必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.144.34.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64512
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.144.34.252.			IN	A

;; AUTHORITY SECTION:
.			120	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:27:15 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 252.34.144.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 252.34.144.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.188.242.215 attack
IP 119.188.242.215 attacked honeypot on port: 3433 at 7/3/2020 1:02:23 PM
2020-07-04 05:30:38
217.61.108.147 attackspam
Brute force attempt
2020-07-04 05:34:54
140.249.19.110 attackspambots
$f2bV_matches
2020-07-04 05:25:42
180.215.223.132 attack
Jul  3 23:05:52 pve1 sshd[16318]: Failed password for root from 180.215.223.132 port 43046 ssh2
...
2020-07-04 05:20:11
218.92.0.133 attack
Jul  3 23:16:23 abendstille sshd\[17439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Jul  3 23:16:23 abendstille sshd\[17442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
Jul  3 23:16:25 abendstille sshd\[17439\]: Failed password for root from 218.92.0.133 port 31470 ssh2
Jul  3 23:16:26 abendstille sshd\[17442\]: Failed password for root from 218.92.0.133 port 23077 ssh2
Jul  3 23:16:28 abendstille sshd\[17439\]: Failed password for root from 218.92.0.133 port 31470 ssh2
...
2020-07-04 05:18:58
138.197.15.40 attackspam
$f2bV_matches
2020-07-04 05:18:28
129.204.74.158 attack
Jul  3 14:03:48 dignus sshd[7534]: Failed password for invalid user kjj from 129.204.74.158 port 38984 ssh2
Jul  3 14:08:28 dignus sshd[8018]: Invalid user zf from 129.204.74.158 port 37876
Jul  3 14:08:28 dignus sshd[8018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.74.158
Jul  3 14:08:30 dignus sshd[8018]: Failed password for invalid user zf from 129.204.74.158 port 37876 ssh2
Jul  3 14:13:09 dignus sshd[8499]: Invalid user style from 129.204.74.158 port 36766
...
2020-07-04 05:42:22
211.137.109.49 attack
(sshd) Failed SSH login from 211.137.109.49 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul  3 22:02:34 amsweb01 sshd[28780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.137.109.49  user=root
Jul  3 22:02:36 amsweb01 sshd[28780]: Failed password for root from 211.137.109.49 port 16169 ssh2
Jul  3 22:02:37 amsweb01 sshd[28786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.137.109.49  user=root
Jul  3 22:02:40 amsweb01 sshd[28786]: Failed password for root from 211.137.109.49 port 6601 ssh2
Jul  3 22:02:41 amsweb01 sshd[28793]: Invalid user cha from 211.137.109.49 port 2260
2020-07-04 05:15:48
165.227.66.224 attackbots
$f2bV_matches
2020-07-04 05:22:02
140.206.223.43 attackbots
Jul  3 23:07:32 debian-2gb-nbg1-2 kernel: \[16069074.267818\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=140.206.223.43 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=230 ID=33110 PROTO=TCP SPT=55942 DPT=3989 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-04 05:22:29
140.206.157.242 attack
Jul  3 22:30:09 gestao sshd[11840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.206.157.242 
Jul  3 22:30:11 gestao sshd[11840]: Failed password for invalid user kun from 140.206.157.242 port 34436 ssh2
Jul  3 22:34:07 gestao sshd[11981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.206.157.242 
...
2020-07-04 05:41:51
115.225.39.87 attackbots
Unauthorized connection attempt from IP address 115.225.39.87 on Port 445(SMB)
2020-07-04 05:31:18
138.197.158.118 attackbots
$f2bV_matches
2020-07-04 05:13:09
195.70.59.121 attackbotsspam
$f2bV_matches
2020-07-04 05:25:17
91.121.101.77 attackspambots
WordPress brute force
2020-07-04 05:24:23

最近上报的IP列表

101.109.167.1 104.144.34.234 104.144.34.236 104.144.34.44
101.109.167.101 104.144.34.59 104.144.34.61 104.144.34.56
104.144.34.6 104.144.37.109 104.144.37.120 104.144.34.9
104.144.34.78 101.109.167.102 104.144.34.84 104.144.34.71
104.144.34.87 104.144.37.125 104.144.37.14 104.144.37.13