for root from 61.177.172.41 port 19788 ssh2
...
2020-06-20 03:44:15
112.3.30.121 attackspam
2020-06-19T19:09:38.739158v22018076590370373 sshd[6928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.121
2020-06-19T19:09:38.732485v22018076590370373 sshd[6928]: Invalid user marianela from 112.3.30.121 port 52302
2020-06-19T19:09:40.344957v22018076590370373 sshd[6928]: Failed password for invalid user marianela from 112.3.30.121 port 52302 ssh2
2020-06-19T19:18:16.023993v22018076590370373 sshd[10983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.121  user=root
2020-06-19T19:18:17.739927v22018076590370373 sshd[10983]: Failed password for root from 112.3.30.121 port 51560 ssh2
...
2020-06-20 04:13:08
222.186.180.147 attack
2020-06-19T21:47:33.151199scmdmz1 sshd[22300]: Failed password for root from 222.186.180.147 port 19196 ssh2
2020-06-19T21:47:36.247831scmdmz1 sshd[22300]: Failed password for root from 222.186.180.147 port 19196 ssh2
2020-06-19T21:47:39.424345scmdmz1 sshd[22300]: Failed password for root from 222.186.180.147 port 19196 ssh2
...
2020-06-20 03:49:28
106.13.203.171 attack
Jun 19 21:43:53 ns37 sshd[15009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.203.171
Jun 19 21:43:55 ns37 sshd[15009]: Failed password for invalid user admindb from 106.13.203.171 port 31456 ssh2
Jun 19 21:47:10 ns37 sshd[16142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.203.171
2020-06-20 03:56:58
218.92.0.212 attack
Jun 19 15:56:28 NPSTNNYC01T sshd[3139]: Failed password for root from 218.92.0.212 port 65071 ssh2
Jun 19 15:56:37 NPSTNNYC01T sshd[3139]: Failed password for root from 218.92.0.212 port 65071 ssh2
Jun 19 15:56:40 NPSTNNYC01T sshd[3139]: Failed password for root from 218.92.0.212 port 65071 ssh2
Jun 19 15:56:40 NPSTNNYC01T sshd[3139]: error: maximum authentication attempts exceeded for root from 218.92.0.212 port 65071 ssh2 [preauth]
...
2020-06-20 04:12:21
195.2.93.210 attackbots
invalid login attempt (mehdi)
2020-06-20 03:38:59

最近上报的IP列表

208.114.236.19 91.167.44.108 84.33.220.137 41.157.165.208
51.107.66.36 53.128.197.30 221.186.184.65 167.34.24.30
21.5.250.72 219.224.5.229 22.213.101.81 219.86.155.123
157.181.125.45 43.238.187.115 49.159.123.137 177.211.3.238
215.21.56.247 124.72.231.197 57.80.56.69 253.109.219.140