必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.204.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.204.39.			IN	A

;; AUTHORITY SECTION:
.			507	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 02:50:27 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 39.204.149.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.204.149.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
74.63.226.142 attack
Aug  7 19:26:01 heissa sshd\[6698\]: Invalid user storm from 74.63.226.142 port 41552
Aug  7 19:26:01 heissa sshd\[6698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.226.142
Aug  7 19:26:04 heissa sshd\[6698\]: Failed password for invalid user storm from 74.63.226.142 port 41552 ssh2
Aug  7 19:34:03 heissa sshd\[7570\]: Invalid user gw from 74.63.226.142 port 36536
Aug  7 19:34:03 heissa sshd\[7570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.226.142
2019-08-08 07:40:16
66.249.64.146 attackbots
Automatic report - Banned IP Access
2019-08-08 07:22:35
103.53.166.148 attackbots
Aug  8 00:23:56 nextcloud sshd\[30495\]: Invalid user oleg from 103.53.166.148
Aug  8 00:23:56 nextcloud sshd\[30495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.53.166.148
Aug  8 00:23:58 nextcloud sshd\[30495\]: Failed password for invalid user oleg from 103.53.166.148 port 56035 ssh2
...
2019-08-08 06:58:56
114.79.150.61 attackspam
Automatic report - Port Scan Attack
2019-08-08 07:19:17
88.247.110.88 attackbots
Aug  7 20:57:07 lnxmail61 sshd[16906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.247.110.88
2019-08-08 07:24:03
180.125.89.229 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-08 07:25:14
157.230.146.88 attackspambots
Aug  7 20:31:43 tuxlinux sshd[9568]: Invalid user test from 157.230.146.88 port 39816
Aug  7 20:31:43 tuxlinux sshd[9568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.146.88 
Aug  7 20:31:43 tuxlinux sshd[9568]: Invalid user test from 157.230.146.88 port 39816
Aug  7 20:31:43 tuxlinux sshd[9568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.146.88 
...
2019-08-08 07:50:13
23.244.63.210 attackbots
Honeypot attack, port: 445, PTR: 210.63-244-23.rdns.scalabledns.com.
2019-08-08 07:19:40
92.63.194.54 attack
RDP brute forcing (d)
2019-08-08 07:42:57
139.59.28.61 attackbotsspam
Aug  7 19:28:28 vps200512 sshd\[22564\]: Invalid user usuario from 139.59.28.61
Aug  7 19:28:28 vps200512 sshd\[22564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.28.61
Aug  7 19:28:30 vps200512 sshd\[22564\]: Failed password for invalid user usuario from 139.59.28.61 port 35490 ssh2
Aug  7 19:33:18 vps200512 sshd\[22630\]: Invalid user lais from 139.59.28.61
Aug  7 19:33:18 vps200512 sshd\[22630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.28.61
2019-08-08 07:37:02
41.76.209.14 attackspam
Automatic report - SSH Brute-Force Attack
2019-08-08 07:11:11
89.235.136.94 attackspam
" "
2019-08-08 07:10:06
37.26.99.97 attackbots
scan z
2019-08-08 07:04:15
147.135.225.193 attackbotsspam
Unauthorized access detected from banned ip
2019-08-08 07:12:59
62.73.124.151 attack
WordPress XMLRPC scan :: 62.73.124.151 0.168 BYPASS [08/Aug/2019:03:34:44  1000] [censored_4] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
2019-08-08 07:14:46

最近上报的IP列表

104.149.204.28 104.149.204.4 104.149.204.49 104.149.204.61
104.149.213.137 104.149.249.103 104.149.3.3 104.149.30.81
104.15.147.187 104.152.108.153 50.157.72.14 104.152.108.16
104.152.108.69 104.152.108.7 104.152.108.89 104.152.109.101
104.152.109.115 104.152.109.119 104.152.109.198 104.152.109.233