必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.189.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.189.12.			IN	A

;; AUTHORITY SECTION:
.			222	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 26 00:41:45 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 12.189.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.189.144.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.114.48.4 attackbotsspam
Aug 28 18:09:12 vps647732 sshd[26706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.114.48.4
Aug 28 18:09:14 vps647732 sshd[26706]: Failed password for invalid user deva from 103.114.48.4 port 56854 ssh2
...
2019-08-29 00:13:58
194.36.191.80 attackspambots
Aug 28 16:25:12 this_host sshd[24993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.36.191.80  user=r.r
Aug 28 16:25:15 this_host sshd[24993]: Failed password for r.r from 194.36.191.80 port 59773 ssh2
Aug 28 16:25:15 this_host sshd[24993]: Received disconnect from 194.36.191.80: 11: Bye Bye [preauth]
Aug 28 16:48:05 this_host sshd[25808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.36.191.80  user=r.r
Aug 28 16:48:07 this_host sshd[25808]: Failed password for r.r from 194.36.191.80 port 35781 ssh2
Aug 28 16:48:07 this_host sshd[25808]: Received disconnect from 194.36.191.80: 11: Bye Bye [preauth]
Aug 28 16:48:15 this_host sshd[25810]: Invalid user admin from 194.36.191.80
Aug 28 16:48:15 this_host sshd[25810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.36.191.80 
Aug 28 16:48:16 this_host sshd[25810]: Failed password for invali........
-------------------------------
2019-08-29 00:42:33
45.138.96.13 attackbots
Spam
2019-08-29 00:04:32
37.187.248.10 attackspambots
Aug 28 11:19:02 aat-srv002 sshd[16211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.248.10
Aug 28 11:19:04 aat-srv002 sshd[16211]: Failed password for invalid user mcserver from 37.187.248.10 port 19072 ssh2
Aug 28 11:22:57 aat-srv002 sshd[16378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.248.10
Aug 28 11:22:59 aat-srv002 sshd[16378]: Failed password for invalid user Robert from 37.187.248.10 port 64404 ssh2
...
2019-08-29 00:31:02
142.252.250.32 attackspambots
1 attempts last 24 Hours
2019-08-29 00:05:31
187.211.143.133 attackbotsspam
Automatic report - Port Scan Attack
2019-08-29 01:01:00
167.114.251.164 attackbotsspam
Aug 28 06:07:52 hcbb sshd\[16992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.ip-167-114-251.eu  user=root
Aug 28 06:07:53 hcbb sshd\[16992\]: Failed password for root from 167.114.251.164 port 59989 ssh2
Aug 28 06:11:57 hcbb sshd\[17391\]: Invalid user xaviar from 167.114.251.164
Aug 28 06:11:57 hcbb sshd\[17391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.ip-167-114-251.eu
Aug 28 06:11:59 hcbb sshd\[17391\]: Failed password for invalid user xaviar from 167.114.251.164 port 54128 ssh2
2019-08-29 00:18:24
118.24.27.177 attackbots
Aug 28 14:41:59 MK-Soft-VM5 sshd\[19683\]: Invalid user teste from 118.24.27.177 port 49570
Aug 28 14:41:59 MK-Soft-VM5 sshd\[19683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.27.177
Aug 28 14:42:01 MK-Soft-VM5 sshd\[19683\]: Failed password for invalid user teste from 118.24.27.177 port 49570 ssh2
...
2019-08-29 00:34:35
14.198.6.164 attack
Aug 28 16:19:19 DAAP sshd[29687]: Invalid user leslie from 14.198.6.164 port 35294
Aug 28 16:19:20 DAAP sshd[29687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.198.6.164
Aug 28 16:19:19 DAAP sshd[29687]: Invalid user leslie from 14.198.6.164 port 35294
Aug 28 16:19:22 DAAP sshd[29687]: Failed password for invalid user leslie from 14.198.6.164 port 35294 ssh2
...
2019-08-29 00:43:51
51.83.74.203 attackspambots
Aug 28 17:55:42 SilenceServices sshd[13035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.203
Aug 28 17:55:44 SilenceServices sshd[13035]: Failed password for invalid user home from 51.83.74.203 port 33034 ssh2
Aug 28 17:59:49 SilenceServices sshd[14597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.203
2019-08-29 00:03:52
101.109.250.150 attack
Aug 28 06:39:42 php2 sshd\[18934\]: Invalid user ais from 101.109.250.150
Aug 28 06:39:42 php2 sshd\[18934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.109.250.150
Aug 28 06:39:44 php2 sshd\[18934\]: Failed password for invalid user ais from 101.109.250.150 port 40536 ssh2
Aug 28 06:44:38 php2 sshd\[19743\]: Invalid user aman@123 from 101.109.250.150
Aug 28 06:44:38 php2 sshd\[19743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.109.250.150
2019-08-29 00:51:07
109.120.189.104 attack
Aug 28 18:43:01 pornomens sshd\[15419\]: Invalid user cms from 109.120.189.104 port 51748
Aug 28 18:43:01 pornomens sshd\[15419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.120.189.104
Aug 28 18:43:03 pornomens sshd\[15419\]: Failed password for invalid user cms from 109.120.189.104 port 51748 ssh2
...
2019-08-29 00:46:29
114.38.43.30 attackspam
1 attempts last 24 Hours
2019-08-29 00:25:46
142.93.232.144 attackbots
Aug 28 06:44:08 php2 sshd\[19702\]: Invalid user monkey from 142.93.232.144
Aug 28 06:44:08 php2 sshd\[19702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.144
Aug 28 06:44:10 php2 sshd\[19702\]: Failed password for invalid user monkey from 142.93.232.144 port 50158 ssh2
Aug 28 06:48:06 php2 sshd\[20071\]: Invalid user 123 from 142.93.232.144
Aug 28 06:48:06 php2 sshd\[20071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.232.144
2019-08-29 00:54:20
59.188.250.56 attackbotsspam
Aug 28 16:10:30 rotator sshd\[22357\]: Invalid user 123456 from 59.188.250.56Aug 28 16:10:32 rotator sshd\[22357\]: Failed password for invalid user 123456 from 59.188.250.56 port 39460 ssh2Aug 28 16:15:06 rotator sshd\[22586\]: Invalid user root1 from 59.188.250.56Aug 28 16:15:08 rotator sshd\[22586\]: Failed password for invalid user root1 from 59.188.250.56 port 56822 ssh2Aug 28 16:19:38 rotator sshd\[23320\]: Invalid user adventure from 59.188.250.56Aug 28 16:19:40 rotator sshd\[23320\]: Failed password for invalid user adventure from 59.188.250.56 port 45946 ssh2
...
2019-08-29 00:14:31

最近上报的IP列表

104.144.189.152 104.144.189.232 103.205.68.26 104.144.189.212
104.144.189.221 104.144.189.90 104.144.189.236 104.144.189.248
104.144.19.137 104.144.196.46 104.144.197.81 103.205.69.153
104.144.196.106 104.144.197.94 104.144.196.103 104.144.20.137
104.144.19.143 103.205.69.157 103.205.69.168 103.205.7.50