必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Atlanta

省份(region): Georgia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.138.18.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6991
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.138.18.20.			IN	A

;; AUTHORITY SECTION:
.			545	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030200 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 02 23:42:10 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
Host 20.18.138.104.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 20.18.138.104.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.203.105.90 attackbots
159.203.105.90 - - [16/Sep/2020:12:05:41 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.105.90 - - [16/Sep/2020:12:05:43 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.203.105.90 - - [16/Sep/2020:12:05:44 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-16 19:13:33
118.89.241.214 attackspam
Sep 16 13:09:57 abendstille sshd\[2127\]: Invalid user rOot.123 from 118.89.241.214
Sep 16 13:09:57 abendstille sshd\[2127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.241.214
Sep 16 13:09:59 abendstille sshd\[2127\]: Failed password for invalid user rOot.123 from 118.89.241.214 port 47009 ssh2
Sep 16 13:14:26 abendstille sshd\[6010\]: Invalid user rawlinson from 118.89.241.214
Sep 16 13:14:26 abendstille sshd\[6010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.241.214
...
2020-09-16 19:22:26
103.136.40.90 attackbotsspam
Sep 16 05:09:00 ny01 sshd[4302]: Failed password for root from 103.136.40.90 port 58984 ssh2
Sep 16 05:12:56 ny01 sshd[4838]: Failed password for root from 103.136.40.90 port 42854 ssh2
2020-09-16 19:20:48
89.203.137.38 attackspam
Sep 16 09:41:18 mail.srvfarm.net postfix/smtps/smtpd[3354983]: warning: unknown[89.203.137.38]: SASL PLAIN authentication failed: 
Sep 16 09:41:18 mail.srvfarm.net postfix/smtps/smtpd[3354983]: lost connection after AUTH from unknown[89.203.137.38]
Sep 16 09:44:07 mail.srvfarm.net postfix/smtpd[3351809]: warning: unknown[89.203.137.38]: SASL PLAIN authentication failed: 
Sep 16 09:44:07 mail.srvfarm.net postfix/smtpd[3351809]: lost connection after AUTH from unknown[89.203.137.38]
Sep 16 09:50:34 mail.srvfarm.net postfix/smtps/smtpd[3354564]: warning: unknown[89.203.137.38]: SASL PLAIN authentication failed:
2020-09-16 18:59:22
193.169.253.27 attack
Sep 16 11:52:18 web01.agentur-b-2.de postfix/smtpd[806628]: warning: unknown[193.169.253.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 16 11:52:18 web01.agentur-b-2.de postfix/smtpd[806628]: lost connection after AUTH from unknown[193.169.253.27]
Sep 16 11:52:35 web01.agentur-b-2.de postfix/smtpd[805756]: warning: unknown[193.169.253.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 16 11:52:35 web01.agentur-b-2.de postfix/smtpd[805756]: lost connection after AUTH from unknown[193.169.253.27]
Sep 16 11:53:25 web01.agentur-b-2.de postfix/smtpd[806628]: warning: unknown[193.169.253.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-16 18:47:58
60.243.148.216 attackbots
Unauthorised access (Sep 15) SRC=60.243.148.216 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=58561 TCP DPT=23 WINDOW=37544 SYN
2020-09-16 19:05:20
77.252.53.108 attackbots
Sep 15 23:21:38 mail.srvfarm.net postfix/smtps/smtpd[2934409]: warning: unknown[77.252.53.108]: SASL PLAIN authentication failed: 
Sep 15 23:21:38 mail.srvfarm.net postfix/smtps/smtpd[2934409]: lost connection after AUTH from unknown[77.252.53.108]
Sep 15 23:22:06 mail.srvfarm.net postfix/smtps/smtpd[2933959]: warning: unknown[77.252.53.108]: SASL PLAIN authentication failed: 
Sep 15 23:22:06 mail.srvfarm.net postfix/smtps/smtpd[2933959]: lost connection after AUTH from unknown[77.252.53.108]
Sep 15 23:24:11 mail.srvfarm.net postfix/smtpd[2932706]: warning: unknown[77.252.53.108]: SASL PLAIN authentication failed:
2020-09-16 18:59:50
36.133.0.37 attackspam
Sep 16 03:54:56 dignus sshd[2861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.0.37  user=root
Sep 16 03:54:58 dignus sshd[2861]: Failed password for root from 36.133.0.37 port 43696 ssh2
Sep 16 03:58:55 dignus sshd[3304]: Invalid user sysadmin from 36.133.0.37 port 40006
Sep 16 03:58:55 dignus sshd[3304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.133.0.37
Sep 16 03:58:58 dignus sshd[3304]: Failed password for invalid user sysadmin from 36.133.0.37 port 40006 ssh2
...
2020-09-16 19:08:23
51.91.91.225 attackspambots
Port scan on 5 port(s): 25560 25561 25562 25564 25565
2020-09-16 19:18:36
193.169.253.138 attack
Email login attempts - bad mail account name (SMTP)
2020-09-16 18:47:33
188.92.209.136 attackbotsspam
Sep 15 18:40:40 mail.srvfarm.net postfix/smtpd[2827692]: warning: unknown[188.92.209.136]: SASL PLAIN authentication failed: 
Sep 15 18:40:41 mail.srvfarm.net postfix/smtpd[2827692]: lost connection after AUTH from unknown[188.92.209.136]
Sep 15 18:45:54 mail.srvfarm.net postfix/smtpd[2825414]: warning: unknown[188.92.209.136]: SASL PLAIN authentication failed: 
Sep 15 18:45:54 mail.srvfarm.net postfix/smtpd[2825414]: lost connection after AUTH from unknown[188.92.209.136]
Sep 15 18:46:41 mail.srvfarm.net postfix/smtpd[2828192]: warning: unknown[188.92.209.136]: SASL PLAIN authentication failed:
2020-09-16 18:49:55
182.16.110.190 attackspam
TCP port : 14404
2020-09-16 19:19:43
181.121.134.55 attackspambots
Sep 16 10:23:59 master sshd[3815]: Failed password for invalid user grid from 181.121.134.55 port 50643 ssh2
Sep 16 10:41:47 master sshd[4631]: Failed password for root from 181.121.134.55 port 34743 ssh2
Sep 16 10:55:03 master sshd[4878]: Failed password for root from 181.121.134.55 port 40856 ssh2
Sep 16 11:07:52 master sshd[5546]: Failed password for root from 181.121.134.55 port 46971 ssh2
Sep 16 11:20:30 master sshd[5917]: Failed password for root from 181.121.134.55 port 53084 ssh2
Sep 16 11:32:58 master sshd[6487]: Failed password for root from 181.121.134.55 port 59197 ssh2
Sep 16 11:45:46 master sshd[6838]: Failed password for root from 181.121.134.55 port 37077 ssh2
Sep 16 11:58:06 master sshd[7087]: Failed password for root from 181.121.134.55 port 43190 ssh2
Sep 16 12:10:52 master sshd[7833]: Failed password for root from 181.121.134.55 port 49303 ssh2
Sep 16 12:23:20 master sshd[8077]: Failed password for root from 181.121.134.55 port 55416 ssh2
2020-09-16 19:19:55
167.249.124.126 attackspambots
Unauthorised access (Sep 15) SRC=167.249.124.126 LEN=52 TTL=107 ID=17420 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-16 19:08:59
187.19.10.220 attackbots
Sep 15 18:36:12 mail.srvfarm.net postfix/smtpd[2805904]: warning: unknown[187.19.10.220]: SASL PLAIN authentication failed: 
Sep 15 18:36:13 mail.srvfarm.net postfix/smtpd[2805904]: lost connection after AUTH from unknown[187.19.10.220]
Sep 15 18:36:46 mail.srvfarm.net postfix/smtps/smtpd[2817591]: warning: unknown[187.19.10.220]: SASL PLAIN authentication failed: 
Sep 15 18:36:46 mail.srvfarm.net postfix/smtps/smtpd[2817591]: lost connection after AUTH from unknown[187.19.10.220]
Sep 15 18:41:02 mail.srvfarm.net postfix/smtps/smtpd[2827818]: warning: unknown[187.19.10.220]: SASL PLAIN authentication failed:
2020-09-16 18:50:59

最近上报的IP列表

78.187.72.183 172.221.23.128 65.255.79.182 61.223.31.49
13.28.205.5 83.168.170.61 136.124.31.122 44.122.148.182
102.231.222.78 63.239.38.56 49.65.228.82 31.212.225.70
135.37.61.225 2.170.123.255 31.206.134.34 163.237.46.241
14.162.47.228 45.165.113.29 48.183.167.239 14.24.172.158