必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Secaucus

省份(region): New Jersey

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.107.50.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.107.50.53.			IN	A

;; AUTHORITY SECTION:
.			420	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010302 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 04 07:13:13 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
53.50.107.104.in-addr.arpa domain name pointer a104-107-50-53.deploy.static.akamaitechnologies.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
53.50.107.104.in-addr.arpa	name = a104-107-50-53.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
66.85.156.75 attackspam
F2B jail: sshd. Time: 2019-11-16 14:19:05, Reported by: VKReport
2019-11-16 21:30:16
113.199.40.202 attackbotsspam
Nov 16 15:54:57 server sshd\[20484\]: Invalid user test from 113.199.40.202
Nov 16 15:54:57 server sshd\[20484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.199.40.202 
Nov 16 15:55:00 server sshd\[20484\]: Failed password for invalid user test from 113.199.40.202 port 41065 ssh2
Nov 16 16:16:31 server sshd\[26221\]: Invalid user vpopmail from 113.199.40.202
Nov 16 16:16:31 server sshd\[26221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.199.40.202 
...
2019-11-16 21:32:16
177.96.64.206 attack
Automatic report - Port Scan Attack
2019-11-16 21:40:36
139.59.94.225 attackspam
(sshd) Failed SSH login from 139.59.94.225 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 16 13:35:09 elude sshd[18997]: Invalid user benjami from 139.59.94.225 port 49240
Nov 16 13:35:11 elude sshd[18997]: Failed password for invalid user benjami from 139.59.94.225 port 49240 ssh2
Nov 16 13:47:50 elude sshd[20935]: Invalid user named from 139.59.94.225 port 47998
Nov 16 13:47:52 elude sshd[20935]: Failed password for invalid user named from 139.59.94.225 port 47998 ssh2
Nov 16 13:51:56 elude sshd[21526]: Invalid user marita from 139.59.94.225 port 56550
2019-11-16 22:11:56
139.99.37.130 attack
Invalid user barit from 139.99.37.130 port 48420
2019-11-16 21:50:11
163.204.32.84 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/163.204.32.84/ 
 
 CN - 1H : (650)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN17816 
 
 IP : 163.204.32.84 
 
 CIDR : 163.204.0.0/16 
 
 PREFIX COUNT : 512 
 
 UNIQUE IP COUNT : 3430656 
 
 
 ATTACKS DETECTED ASN17816 :  
  1H - 2 
  3H - 2 
  6H - 3 
 12H - 6 
 24H - 7 
 
 DateTime : 2019-11-16 14:06:33 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-16 21:35:04
143.202.108.22 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-16 21:39:53
172.245.87.72 attack
US bad_bot
2019-11-16 21:36:50
61.50.123.182 attack
Nov 16 14:20:51 dedicated sshd[4077]: Invalid user shortridge from 61.50.123.182 port 39810
2019-11-16 21:35:47
110.185.160.13 attackspambots
Automatic report - Banned IP Access
2019-11-16 21:55:12
41.33.178.202 attackspambots
Automatic report - Banned IP Access
2019-11-16 21:32:36
90.120.142.165 attackspam
SSH bruteforce (Triggered fail2ban)
2019-11-16 21:34:16
151.106.8.104 attack
(From simpleaudience@mail.ru) https://drive.google.com/file/d/1CQzrol_lodHX4vsSHwY1Nf7ZPX_9VHFV/preview
2019-11-16 21:58:46
62.234.141.48 attackspam
Nov 16 18:52:06 vibhu-HP-Z238-Microtower-Workstation sshd\[23051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.141.48  user=root
Nov 16 18:52:07 vibhu-HP-Z238-Microtower-Workstation sshd\[23051\]: Failed password for root from 62.234.141.48 port 33216 ssh2
Nov 16 18:57:16 vibhu-HP-Z238-Microtower-Workstation sshd\[23378\]: Invalid user home from 62.234.141.48
Nov 16 18:57:16 vibhu-HP-Z238-Microtower-Workstation sshd\[23378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.141.48
Nov 16 18:57:18 vibhu-HP-Z238-Microtower-Workstation sshd\[23378\]: Failed password for invalid user home from 62.234.141.48 port 39222 ssh2
...
2019-11-16 21:28:52
35.137.198.190 attackbotsspam
Bruteforce on SSH Honeypot
2019-11-16 22:02:12

最近上报的IP列表

203.162.207.222 20.200.154.0 196.244.41.17 195.171.31.141
194.94.218.5 190.28.130.233 190.92.88.136 186.117.115.200
186.132.108.170 107.172.158.93 175.243.204.232 174.60.179.117
170.127.42.167 170.148.119.97 164.222.145.47 164.172.150.62
5.172.199.13 158.134.218.137 158.127.171.126 158.189.131.100