必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.130.92.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.130.92.240.			IN	A

;; AUTHORITY SECTION:
.			122	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030302 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 11:45:29 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 240.92.130.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 240.92.130.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.229.168.153 attackbotsspam
[Wed Jul 08 22:34:52.788647 2020] [:error] [pid 6639:tid 140046025082624] [client 46.229.168.153:26558] [client 46.229.168.153] ModSecurity: Access denied with code 403 (phase 4). Pattern match "^5\\\\d{2}$" at RESPONSE_STATUS. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/RESPONSE-950-DATA-LEAKAGES.conf"] [line "118"] [id "950100"] [msg "The Application Returned a 500-Level Status Code"] [data "Matched Data: 500 found within RESPONSE_STATUS: 500"] [severity "ERROR"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-disclosure"] [tag "WASCTC/WASC-13"] [tag "OWASP_TOP_10/A6"] [tag "PCI/6.5.6"] [tag "paranoia-level/2"] [hostname "karangploso.jatim.bmkg.go.id"] [uri "/index.php/prakiraan-iklim/agroklimatologi/kalender-tanam/3707-kalender-tanam-katam-terpadu-pulau-kalimantan/kalender-tanam-katam-terpadu-provinsi-kalimantan-barat/kalender-tanam-katam-terpadu-kabupaten-mempawah-provinsi-kalimantan-barat/kalender-tanam-kat
...
2020-07-09 03:27:18
222.186.180.41 attackbots
Jul  8 20:56:41 ajax sshd[1696]: Failed password for root from 222.186.180.41 port 62704 ssh2
Jul  8 20:56:45 ajax sshd[1696]: Failed password for root from 222.186.180.41 port 62704 ssh2
2020-07-09 03:59:17
220.85.104.202 attackbotsspam
Jul  8 20:07:43 ovpn sshd\[16105\]: Invalid user amsftp from 220.85.104.202
Jul  8 20:07:43 ovpn sshd\[16105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.85.104.202
Jul  8 20:07:45 ovpn sshd\[16105\]: Failed password for invalid user amsftp from 220.85.104.202 port 55210 ssh2
Jul  8 20:12:58 ovpn sshd\[17463\]: Invalid user austin from 220.85.104.202
Jul  8 20:12:58 ovpn sshd\[17463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.85.104.202
2020-07-09 03:48:09
162.243.144.135 attack
[Fri May 22 12:05:53 2020] - DDoS Attack From IP: 162.243.144.135 Port: 56644
2020-07-09 03:46:17
120.53.9.188 attack
Jul  8 19:49:19 sshgateway sshd\[9046\]: Invalid user qemu from 120.53.9.188
Jul  8 19:49:19 sshgateway sshd\[9046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.9.188
Jul  8 19:49:21 sshgateway sshd\[9046\]: Failed password for invalid user qemu from 120.53.9.188 port 33970 ssh2
2020-07-09 03:28:40
112.85.42.195 attackbots
Jul  8 19:45:00 onepixel sshd[710501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
Jul  8 19:45:02 onepixel sshd[710501]: Failed password for root from 112.85.42.195 port 10569 ssh2
Jul  8 19:45:00 onepixel sshd[710501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.195  user=root
Jul  8 19:45:02 onepixel sshd[710501]: Failed password for root from 112.85.42.195 port 10569 ssh2
Jul  8 19:45:05 onepixel sshd[710501]: Failed password for root from 112.85.42.195 port 10569 ssh2
2020-07-09 03:51:32
197.211.51.58 attackspam
TCP Port Scanning
2020-07-09 03:45:20
212.29.219.12 attack
Unauthorized connection attempt detected from IP address 212.29.219.12 to port 23
2020-07-09 03:25:54
203.83.20.65 attack
20/7/8@07:44:26: FAIL: Alarm-Network address from=203.83.20.65
20/7/8@07:44:26: FAIL: Alarm-Network address from=203.83.20.65
...
2020-07-09 03:45:52
163.172.178.167 attackspam
2020-07-08T12:08:01.919133randservbullet-proofcloud-66.localdomain sshd[26500]: Invalid user recruitment from 163.172.178.167 port 39978
2020-07-08T12:08:01.926979randservbullet-proofcloud-66.localdomain sshd[26500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.178.167
2020-07-08T12:08:01.919133randservbullet-proofcloud-66.localdomain sshd[26500]: Invalid user recruitment from 163.172.178.167 port 39978
2020-07-08T12:08:03.884662randservbullet-proofcloud-66.localdomain sshd[26500]: Failed password for invalid user recruitment from 163.172.178.167 port 39978 ssh2
...
2020-07-09 03:58:26
68.183.86.198 attackbotsspam
[Fri May 22 20:30:06 2020] - DDoS Attack From IP: 68.183.86.198 Port: 46934
2020-07-09 03:42:59
187.163.123.34 attackspambots
Automatic report - Port Scan Attack
2020-07-09 03:35:41
78.128.113.114 attackbots
Jul  8 21:33:18 web1 postfix/smtpd\[7847\]: warning: unknown\[78.128.113.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 21:33:36 web1 postfix/smtpd\[7946\]: warning: unknown\[78.128.113.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 21:38:17 web1 postfix/smtpd\[10473\]: warning: unknown\[78.128.113.114\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-09 03:39:13
218.92.0.223 attackspambots
2020-07-08T21:30:47.182776vps773228.ovh.net sshd[661]: Failed password for root from 218.92.0.223 port 13017 ssh2
2020-07-08T21:30:50.554000vps773228.ovh.net sshd[661]: Failed password for root from 218.92.0.223 port 13017 ssh2
2020-07-08T21:30:54.771348vps773228.ovh.net sshd[661]: Failed password for root from 218.92.0.223 port 13017 ssh2
2020-07-08T21:30:58.246803vps773228.ovh.net sshd[661]: Failed password for root from 218.92.0.223 port 13017 ssh2
2020-07-08T21:31:01.463958vps773228.ovh.net sshd[661]: Failed password for root from 218.92.0.223 port 13017 ssh2
...
2020-07-09 03:32:45
46.38.148.2 attackbots
387 times SMTP brute-force
2020-07-09 03:50:13

最近上报的IP列表

104.131.113.134 104.131.118.196 104.131.111.110 104.131.132.222
104.130.92.207 104.131.123.148 104.131.159.81 104.131.156.181
104.131.138.176 104.130.255.189 104.131.169.83 112.66.108.159
104.131.172.198 104.131.171.78 104.131.178.20 104.131.241.208
104.131.186.81 104.131.241.32 104.131.22.155 104.131.3.86