必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Raleigh

省份(region): North Carolina

国家(country): United States

运营商(isp): AT&T

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.89.119.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62188
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.89.119.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 01:16:31 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
57.119.89.68.in-addr.arpa domain name pointer adsl-68-89-119-57.dsl.rcsntx.swbell.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.119.89.68.in-addr.arpa	name = adsl-68-89-119-57.dsl.rcsntx.swbell.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
83.26.69.153 attackbotsspam
SSH login attempts
2019-12-04 06:52:57
110.18.62.226 attackspambots
Dec  3 23:31:44 ns3367391 proftpd[26273]: 127.0.0.1 (110.18.62.226[110.18.62.226]) - USER anonymous: no such user found from 110.18.62.226 [110.18.62.226] to 37.187.78.186:21
Dec  3 23:31:47 ns3367391 proftpd[26292]: 127.0.0.1 (110.18.62.226[110.18.62.226]) - USER yourdailypornvideos: no such user found from 110.18.62.226 [110.18.62.226] to 37.187.78.186:21
...
2019-12-04 07:02:08
178.128.76.6 attackspambots
web-1 [ssh] SSH Attack
2019-12-04 07:04:24
82.159.138.57 attackspam
Dec  3 23:33:31 mail sshd\[14198\]: Invalid user behrend from 82.159.138.57
Dec  3 23:33:31 mail sshd\[14198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.159.138.57
Dec  3 23:33:33 mail sshd\[14198\]: Failed password for invalid user behrend from 82.159.138.57 port 35090 ssh2
...
2019-12-04 06:50:34
207.154.211.36 attackspam
2019-12-03T23:48:51.357592ns386461 sshd\[28180\]: Invalid user marjorie from 207.154.211.36 port 51044
2019-12-03T23:48:51.362749ns386461 sshd\[28180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.211.36
2019-12-03T23:48:52.920303ns386461 sshd\[28180\]: Failed password for invalid user marjorie from 207.154.211.36 port 51044 ssh2
2019-12-03T23:55:39.726693ns386461 sshd\[2011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.211.36  user=root
2019-12-03T23:55:40.962541ns386461 sshd\[2011\]: Failed password for root from 207.154.211.36 port 45010 ssh2
...
2019-12-04 07:11:48
49.235.219.96 attackspambots
Dec  3 23:30:35 herz-der-gamer sshd[3127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.219.96  user=ts3
Dec  3 23:30:37 herz-der-gamer sshd[3127]: Failed password for ts3 from 49.235.219.96 port 34330 ssh2
Dec  3 23:38:26 herz-der-gamer sshd[3285]: Invalid user guest from 49.235.219.96 port 45830
...
2019-12-04 07:21:46
218.92.0.131 attackbotsspam
Dec  3 23:58:12 h2779839 sshd[22883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.131  user=root
Dec  3 23:58:14 h2779839 sshd[22883]: Failed password for root from 218.92.0.131 port 25758 ssh2
Dec  3 23:58:16 h2779839 sshd[22883]: Failed password for root from 218.92.0.131 port 25758 ssh2
Dec  3 23:58:12 h2779839 sshd[22883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.131  user=root
Dec  3 23:58:14 h2779839 sshd[22883]: Failed password for root from 218.92.0.131 port 25758 ssh2
Dec  3 23:58:16 h2779839 sshd[22883]: Failed password for root from 218.92.0.131 port 25758 ssh2
Dec  3 23:58:12 h2779839 sshd[22883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.131  user=root
Dec  3 23:58:14 h2779839 sshd[22883]: Failed password for root from 218.92.0.131 port 25758 ssh2
Dec  3 23:58:16 h2779839 sshd[22883]: Failed password for root fr
...
2019-12-04 07:00:31
144.217.214.100 attackspam
Dec  4 01:33:03 server sshd\[32605\]: Invalid user admin from 144.217.214.100
Dec  4 01:33:03 server sshd\[32605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-144-217-214.net 
Dec  4 01:33:04 server sshd\[32605\]: Failed password for invalid user admin from 144.217.214.100 port 45846 ssh2
Dec  4 01:39:24 server sshd\[1851\]: Invalid user cerini from 144.217.214.100
Dec  4 01:39:24 server sshd\[1851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip100.ip-144-217-214.net 
...
2019-12-04 06:51:10
148.70.26.85 attack
Nov 26 20:49:21 microserver sshd[10666]: Invalid user byoung from 148.70.26.85 port 35574
Nov 26 20:49:21 microserver sshd[10666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.26.85
Nov 26 20:49:23 microserver sshd[10666]: Failed password for invalid user byoung from 148.70.26.85 port 35574 ssh2
Nov 26 20:58:26 microserver sshd[11993]: Invalid user p@ssw0rd from 148.70.26.85 port 53614
Nov 26 20:58:26 microserver sshd[11993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.26.85
Nov 26 21:16:10 microserver sshd[14694]: Invalid user breezeweb from 148.70.26.85 port 33211
Nov 26 21:16:10 microserver sshd[14694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.26.85
Nov 26 21:16:12 microserver sshd[14694]: Failed password for invalid user breezeweb from 148.70.26.85 port 33211 ssh2
Nov 26 21:25:01 microserver sshd[15600]: Invalid user dwayne from 148.70.26.85 port 51245
2019-12-04 07:09:01
61.97.249.28 attackspam
Unauthorized connection attempt from IP address 61.97.249.28 on Port 445(SMB)
2019-12-04 07:22:57
122.224.66.162 attack
Dec  3 23:08:55 venus sshd\[15055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.66.162  user=root
Dec  3 23:08:57 venus sshd\[15055\]: Failed password for root from 122.224.66.162 port 49280 ssh2
Dec  3 23:15:11 venus sshd\[15262\]: Invalid user hastert from 122.224.66.162 port 59990
Dec  3 23:15:11 venus sshd\[15262\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.66.162
...
2019-12-04 07:21:20
118.25.213.82 attackspam
Dec  4 04:32:35 areeb-Workstation sshd[13154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.213.82 
Dec  4 04:32:38 areeb-Workstation sshd[13154]: Failed password for invalid user guest from 118.25.213.82 port 44004 ssh2
...
2019-12-04 07:16:00
182.61.48.209 attackbotsspam
Dec  3 23:31:50 cp sshd[31602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.48.209
Dec  3 23:31:50 cp sshd[31602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.48.209
2019-12-04 06:59:07
167.57.150.66 attack
Dec  3 23:31:11 vps sshd[29886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.57.150.66 
Dec  3 23:31:13 vps sshd[29886]: Failed password for invalid user admin from 167.57.150.66 port 54636 ssh2
Dec  3 23:31:32 vps sshd[29902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.57.150.66 
...
2019-12-04 07:12:09
180.76.173.189 attackbotsspam
Dec  4 00:51:49 sauna sshd[11230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.173.189
Dec  4 00:51:51 sauna sshd[11230]: Failed password for invalid user jims from 180.76.173.189 port 39252 ssh2
...
2019-12-04 07:07:39

最近上报的IP列表

99.249.165.137 125.53.126.41 43.36.244.147 61.111.242.133
3.247.43.251 199.107.255.192 82.232.212.85 218.40.194.182
50.60.121.254 225.7.175.96 144.76.87.121 17.243.201.124
129.74.5.20 74.191.124.118 146.249.153.245 140.30.178.3
170.132.178.21 71.25.66.192 223.21.110.170 240.71.247.4