必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.107.12.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.107.12.145.			IN	A

;; AUTHORITY SECTION:
.			329	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:19:00 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
145.12.107.104.in-addr.arpa domain name pointer a104-107-12-145.deploy.static.akamaitechnologies.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.12.107.104.in-addr.arpa	name = a104-107-12-145.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.207.184.179 attackbots
Dec  2 22:46:22 hanapaa sshd\[20681\]: Invalid user eutsler from 41.207.184.179
Dec  2 22:46:22 hanapaa sshd\[20681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.184.179
Dec  2 22:46:24 hanapaa sshd\[20681\]: Failed password for invalid user eutsler from 41.207.184.179 port 56505 ssh2
Dec  2 22:53:29 hanapaa sshd\[21325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.207.184.179  user=news
Dec  2 22:53:31 hanapaa sshd\[21325\]: Failed password for news from 41.207.184.179 port 33896 ssh2
2019-12-03 17:03:08
222.186.180.9 attackspambots
k+ssh-bruteforce
2019-12-03 17:26:53
51.159.7.65 attackspambots
Port 22 Scan, PTR: None
2019-12-03 17:37:01
185.143.223.183 attackbots
2019-12-03T10:06:54.224863+01:00 lumpi kernel: [653971.501518] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.183 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=20302 PROTO=TCP SPT=59345 DPT=12843 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-03 17:37:41
151.80.155.98 attackbots
2019-12-03T09:20:22.694565  sshd[8290]: Invalid user admin1 from 151.80.155.98 port 58236
2019-12-03T09:20:22.708958  sshd[8290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.155.98
2019-12-03T09:20:22.694565  sshd[8290]: Invalid user admin1 from 151.80.155.98 port 58236
2019-12-03T09:20:24.609238  sshd[8290]: Failed password for invalid user admin1 from 151.80.155.98 port 58236 ssh2
2019-12-03T09:25:48.591884  sshd[8351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.155.98  user=root
2019-12-03T09:25:50.913605  sshd[8351]: Failed password for root from 151.80.155.98 port 41056 ssh2
...
2019-12-03 17:30:50
216.10.249.73 attackbotsspam
Dec  3 09:34:48 lnxweb62 sshd[30606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.10.249.73
2019-12-03 17:23:25
212.64.40.35 attack
Dec  3 11:39:52 server sshd\[31440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.40.35  user=root
Dec  3 11:39:53 server sshd\[31440\]: Failed password for root from 212.64.40.35 port 53016 ssh2
Dec  3 11:54:21 server sshd\[2631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.40.35  user=root
Dec  3 11:54:23 server sshd\[2631\]: Failed password for root from 212.64.40.35 port 36750 ssh2
Dec  3 12:02:05 server sshd\[4814\]: Invalid user karpini from 212.64.40.35
Dec  3 12:02:05 server sshd\[4814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.40.35 
...
2019-12-03 17:21:09
218.92.0.193 attackbotsspam
Dec  3 10:32:15 tux-35-217 sshd\[15841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.193  user=root
Dec  3 10:32:17 tux-35-217 sshd\[15841\]: Failed password for root from 218.92.0.193 port 47097 ssh2
Dec  3 10:32:21 tux-35-217 sshd\[15841\]: Failed password for root from 218.92.0.193 port 47097 ssh2
Dec  3 10:32:25 tux-35-217 sshd\[15841\]: Failed password for root from 218.92.0.193 port 47097 ssh2
...
2019-12-03 17:34:04
118.114.244.27 attackspam
Dec  2 01:59:19 reporting2 sshd[12145]: User r.r from 118.114.244.27 not allowed because not listed in AllowUsers
Dec  2 01:59:19 reporting2 sshd[12145]: Failed password for invalid user r.r from 118.114.244.27 port 29726 ssh2
Dec  2 02:07:56 reporting2 sshd[17421]: Invalid user apache from 118.114.244.27
Dec  2 02:07:56 reporting2 sshd[17421]: Failed password for invalid user apache from 118.114.244.27 port 15241 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=118.114.244.27
2019-12-03 17:11:30
122.228.89.95 attackspambots
Dec  3 10:05:38 sd-53420 sshd\[23384\]: User gdm from 122.228.89.95 not allowed because none of user's groups are listed in AllowGroups
Dec  3 10:05:38 sd-53420 sshd\[23384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.228.89.95  user=gdm
Dec  3 10:05:41 sd-53420 sshd\[23384\]: Failed password for invalid user gdm from 122.228.89.95 port 29403 ssh2
Dec  3 10:13:14 sd-53420 sshd\[24730\]: Invalid user mse from 122.228.89.95
Dec  3 10:13:14 sd-53420 sshd\[24730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.228.89.95
...
2019-12-03 17:33:19
112.85.42.174 attack
Dec  2 23:18:41 hanapaa sshd\[23609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Dec  2 23:18:42 hanapaa sshd\[23609\]: Failed password for root from 112.85.42.174 port 19469 ssh2
Dec  2 23:18:46 hanapaa sshd\[23609\]: Failed password for root from 112.85.42.174 port 19469 ssh2
Dec  2 23:19:00 hanapaa sshd\[23643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Dec  2 23:19:02 hanapaa sshd\[23643\]: Failed password for root from 112.85.42.174 port 52155 ssh2
2019-12-03 17:19:59
107.189.10.231 attackbotsspam
Dec  3 09:44:38 hosting sshd[29360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.10.231  user=root
Dec  3 09:44:39 hosting sshd[29360]: Failed password for root from 107.189.10.231 port 54047 ssh2
Dec  3 09:44:40 hosting sshd[29363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.10.231  user=root
Dec  3 09:44:42 hosting sshd[29363]: Failed password for root from 107.189.10.231 port 55498 ssh2
Dec  3 09:44:44 hosting sshd[29366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.189.10.231  user=root
Dec  3 09:44:46 hosting sshd[29366]: Failed password for root from 107.189.10.231 port 57128 ssh2
...
2019-12-03 17:31:33
185.164.72.238 attackspambots
Dec  3 09:40:16 dev0-dcde-rnet sshd[30668]: Failed password for root from 185.164.72.238 port 44504 ssh2
Dec  3 09:46:21 dev0-dcde-rnet sshd[30733]: Failed password for root from 185.164.72.238 port 55878 ssh2
Dec  3 09:52:20 dev0-dcde-rnet sshd[30783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.164.72.238
2019-12-03 17:22:49
15.164.165.35 attackbots
Dec  3 09:03:21 icinga sshd[11920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=15.164.165.35
Dec  3 09:03:23 icinga sshd[11920]: Failed password for invalid user durand from 15.164.165.35 port 40012 ssh2
...
2019-12-03 17:03:23
139.59.9.234 attackbotsspam
2019-12-03T08:57:09.578800abusebot-6.cloudsearch.cf sshd\[7482\]: Invalid user suchi from 139.59.9.234 port 51012
2019-12-03 17:24:03

最近上报的IP列表

104.107.12.138 104.107.14.167 104.107.15.106 104.107.2.202
104.16.129.71 104.107.23.193 104.107.2.207 104.107.13.89
104.107.4.157 104.107.4.89 104.107.49.163 104.107.3.97
104.107.24.164 104.107.4.184 104.107.49.184 104.16.13.66
104.107.2.250 104.107.51.118 104.107.5.6 104.107.6.129