必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.68.166.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51398
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.68.166.164.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:25:38 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 164.166.68.8.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.166.68.8.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.210.167.202 attack
[2020-09-20 05:15:21] NOTICE[1239][C-000058dd] chan_sip.c: Call from '' (62.210.167.202:58809) to extension '862014422006166' rejected because extension not found in context 'public'.
[2020-09-20 05:15:21] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-20T05:15:21.847-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="862014422006166",SessionID="0x7f4d4843fec8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.167.202/58809",ACLName="no_extension_match"
[2020-09-20 05:16:44] NOTICE[1239][C-000058e0] chan_sip.c: Call from '' (62.210.167.202:51998) to extension '110214422006166' rejected because extension not found in context 'public'.
[2020-09-20 05:16:44] SECURITY[1264] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-20T05:16:44.633-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="110214422006166",SessionID="0x7f4d48260558",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U
...
2020-09-20 17:35:04
219.157.203.163 attackspam
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=59812  .  dstport=23  .     (2285)
2020-09-20 18:03:25
179.53.195.6 attackbotsspam
Port Scan detected!
...
2020-09-20 17:27:50
180.218.122.191 attack
Portscan detected
2020-09-20 17:39:09
119.123.227.15 attack
119.123.227.15 (CN/China/-), 7 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 20 02:44:30 jbs1 sshd[18097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.123.227.15  user=root
Sep 20 02:44:31 jbs1 sshd[18097]: Failed password for root from 119.123.227.15 port 2660 ssh2
Sep 20 02:44:22 jbs1 sshd[17943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.79.110.73  user=root
Sep 20 02:44:24 jbs1 sshd[17943]: Failed password for root from 177.79.110.73 port 2428 ssh2
Sep 20 02:45:50 jbs1 sshd[19207]: Failed password for root from 95.169.23.6 port 52094 ssh2
Sep 20 02:44:19 jbs1 sshd[17915]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.116.212  user=root
Sep 20 02:44:21 jbs1 sshd[17915]: Failed password for root from 46.101.116.212 port 42682 ssh2

IP Addresses Blocked:
2020-09-20 18:01:39
185.245.41.228 attackspambots
20 attempts against mh-ssh on pcx
2020-09-20 17:58:06
222.186.175.215 attackbotsspam
SSH brutforce
2020-09-20 17:58:41
142.44.246.156 attack
2020-09-19 UTC: (21x) - root(21x)
2020-09-20 17:56:53
184.105.139.126 attackbots
Found on   CINS badguys     / proto=17  .  srcport=34413  .  dstport=123  .     (1638)
2020-09-20 18:01:07
216.218.206.103 attackspam
RPC Portmapper DUMP Request Detected
2020-09-20 17:38:46
45.184.225.2 attackbotsspam
Sep 20 11:01:17 mout sshd[18478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.184.225.2  user=root
Sep 20 11:01:19 mout sshd[18478]: Failed password for root from 45.184.225.2 port 50220 ssh2
2020-09-20 17:32:57
141.98.80.189 attack
Sep 20 11:38:35 cho postfix/smtpd[3308048]: warning: unknown[141.98.80.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 11:38:35 cho postfix/smtpd[3308050]: warning: unknown[141.98.80.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 11:38:35 cho postfix/smtpd[3308046]: warning: unknown[141.98.80.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 11:38:35 cho postfix/smtpd[3308059]: warning: unknown[141.98.80.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 20 11:38:35 cho postfix/smtpd[3307472]: warning: unknown[141.98.80.189]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-20 17:44:12
184.105.247.194 attackspam
 TCP (SYN) 184.105.247.194:59194 -> port 8080, len 40
2020-09-20 18:03:51
217.182.252.30 attackbots
Sep 19 22:38:47 php1 sshd\[9774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.252.30  user=root
Sep 19 22:38:49 php1 sshd\[9774\]: Failed password for root from 217.182.252.30 port 52228 ssh2
Sep 19 22:45:38 php1 sshd\[10441\]: Invalid user admin9 from 217.182.252.30
Sep 19 22:45:38 php1 sshd\[10441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.252.30
Sep 19 22:45:40 php1 sshd\[10441\]: Failed password for invalid user admin9 from 217.182.252.30 port 34640 ssh2
2020-09-20 17:48:26
142.93.57.255 attackspambots
Sep 20 10:24:54 rocket sshd[11164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.57.255
Sep 20 10:24:56 rocket sshd[11164]: Failed password for invalid user demouser from 142.93.57.255 port 49590 ssh2
...
2020-09-20 17:48:00

最近上报的IP列表

133.159.73.128 178.242.112.82 90.106.37.233 234.28.16.94
74.152.6.106 139.30.167.219 163.235.250.30 127.92.195.223
65.216.88.67 13.175.139.190 20.177.112.71 67.111.213.173
44.202.32.194 22.5.3.148 114.235.196.126 25.7.152.88
108.145.76.71 200.22.147.182 72.76.117.146 47.156.113.62