必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.86.42.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37017
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.86.42.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 20:19:58 CST 2025
;; MSG SIZE  rcvd: 103
HOST信息:
1.42.86.68.in-addr.arpa domain name pointer ssag02.wheeling.wv.pitt.comcast.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.42.86.68.in-addr.arpa	name = ssag02.wheeling.wv.pitt.comcast.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.92.0.156 attackspambots
Dec 13 00:26:13 vpn01 sshd[5403]: Failed password for root from 218.92.0.156 port 40874 ssh2
Dec 13 00:26:16 vpn01 sshd[5403]: Failed password for root from 218.92.0.156 port 40874 ssh2
...
2019-12-13 07:39:08
111.230.140.177 attackspam
Dec 12 02:41:58 server sshd\[768\]: Failed password for invalid user cabi from 111.230.140.177 port 33618 ssh2
Dec 13 01:27:32 server sshd\[23344\]: Invalid user couto from 111.230.140.177
Dec 13 01:27:32 server sshd\[23344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.140.177 
Dec 13 01:27:34 server sshd\[23344\]: Failed password for invalid user couto from 111.230.140.177 port 52728 ssh2
Dec 13 01:47:28 server sshd\[29530\]: Invalid user backup from 111.230.140.177
Dec 13 01:47:28 server sshd\[29530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.140.177 
...
2019-12-13 07:42:01
129.204.93.65 attackbots
Dec 12 12:59:59 hpm sshd\[490\]: Invalid user rpm from 129.204.93.65
Dec 12 12:59:59 hpm sshd\[490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.93.65
Dec 12 13:00:01 hpm sshd\[490\]: Failed password for invalid user rpm from 129.204.93.65 port 54748 ssh2
Dec 12 13:06:08 hpm sshd\[1196\]: Invalid user admin from 129.204.93.65
Dec 12 13:06:08 hpm sshd\[1196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.93.65
2019-12-13 07:23:38
200.60.60.84 attack
Dec 12 23:40:43 Ubuntu-1404-trusty-64-minimal sshd\[30928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.60.84  user=root
Dec 12 23:40:45 Ubuntu-1404-trusty-64-minimal sshd\[30928\]: Failed password for root from 200.60.60.84 port 40344 ssh2
Dec 12 23:56:52 Ubuntu-1404-trusty-64-minimal sshd\[6979\]: Invalid user sinpn from 200.60.60.84
Dec 12 23:56:52 Ubuntu-1404-trusty-64-minimal sshd\[6979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.60.84
Dec 12 23:56:54 Ubuntu-1404-trusty-64-minimal sshd\[6979\]: Failed password for invalid user sinpn from 200.60.60.84 port 45771 ssh2
2019-12-13 07:30:24
51.68.227.49 attack
$f2bV_matches
2019-12-13 07:46:26
103.17.55.200 attackbots
Dec 12 13:01:49 eddieflores sshd\[26183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.55.200  user=bin
Dec 12 13:01:50 eddieflores sshd\[26183\]: Failed password for bin from 103.17.55.200 port 44075 ssh2
Dec 12 13:08:44 eddieflores sshd\[26869\]: Invalid user test from 103.17.55.200
Dec 12 13:08:44 eddieflores sshd\[26869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.55.200
Dec 12 13:08:46 eddieflores sshd\[26869\]: Failed password for invalid user test from 103.17.55.200 port 49857 ssh2
2019-12-13 07:48:52
115.231.163.85 attackbots
Dec 13 00:09:58 ns41 sshd[11964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.163.85
Dec 13 00:09:58 ns41 sshd[11964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.163.85
2019-12-13 07:45:50
51.15.51.2 attackspam
2019-12-12T23:15:06.646029shield sshd\[29471\]: Invalid user host from 51.15.51.2 port 52202
2019-12-12T23:15:06.651294shield sshd\[29471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.51.2
2019-12-12T23:15:08.700237shield sshd\[29471\]: Failed password for invalid user host from 51.15.51.2 port 52202 ssh2
2019-12-12T23:21:45.698300shield sshd\[31288\]: Invalid user eirena from 51.15.51.2 port 32808
2019-12-12T23:21:45.704013shield sshd\[31288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.51.2
2019-12-13 07:27:09
222.186.175.169 attackbots
Dec 13 00:39:09 icinga sshd[25347]: Failed password for root from 222.186.175.169 port 58790 ssh2
Dec 13 00:39:12 icinga sshd[25347]: Failed password for root from 222.186.175.169 port 58790 ssh2
...
2019-12-13 07:47:04
128.199.47.148 attackbots
Dec 13 05:48:12 webhost01 sshd[1547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.47.148
Dec 13 05:48:15 webhost01 sshd[1547]: Failed password for invalid user risto from 128.199.47.148 port 54542 ssh2
...
2019-12-13 07:17:53
112.85.42.178 attack
SSH-BruteForce
2019-12-13 07:46:05
129.204.22.64 attack
Dec 13 00:29:14 lnxweb61 sshd[23370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.22.64
Dec 13 00:29:14 lnxweb61 sshd[23370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.22.64
2019-12-13 07:31:34
37.214.171.113 attackbotsspam
(From drop.shipingnet@gmail.com) Top Amazon products for Electronics, Apparel, Computers, Books 
https://dropshiping.net
2019-12-13 07:35:21
218.199.68.118 attackspambots
Invalid user default from 218.199.68.118 port 54524
2019-12-13 07:16:14
118.24.120.2 attackspambots
Dec 12 23:26:11 h2177944 sshd\[6122\]: Invalid user onizawa from 118.24.120.2 port 36844
Dec 12 23:26:11 h2177944 sshd\[6122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.120.2
Dec 12 23:26:13 h2177944 sshd\[6122\]: Failed password for invalid user onizawa from 118.24.120.2 port 36844 ssh2
Dec 12 23:47:47 h2177944 sshd\[7021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.120.2  user=root
...
2019-12-13 07:24:43

最近上报的IP列表

155.149.209.238 125.106.0.18 63.88.239.91 242.187.50.207
121.64.173.230 154.92.169.203 17.3.107.179 146.209.7.117
107.25.201.158 5.190.189.242 214.144.37.159 213.38.145.232
63.187.44.245 241.225.173.108 26.115.137.139 249.103.46.216
33.57.81.76 68.114.221.130 166.117.129.125 124.46.63.30