必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.148.21.248 attack
Nov 19 13:47:22 mxgate1 postfix/postscreen[7608]: CONNECT from [104.148.21.248]:33592 to [176.31.12.44]:25
Nov 19 13:47:22 mxgate1 postfix/dnsblog[7610]: addr 104.148.21.248 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 19 13:47:22 mxgate1 postfix/dnsblog[7609]: addr 104.148.21.248 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 13:47:28 mxgate1 postfix/postscreen[7608]: DNSBL rank 3 for [104.148.21.248]:33592
Nov x@x
Nov 19 13:47:29 mxgate1 postfix/postscreen[7608]: DISCONNECT [104.148.21.248]:33592


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.21.248
2019-11-19 22:51:50
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.148.21.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27436
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.148.21.190.			IN	A

;; AUTHORITY SECTION:
.			137	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 12:02:44 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 190.21.148.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 190.21.148.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
125.71.21.68 attack
1587039204 - 04/16/2020 14:13:24 Host: 125.71.21.68/125.71.21.68 Port: 445 TCP Blocked
2020-04-16 23:07:15
101.89.201.250 attack
Apr 16 13:33:28 XXXXXX sshd[37945]: Invalid user postgres from 101.89.201.250 port 58574
2020-04-16 23:09:35
77.242.16.138 attackspam
Apr 16 16:49:22 ArkNodeAT sshd\[5970\]: Invalid user rvadmin from 77.242.16.138
Apr 16 16:49:22 ArkNodeAT sshd\[5970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.242.16.138
Apr 16 16:49:25 ArkNodeAT sshd\[5970\]: Failed password for invalid user rvadmin from 77.242.16.138 port 62473 ssh2
2020-04-16 23:12:28
49.232.131.80 attackspam
k+ssh-bruteforce
2020-04-16 23:09:56
89.151.134.78 attack
$f2bV_matches
2020-04-16 22:55:50
187.60.36.104 attack
fail2ban -- 187.60.36.104
...
2020-04-16 23:24:04
164.132.46.14 attackbotsspam
Apr 16 19:13:33 itv-usvr-01 sshd[12114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.46.14  user=root
Apr 16 19:13:36 itv-usvr-01 sshd[12114]: Failed password for root from 164.132.46.14 port 40514 ssh2
2020-04-16 22:54:38
104.248.209.204 attackbotsspam
(sshd) Failed SSH login from 104.248.209.204 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 16 10:47:50 localhost sshd[5089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.209.204  user=root
Apr 16 10:47:52 localhost sshd[5089]: Failed password for root from 104.248.209.204 port 42072 ssh2
Apr 16 10:55:20 localhost sshd[5598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.209.204  user=root
Apr 16 10:55:22 localhost sshd[5598]: Failed password for root from 104.248.209.204 port 56168 ssh2
Apr 16 10:57:49 localhost sshd[5749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.209.204  user=root
2020-04-16 23:22:33
222.186.175.216 attack
Apr 16 21:47:54 webhost01 sshd[9086]: Failed password for root from 222.186.175.216 port 43300 ssh2
Apr 16 21:48:08 webhost01 sshd[9086]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 43300 ssh2 [preauth]
...
2020-04-16 23:00:48
125.124.117.106 attackbots
Apr 16 15:38:56 srv01 sshd[5125]: Invalid user markus from 125.124.117.106 port 60988
Apr 16 15:38:56 srv01 sshd[5125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.124.117.106
Apr 16 15:38:56 srv01 sshd[5125]: Invalid user markus from 125.124.117.106 port 60988
Apr 16 15:38:59 srv01 sshd[5125]: Failed password for invalid user markus from 125.124.117.106 port 60988 ssh2
Apr 16 15:43:07 srv01 sshd[5529]: Invalid user admin from 125.124.117.106 port 53638
...
2020-04-16 23:33:03
186.204.162.210 attack
Apr 16 14:43:30 vps sshd[558872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.204.162.210
Apr 16 14:43:32 vps sshd[558872]: Failed password for invalid user test from 186.204.162.210 port 37088 ssh2
Apr 16 14:48:26 vps sshd[585679]: Invalid user fu from 186.204.162.210 port 46276
Apr 16 14:48:26 vps sshd[585679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.204.162.210
Apr 16 14:48:28 vps sshd[585679]: Failed password for invalid user fu from 186.204.162.210 port 46276 ssh2
...
2020-04-16 23:16:10
184.105.139.109 attack
Port scan: Attack repeated for 24 hours
2020-04-16 23:12:09
112.85.42.176 attack
(sshd) Failed SSH login from 112.85.42.176 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 16 17:09:06 amsweb01 sshd[20773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Apr 16 17:09:06 amsweb01 sshd[20768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Apr 16 17:09:08 amsweb01 sshd[20773]: Failed password for root from 112.85.42.176 port 18618 ssh2
Apr 16 17:09:08 amsweb01 sshd[20768]: Failed password for root from 112.85.42.176 port 24832 ssh2
Apr 16 17:09:12 amsweb01 sshd[20768]: Failed password for root from 112.85.42.176 port 24832 ssh2
2020-04-16 23:13:14
197.57.215.238 attack
Apr 16 15:11:15 master sshd[26620]: Failed password for invalid user admin from 197.57.215.238 port 55761 ssh2
2020-04-16 23:23:39
120.70.98.195 attackspam
Apr 16 12:13:24 sshgateway sshd\[9458\]: Invalid user ftpuser1 from 120.70.98.195
Apr 16 12:13:24 sshgateway sshd\[9458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.98.195
Apr 16 12:13:26 sshgateway sshd\[9458\]: Failed password for invalid user ftpuser1 from 120.70.98.195 port 48472 ssh2
2020-04-16 23:02:26

最近上报的IP列表

104.144.245.212 104.144.3.60 104.145.237.75 104.148.27.231
104.144.63.6 104.144.63.182 104.22.15.189 104.148.70.12
104.148.78.87 104.149.129.222 104.149.132.234 104.149.134.83
104.149.138.114 104.149.139.46 104.22.15.192 104.149.152.174
104.149.148.148 104.149.195.93 104.149.198.131 104.149.154.11