必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.109.145.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.109.145.70.			IN	A

;; AUTHORITY SECTION:
.			109	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 13:44:01 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
70.145.109.104.in-addr.arpa domain name pointer a104-109-145-70.deploy.static.akamaitechnologies.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.145.109.104.in-addr.arpa	name = a104-109-145-70.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.89.229.244 attackspambots
Jul 10 21:34:52 mail sshd[29710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.229.244  user=ftp
Jul 10 21:34:54 mail sshd[29710]: Failed password for ftp from 159.89.229.244 port 52010 ssh2
Jul 10 21:37:43 mail sshd[30070]: Invalid user deploy from 159.89.229.244
Jul 10 21:37:43 mail sshd[30070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.229.244
Jul 10 21:37:43 mail sshd[30070]: Invalid user deploy from 159.89.229.244
Jul 10 21:37:45 mail sshd[30070]: Failed password for invalid user deploy from 159.89.229.244 port 59226 ssh2
...
2019-07-11 06:14:07
103.236.253.27 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-07-11 06:01:10
103.242.175.78 attackbotsspam
SSH Brute Force, server-1 sshd[19012]: Failed password for invalid user cmsuser from 103.242.175.78 port 6745 ssh2
2019-07-11 06:22:04
88.26.236.2 attack
2019-07-10T22:08:48.532516abusebot-8.cloudsearch.cf sshd\[19933\]: Invalid user test from 88.26.236.2 port 47036
2019-07-11 06:15:02
37.59.38.137 attack
Jul 10 21:03:11 minden010 sshd[9502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.38.137
Jul 10 21:03:14 minden010 sshd[9502]: Failed password for invalid user alex from 37.59.38.137 port 56825 ssh2
Jul 10 21:05:39 minden010 sshd[10343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.38.137
...
2019-07-11 05:56:57
201.82.45.3 attackbotsspam
Jul 11 00:21:20 herz-der-gamer sshd[15549]: Failed password for invalid user roo from 201.82.45.3 port 45052 ssh2
...
2019-07-11 06:23:27
36.78.252.67 attackbotsspam
Unauthorized connection attempt from IP address 36.78.252.67 on Port 445(SMB)
2019-07-11 06:39:48
159.224.93.3 attackspambots
proto=tcp  .  spt=32910  .  dpt=25  .     (listed on Dark List de Jul 10)     (576)
2019-07-11 06:42:05
139.199.221.240 attack
Jul 10 21:36:37 herz-der-gamer sshd[10441]: Failed password for invalid user admin from 139.199.221.240 port 36414 ssh2
...
2019-07-11 06:08:47
67.205.167.142 attackspambots
Jul 11 02:43:18 vibhu-HP-Z238-Microtower-Workstation sshd\[24499\]: Invalid user tatiana from 67.205.167.142
Jul 11 02:43:18 vibhu-HP-Z238-Microtower-Workstation sshd\[24499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.167.142
Jul 11 02:43:21 vibhu-HP-Z238-Microtower-Workstation sshd\[24499\]: Failed password for invalid user tatiana from 67.205.167.142 port 52268 ssh2
Jul 11 02:45:56 vibhu-HP-Z238-Microtower-Workstation sshd\[24980\]: Invalid user angel from 67.205.167.142
Jul 11 02:45:56 vibhu-HP-Z238-Microtower-Workstation sshd\[24980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.167.142
...
2019-07-11 06:24:52
95.58.73.167 attackbotsspam
Unauthorized connection attempt from IP address 95.58.73.167 on Port 445(SMB)
2019-07-11 06:38:29
3.219.9.144 attack
xmlrpc attack
2019-07-11 06:04:31
159.65.162.182 attackspambots
Jul 10 23:25:58 * sshd[5295]: Failed password for root from 159.65.162.182 port 35658 ssh2
2019-07-11 06:02:10
218.92.0.155 attack
Jul 10 23:09:02 Ubuntu-1404-trusty-64-minimal sshd\[7443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.155  user=root
Jul 10 23:09:04 Ubuntu-1404-trusty-64-minimal sshd\[7443\]: Failed password for root from 218.92.0.155 port 36890 ssh2
Jul 10 23:09:07 Ubuntu-1404-trusty-64-minimal sshd\[7443\]: Failed password for root from 218.92.0.155 port 36890 ssh2
Jul 10 23:09:10 Ubuntu-1404-trusty-64-minimal sshd\[7443\]: Failed password for root from 218.92.0.155 port 36890 ssh2
Jul 10 23:09:14 Ubuntu-1404-trusty-64-minimal sshd\[7443\]: Failed password for root from 218.92.0.155 port 36890 ssh2
2019-07-11 05:59:41
182.254.147.219 attackbotsspam
Invalid user atlbitbucket from 182.254.147.219 port 47052
2019-07-11 06:24:13

最近上报的IP列表

104.107.9.136 104.109.150.100 104.107.10.184 104.107.7.6
104.107.7.97 104.109.157.132 104.109.156.20 104.236.205.169
104.112.235.242 104.112.235.217 104.112.39.151 104.114.165.91
104.112.246.186 104.117.33.176 104.125.74.73 104.126.112.166
104.236.206.196 104.127.174.174 104.236.206.239 104.236.206.43