必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Karlsborg

省份(region): Västra Götaland

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Karlsborgs Energi

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.68.117.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56344
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;80.68.117.5.			IN	A

;; AUTHORITY SECTION:
.			982	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081502 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 16 02:16:10 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
5.117.68.80.in-addr.arpa domain name pointer 80.68.117.5.karlsborgsenergi.se.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
5.117.68.80.in-addr.arpa	name = 80.68.117.5.karlsborgsenergi.se.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.16.223.10 attackspambots
1590478355 - 05/26/2020 09:32:35 Host: 123.16.223.10/123.16.223.10 Port: 445 TCP Blocked
2020-05-26 16:48:09
14.185.189.85 attack
Unauthorized connection attempt from IP address 14.185.189.85 on Port 445(SMB)
2020-05-26 16:58:10
103.58.116.198 attackspambots
Unauthorized connection attempt from IP address 103.58.116.198 on Port 445(SMB)
2020-05-26 16:35:29
14.229.145.82 attackspam
Unauthorized connection attempt from IP address 14.229.145.82 on Port 445(SMB)
2020-05-26 16:19:29
218.161.0.190 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 16:46:22
185.110.20.116 attack
May 26 09:32:52 debian-2gb-nbg1-2 kernel: \[12737171.901514\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.110.20.116 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=49 ID=56564 PROTO=TCP SPT=52940 DPT=8000 WINDOW=31154 RES=0x00 SYN URGP=0
2020-05-26 16:24:07
162.14.10.158 attack
ICMP MH Probe, Scan /Distributed -
2020-05-26 16:34:31
106.13.90.133 attackspambots
2020-05-26T02:32:47.555584morrigan.ad5gb.com sshd[16721]: Invalid user rpm from 106.13.90.133 port 56164
2020-05-26T02:32:49.508410morrigan.ad5gb.com sshd[16721]: Failed password for invalid user rpm from 106.13.90.133 port 56164 ssh2
2020-05-26T02:32:50.746739morrigan.ad5gb.com sshd[16721]: Disconnected from invalid user rpm 106.13.90.133 port 56164 [preauth]
2020-05-26 16:26:23
178.237.0.229 attackbotsspam
May 26 02:28:14 server1 sshd\[4598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.237.0.229  user=root
May 26 02:28:16 server1 sshd\[4598\]: Failed password for root from 178.237.0.229 port 45136 ssh2
May 26 02:32:12 server1 sshd\[7344\]: Invalid user anish from 178.237.0.229
May 26 02:32:12 server1 sshd\[7344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.237.0.229 
May 26 02:32:14 server1 sshd\[7344\]: Failed password for invalid user anish from 178.237.0.229 port 52544 ssh2
...
2020-05-26 16:47:46
115.74.250.176 attackbotsspam
Unauthorized connection attempt from IP address 115.74.250.176 on Port 445(SMB)
2020-05-26 16:43:19
111.255.6.116 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-26 16:29:53
162.14.0.87 attackbotsspam
ICMP MH Probe, Scan /Distributed -
2020-05-26 16:42:51
80.211.45.85 attackbotsspam
Brute-force attempt banned
2020-05-26 16:42:09
161.202.18.11 attack
ICMP MH Probe, Scan /Distributed -
2020-05-26 16:53:49
194.61.55.164 attackspam
May 26 11:06:20 pkdns2 sshd\[47414\]: Invalid user admin from 194.61.55.164May 26 11:06:23 pkdns2 sshd\[47414\]: Failed password for invalid user admin from 194.61.55.164 port 38101 ssh2May 26 11:06:23 pkdns2 sshd\[47416\]: Invalid user admin from 194.61.55.164May 26 11:06:25 pkdns2 sshd\[47416\]: Failed password for invalid user admin from 194.61.55.164 port 39379 ssh2May 26 11:06:25 pkdns2 sshd\[47418\]: Invalid user admin from 194.61.55.164May 26 11:06:28 pkdns2 sshd\[47418\]: Failed password for invalid user admin from 194.61.55.164 port 40384 ssh2
...
2020-05-26 16:31:33

最近上报的IP列表

60.75.125.66 3.204.12.194 83.81.4.187 83.248.56.164
179.51.34.4 81.171.81.230 115.167.45.161 153.97.24.226
118.25.79.17 49.249.47.133 24.230.50.230 112.174.218.191
106.8.214.73 58.200.23.86 166.72.225.94 185.6.212.252
36.160.234.83 62.197.230.19 117.126.70.98 1.104.97.175