必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.104.204.244 attackbots
Invalid user fs from 103.104.204.244 port 43442
2020-04-21 23:53:29
103.104.204.244 attack
Invalid user fs from 103.104.204.244 port 43442
2020-04-20 20:42:20
103.104.204.244 attack
Mar 30 15:52:48 host sshd[31649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.204.244  user=root
Mar 30 15:52:50 host sshd[31649]: Failed password for root from 103.104.204.244 port 45622 ssh2
...
2020-03-31 04:15:56
103.104.204.244 attack
Mar 22 19:51:27 markkoudstaal sshd[22792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.204.244
Mar 22 19:51:29 markkoudstaal sshd[22792]: Failed password for invalid user oracle from 103.104.204.244 port 56236 ssh2
Mar 22 19:55:28 markkoudstaal sshd[23371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.204.244
2020-03-23 03:05:19
103.104.204.244 attackbotsspam
Mar 13 10:34:08 DAAP sshd[3497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.204.244  user=root
Mar 13 10:34:11 DAAP sshd[3497]: Failed password for root from 103.104.204.244 port 60434 ssh2
Mar 13 10:39:06 DAAP sshd[3614]: Invalid user tf2 from 103.104.204.244 port 40024
Mar 13 10:39:06 DAAP sshd[3614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.204.244
Mar 13 10:39:06 DAAP sshd[3614]: Invalid user tf2 from 103.104.204.244 port 40024
Mar 13 10:39:08 DAAP sshd[3614]: Failed password for invalid user tf2 from 103.104.204.244 port 40024 ssh2
...
2020-03-13 18:15:29
103.104.204.244 attackbotsspam
Mar  6 22:26:57 Ubuntu-1404-trusty-64-minimal sshd\[2336\]: Invalid user steam from 103.104.204.244
Mar  6 22:26:57 Ubuntu-1404-trusty-64-minimal sshd\[2336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.204.244
Mar  6 22:26:59 Ubuntu-1404-trusty-64-minimal sshd\[2336\]: Failed password for invalid user steam from 103.104.204.244 port 36676 ssh2
Mar  6 22:30:38 Ubuntu-1404-trusty-64-minimal sshd\[9717\]: Invalid user postgres from 103.104.204.244
Mar  6 22:30:38 Ubuntu-1404-trusty-64-minimal sshd\[9717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.204.244
2020-03-07 05:52:24
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.104.204.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.104.204.129.		IN	A

;; AUTHORITY SECTION:
.			202	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 16:06:52 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
129.204.104.103.in-addr.arpa domain name pointer 5mb.co.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
129.204.104.103.in-addr.arpa	name = 5mb.co.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
220.93.239.104 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-05 07:06:36
68.183.22.85 attackspambots
Unauthorized connection attempt detected from IP address 68.183.22.85 to port 2220 [J]
2020-02-05 07:01:10
190.37.126.39 attack
Honeypot attack, port: 5555, PTR: 190-37-126-39.dyn.dsl.cantv.net.
2020-02-05 07:09:02
222.133.164.71 attack
scan z
2020-02-05 07:20:26
188.75.16.163 attack
Unauthorized connection attempt detected from IP address 188.75.16.163 to port 1433 [J]
2020-02-05 07:35:02
2.36.136.146 attackbots
Feb  4 17:52:07 plusreed sshd[30629]: Invalid user benjamin from 2.36.136.146
...
2020-02-05 07:05:12
50.63.196.179 attack
/old/wp-admin/
2020-02-05 07:01:28
79.31.232.23 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-02-05 07:04:27
80.48.68.201 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-02-05 06:59:41
124.127.185.178 attackbotsspam
Unauthorized connection attempt detected from IP address 124.127.185.178 to port 2220 [J]
2020-02-05 07:36:59
92.63.194.115 attack
02/04/2020-17:51:46.955591 92.63.194.115 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-02-05 07:31:06
183.230.82.6 attack
Rude login attack (17 tries in 1d)
2020-02-05 07:33:07
206.189.138.173 attackspambots
Unauthorized connection attempt detected from IP address 206.189.138.173 to port 2220 [J]
2020-02-05 07:07:07
211.253.10.96 attack
Feb  4 20:13:11 goofy sshd\[7268\]: Invalid user qi from 211.253.10.96
Feb  4 20:13:11 goofy sshd\[7268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.10.96
Feb  4 20:13:13 goofy sshd\[7268\]: Failed password for invalid user qi from 211.253.10.96 port 56592 ssh2
Feb  4 20:18:15 goofy sshd\[7538\]: Invalid user goeglein from 211.253.10.96
Feb  4 20:18:15 goofy sshd\[7538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.10.96
2020-02-05 07:16:12
60.29.31.194 attack
Rude login attack (14 tries in 1d)
2020-02-05 07:24:20

最近上报的IP列表

103.104.195.182 1.163.32.218 103.104.204.17 103.104.204.161
103.104.204.193 103.104.204.217 103.104.204.234 103.104.204.241
103.104.204.33 103.104.204.41 103.104.204.48 1.163.32.241
103.104.204.81 103.104.204.97 103.104.204.53 103.104.204.85
103.104.204.61 103.104.206.18 103.104.210.53 103.104.211.133