必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.204.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57989
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.204.14.			IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:32:49 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 14.204.149.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.204.149.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
127.0.0.1 attackbotsspam
Test Connectivity
2019-08-14 04:37:18
216.218.206.89 attack
" "
2019-08-14 05:13:20
95.163.214.206 attackspambots
Aug 13 11:41:27 home sshd[14386]: Invalid user oracle from 95.163.214.206 port 33300
Aug 13 11:41:27 home sshd[14386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.163.214.206
Aug 13 11:41:27 home sshd[14386]: Invalid user oracle from 95.163.214.206 port 33300
Aug 13 11:41:29 home sshd[14386]: Failed password for invalid user oracle from 95.163.214.206 port 33300 ssh2
Aug 13 12:07:16 home sshd[14435]: Invalid user mysql from 95.163.214.206 port 50990
Aug 13 12:07:16 home sshd[14435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.163.214.206
Aug 13 12:07:16 home sshd[14435]: Invalid user mysql from 95.163.214.206 port 50990
Aug 13 12:07:18 home sshd[14435]: Failed password for invalid user mysql from 95.163.214.206 port 50990 ssh2
Aug 13 12:11:40 home sshd[14466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.163.214.206  user=daemon
Aug 13 12:11:43 home sshd[14466]: Failed pa
2019-08-14 04:44:49
62.210.14.169 attack
\[2019-08-13 22:22:35\] NOTICE\[5713\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '62.210.14.169:3141' \(callid: 85233686-1377121601-532840813\) - Failed to authenticate
\[2019-08-13 22:22:35\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-08-13T22:22:35.461+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="85233686-1377121601-532840813",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/62.210.14.169/3141",Challenge="1565727755/0abba1b9596a3992e26fb0846a55c0ee",Response="0cbcb5187ea721870d224289bfe3451f",ExpectedResponse=""
\[2019-08-13 22:22:35\] NOTICE\[29653\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '62.210.14.169:3141' \(callid: 85233686-1377121601-532840813\) - Failed to authenticate
\[2019-08-13 22:22:35\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFaile
2019-08-14 04:49:34
185.220.101.58 attack
Aug 13 21:17:53 mail sshd\[20312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.58  user=root
Aug 13 21:17:55 mail sshd\[20312\]: Failed password for root from 185.220.101.58 port 40285 ssh2
Aug 13 21:17:58 mail sshd\[20312\]: Failed password for root from 185.220.101.58 port 40285 ssh2
Aug 13 21:18:01 mail sshd\[20312\]: Failed password for root from 185.220.101.58 port 40285 ssh2
Aug 13 21:18:03 mail sshd\[20312\]: Failed password for root from 185.220.101.58 port 40285 ssh2
2019-08-14 04:45:48
142.93.240.79 attack
Aug 13 20:44:46 XXX sshd[8169]: Invalid user messagebus from 142.93.240.79 port 45814
2019-08-14 05:01:59
68.183.14.35 attackbotsspam
Splunk® : port scan detected:
Aug 13 16:31:09 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=68.183.14.35 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=54321 PROTO=TCP SPT=44656 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0
2019-08-14 05:05:49
107.170.192.190 attackspambots
2019-08-13 13:20:06 Deny 107.170.192.190 xxx.xxx.xxx.xxx rdp/tcp 60470 3389 2-External-1 1-Trusted IPS detected 40 47 (Remote Desktop Services-00) proc_id="firewall" rc="301" msg_id="3000-0150" dst_ip_nat="xxx.xxx.xxx.xxx" tcp_info="offset 5 R 2914096797 win 0" geo_src="USA" geo_dst="USA" signature_id="1057269" signature_name="RDP Microsoft Windows Remote Desktop Server Denial of Service (" signature_cat="DoS/DDoS" severity="4"
2019-08-14 04:53:50
45.55.145.31 attackspambots
Aug 13 22:09:08 server01 sshd\[1441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.145.31  user=root
Aug 13 22:09:10 server01 sshd\[1441\]: Failed password for root from 45.55.145.31 port 47022 ssh2
Aug 13 22:15:28 server01 sshd\[1494\]: Invalid user tomas from 45.55.145.31
...
2019-08-14 04:53:11
88.149.155.218 attackspambots
Automatic report - Port Scan Attack
2019-08-14 04:55:20
23.129.64.192 attack
Aug 13 20:24:05 mail sshd\[11341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.192  user=root
Aug 13 20:24:07 mail sshd\[11341\]: Failed password for root from 23.129.64.192 port 64656 ssh2
Aug 13 20:24:10 mail sshd\[11341\]: Failed password for root from 23.129.64.192 port 64656 ssh2
Aug 13 20:24:13 mail sshd\[11341\]: Failed password for root from 23.129.64.192 port 64656 ssh2
Aug 13 20:24:15 mail sshd\[11341\]: Failed password for root from 23.129.64.192 port 64656 ssh2
2019-08-14 04:50:42
150.140.189.33 attackspam
Aug 13 21:42:30 Proxmox sshd\[29702\]: User root from 150.140.189.33 not allowed because not listed in AllowUsers
Aug 13 21:42:30 Proxmox sshd\[29702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.140.189.33  user=root
Aug 13 21:42:33 Proxmox sshd\[29702\]: Failed password for invalid user root from 150.140.189.33 port 56266 ssh2
2019-08-14 04:34:22
132.232.112.25 attack
Aug 13 13:19:08 aat-srv002 sshd[18910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.112.25
Aug 13 13:19:10 aat-srv002 sshd[18910]: Failed password for invalid user nginx123 from 132.232.112.25 port 55062 ssh2
Aug 13 13:25:27 aat-srv002 sshd[19133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.112.25
Aug 13 13:25:30 aat-srv002 sshd[19133]: Failed password for invalid user webmaster from 132.232.112.25 port 47830 ssh2
...
2019-08-14 04:53:31
212.79.176.73 attackbots
Chat Spam
2019-08-14 04:41:08
77.234.46.145 attackspambots
\[2019-08-13 22:23:57\] NOTICE\[5713\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '77.234.46.145:5987' \(callid: 627922654-1829003958-458813453\) - Failed to authenticate
\[2019-08-13 22:23:57\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-08-13T22:23:57.475+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="627922654-1829003958-458813453",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/77.234.46.145/5987",Challenge="1565727837/1f8f0cf151489e941cd77f7763c2fb0a",Response="325d83befecdb5d5dbd7667c28bb7879",ExpectedResponse=""
\[2019-08-13 22:23:57\] NOTICE\[18654\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '77.234.46.145:5987' \(callid: 627922654-1829003958-458813453\) - Failed to authenticate
\[2019-08-13 22:23:57\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed
2019-08-14 04:49:01

最近上报的IP列表

104.149.175.154 104.149.204.21 104.149.204.29 104.149.208.251
104.152.108.191 104.152.109.157 104.152.108.157 104.149.216.12
104.21.63.159 104.149.224.166 104.149.239.231 104.152.109.182
104.152.111.232 104.152.168.13 104.152.168.14 104.152.110.240
104.21.63.160 104.152.223.9 104.152.168.35 104.152.211.93