必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): Web Hosting Solutions

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspambots
Automatic report - Banned IP Access
2019-09-29 08:11:48
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.119.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.144.119.157.		IN	A

;; AUTHORITY SECTION:
.			315	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092801 1800 900 604800 86400

;; Query time: 107 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 29 08:11:45 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
157.119.144.104.in-addr.arpa domain name pointer noiwsykgdi.antasmatographin.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.119.144.104.in-addr.arpa	name = noiwsykgdi.antasmatographin.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.219.228.122 attackbotsspam
Honeypot attack, port: 5555, PTR: cpe-d830624891fb.cpe.cableonda.net.
2020-03-19 00:15:54
85.105.196.192 attack
port scan and connect, tcp 23 (telnet)
2020-03-18 23:56:48
202.131.152.2 attackbotsspam
SSH invalid-user multiple login try
2020-03-19 00:27:01
79.6.211.125 attackspambots
scan r
2020-03-19 00:35:58
200.89.174.209 attackbotsspam
Mar 18 07:51:40 server1 sshd\[1639\]: Failed password for root from 200.89.174.209 port 38630 ssh2
Mar 18 07:55:27 server1 sshd\[2662\]: Invalid user fujimura from 200.89.174.209
Mar 18 07:55:27 server1 sshd\[2662\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.174.209 
Mar 18 07:55:28 server1 sshd\[2662\]: Failed password for invalid user fujimura from 200.89.174.209 port 35388 ssh2
Mar 18 07:59:16 server1 sshd\[4043\]: Invalid user liwenxuan from 200.89.174.209
Mar 18 07:59:16 server1 sshd\[4043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.174.209 
...
2020-03-19 00:27:32
198.108.66.25 attack
firewall-block, port(s): 8883/tcp
2020-03-19 00:10:02
203.218.245.184 attackspambots
firewall-block, port(s): 23/tcp
2020-03-19 00:07:18
51.75.141.202 attackspam
k+ssh-bruteforce
2020-03-19 00:39:20
50.67.57.48 attackbotsspam
Honeypot attack, port: 5555, PTR: S0106589630d2ea5b.vs.shawcable.net.
2020-03-19 00:43:58
123.207.153.52 attackbots
Mar 18 14:06:54 ns381471 sshd[460]: Failed password for root from 123.207.153.52 port 58532 ssh2
Mar 18 14:09:45 ns381471 sshd[727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.153.52
2020-03-19 00:49:35
41.38.17.134 attack
Honeypot attack, port: 81, PTR: host-41.38.17.134.tedata.net.
2020-03-19 00:05:44
119.29.121.229 attackspambots
Mar 18 14:04:47 jane sshd[25955]: Failed password for root from 119.29.121.229 port 54754 ssh2
...
2020-03-19 00:15:01
169.51.66.212 attackbotsspam
[MK-Root1] Blocked by UFW
2020-03-19 00:47:53
8.14.149.127 attackspam
Mar 18 14:03:55 xeon sshd[31131]: Failed password for root from 8.14.149.127 port 65017 ssh2
2020-03-19 00:30:21
27.78.100.224 attackbotsspam
Automatic report - Port Scan Attack
2020-03-19 00:41:42

最近上报的IP列表

37.17.173.39 37.223.10.130 97.104.39.235 189.234.83.239
154.16.206.28 188.130.189.127 140.143.54.238 117.5.42.195
74.229.137.154 197.59.43.89 178.20.242.47 138.117.162.86
89.168.169.144 45.80.149.59 80.64.203.244 106.53.90.75
138.97.146.3 100.147.203.124 2.180.141.132 144.154.120.166