必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.100.139.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.100.139.231.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 00:01:09 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
231.139.100.104.in-addr.arpa domain name pointer a104-100-139-231.deploy.static.akamaitechnologies.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
231.139.100.104.in-addr.arpa	name = a104-100-139-231.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.77.146.50 attackspam
Dec 10 06:06:14 lamijardin sshd[32306]: Invalid user zliu from 45.77.146.50
Dec 10 06:06:14 lamijardin sshd[32306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.77.146.50
Dec 10 06:06:16 lamijardin sshd[32306]: Failed password for invalid user zliu from 45.77.146.50 port 36962 ssh2
Dec 10 06:06:16 lamijardin sshd[32306]: Received disconnect from 45.77.146.50 port 36962:11: Bye Bye [preauth]
Dec 10 06:06:16 lamijardin sshd[32306]: Disconnected from 45.77.146.50 port 36962 [preauth]
Dec 10 06:17:47 lamijardin sshd[32500]: Invalid user vida from 45.77.146.50
Dec 10 06:17:47 lamijardin sshd[32500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.77.146.50
Dec 10 06:17:49 lamijardin sshd[32500]: Failed password for invalid user vida from 45.77.146.50 port 55660 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.77.146.50
2019-12-10 22:09:21
104.28.1.16 attack
23/tcp
[2019-12-10]1pkt
2019-12-10 22:06:33
51.89.57.123 attackspam
--- report ---
Dec 10 06:19:34 sshd: Connection from 51.89.57.123 port 47596
Dec 10 06:19:35 sshd: Invalid user josafa from 51.89.57.123
Dec 10 06:19:36 sshd: Failed password for invalid user josafa from 51.89.57.123 port 47596 ssh2
Dec 10 06:19:36 sshd: Received disconnect from 51.89.57.123: 11: Bye Bye [preauth]
2019-12-10 21:46:20
223.25.101.74 attackbotsspam
Dec 10 13:34:09 cp sshd[19644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.25.101.74
Dec 10 13:34:09 cp sshd[19644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.25.101.74
2019-12-10 22:10:23
136.35.217.7 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-10 22:03:56
127.0.0.1 attack
Test Connectivity
2019-12-10 21:51:02
101.91.217.94 attackbots
Invalid user sergo from 101.91.217.94 port 57020
2019-12-10 22:04:14
219.90.67.89 attack
Dec 10 03:52:33 php1 sshd\[8832\]: Invalid user niven from 219.90.67.89
Dec 10 03:52:33 php1 sshd\[8832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.90.67.89
Dec 10 03:52:35 php1 sshd\[8832\]: Failed password for invalid user niven from 219.90.67.89 port 41218 ssh2
Dec 10 03:59:06 php1 sshd\[9488\]: Invalid user megafile from 219.90.67.89
Dec 10 03:59:06 php1 sshd\[9488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.90.67.89
2019-12-10 21:59:45
212.220.105.94 attack
2019-12-10T13:08:08.449282abusebot.cloudsearch.cf sshd\[9842\]: Invalid user cacti from 212.220.105.94 port 31139
2019-12-10 21:42:57
128.199.247.115 attackbots
$f2bV_matches
2019-12-10 22:19:42
92.118.37.61 attackbotsspam
12/10/2019-08:46:10.087331 92.118.37.61 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-10 22:01:18
115.84.112.98 attackbotsspam
$f2bV_matches
2019-12-10 21:39:29
13.228.107.58 attackspambots
Dec 10 15:00:18 mail sshd\[20187\]: Invalid user max from 13.228.107.58
Dec 10 15:00:18 mail sshd\[20187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.228.107.58
Dec 10 15:00:20 mail sshd\[20187\]: Failed password for invalid user max from 13.228.107.58 port 42778 ssh2
...
2019-12-10 22:09:56
103.111.56.168 attackbotsspam
Unauthorized connection attempt detected from IP address 103.111.56.168 to port 445
2019-12-10 22:06:55
138.197.145.26 attack
Dec 10 02:14:32 auw2 sshd\[559\]: Invalid user abcdefghij from 138.197.145.26
Dec 10 02:14:32 auw2 sshd\[559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.26
Dec 10 02:14:34 auw2 sshd\[559\]: Failed password for invalid user abcdefghij from 138.197.145.26 port 37754 ssh2
Dec 10 02:20:21 auw2 sshd\[1203\]: Invalid user resolvando from 138.197.145.26
Dec 10 02:20:21 auw2 sshd\[1203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.26
2019-12-10 22:14:08

最近上报的IP列表

200.88.48.13 129.193.17.219 32.196.150.8 21.126.211.89
251.245.86.142 73.127.219.74 122.43.92.115 91.244.132.245
168.133.89.168 193.183.20.80 195.66.210.37 63.30.96.24
125.99.162.106 223.242.62.116 104.15.49.64 148.127.206.159
172.46.97.30 201.21.156.119 221.120.53.127 50.255.99.86