必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.94.45.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6037
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.94.45.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:55:00 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 12.45.94.68.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.45.94.68.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.232.26.145 attackspam
Unauthorized connection attempt from IP address 182.232.26.145 on Port 445(SMB)
2019-06-30 19:33:53
81.22.45.148 attackbots
Jun 30 10:43:32   TCP Attack: SRC=81.22.45.148 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=241  PROTO=TCP SPT=40972 DPT=21018 WINDOW=1024 RES=0x00 SYN URGP=0
2019-06-30 19:45:15
1.213.195.154 attack
Jun 30 13:48:58 SilenceServices sshd[30661]: Failed password for mysql from 1.213.195.154 port 16939 ssh2
Jun 30 13:50:44 SilenceServices sshd[31692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.213.195.154
Jun 30 13:50:46 SilenceServices sshd[31692]: Failed password for invalid user 02 from 1.213.195.154 port 25572 ssh2
2019-06-30 19:50:53
130.162.74.85 attackspam
Jun 30 07:37:56 mail sshd\[21296\]: Invalid user git from 130.162.74.85 port 21650
Jun 30 07:37:56 mail sshd\[21296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.74.85
Jun 30 07:37:58 mail sshd\[21296\]: Failed password for invalid user git from 130.162.74.85 port 21650 ssh2
Jun 30 07:46:00 mail sshd\[22633\]: Invalid user erdi1 from 130.162.74.85 port 53514
Jun 30 07:46:00 mail sshd\[22633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.74.85
2019-06-30 19:26:03
185.53.88.45 attackspam
\[2019-06-30 06:45:57\] SECURITY\[5156\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-06-30T06:45:57.170-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441217900519",SessionID="0x7f13a8d3cb78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.45/57286",ACLName="no_extension_match"
\[2019-06-30 06:47:34\] SECURITY\[5156\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-06-30T06:47:34.048-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441217900519",SessionID="0x7f13a8e39958",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.45/59205",ACLName="no_extension_match"
\[2019-06-30 06:49:04\] SECURITY\[5156\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-06-30T06:49:04.841-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441217900519",SessionID="0x7f13a8d3cb78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.45/57789",ACLName="no_exten
2019-06-30 19:12:53
112.253.8.106 attack
Jun 30 06:52:05 srv206 sshd[11168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.253.8.106  user=root
Jun 30 06:52:07 srv206 sshd[11168]: Failed password for root from 112.253.8.106 port 54934 ssh2
Jun 30 06:52:10 srv206 sshd[11170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.253.8.106  user=root
Jun 30 06:52:12 srv206 sshd[11170]: Failed password for root from 112.253.8.106 port 54087 ssh2
...
2019-06-30 19:28:34
177.21.133.172 attackspambots
SMTP-sasl brute force
...
2019-06-30 19:34:40
128.199.255.146 attackspam
Jun 30 13:12:06 pornomens sshd\[1190\]: Invalid user jenkins from 128.199.255.146 port 40686
Jun 30 13:12:06 pornomens sshd\[1190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.255.146
Jun 30 13:12:07 pornomens sshd\[1190\]: Failed password for invalid user jenkins from 128.199.255.146 port 40686 ssh2
...
2019-06-30 19:26:37
14.169.26.36 attackspambots
Unauthorized connection attempt from IP address 14.169.26.36 on Port 445(SMB)
2019-06-30 19:52:35
36.72.218.156 attackbots
Unauthorized connection attempt from IP address 36.72.218.156 on Port 445(SMB)
2019-06-30 19:45:51
121.15.140.178 attackbots
Jun 30 07:37:31 ns37 sshd[30163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.140.178
Jun 30 07:37:31 ns37 sshd[30163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.140.178
2019-06-30 19:27:33
185.246.210.65 attackbotsspam
Jun 30 13:19:11 pornomens sshd\[1273\]: Invalid user eugenie from 185.246.210.65 port 51550
Jun 30 13:19:11 pornomens sshd\[1273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.210.65
Jun 30 13:19:13 pornomens sshd\[1273\]: Failed password for invalid user eugenie from 185.246.210.65 port 51550 ssh2
...
2019-06-30 19:22:59
217.112.128.143 attack
Postfix DNSBL listed. Trying to send SPAM.
2019-06-30 19:20:16
168.228.150.157 attack
SMTP-sasl brute force
...
2019-06-30 19:18:01
177.21.198.233 attack
SMTP-sasl brute force
...
2019-06-30 19:24:06

最近上报的IP列表

241.49.39.141 206.216.15.109 40.220.75.104 14.95.7.206
210.44.194.135 16.231.191.155 33.13.58.118 38.73.37.240
4.102.154.16 205.15.161.61 136.125.130.244 213.119.55.173
143.220.189.224 4.139.157.248 191.40.192.42 113.64.67.47
39.54.67.141 195.200.34.15 249.107.235.247 132.197.220.90