必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.80.238
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.80.238.			IN	A

;; AUTHORITY SECTION:
.			494	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031701 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 18 07:14:01 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 238.80.149.104.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 238.80.149.104.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.159.220.190 attack
Nov 17 09:15:44 nextcloud sshd\[7274\]: Invalid user rada from 115.159.220.190
Nov 17 09:15:44 nextcloud sshd\[7274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.220.190
Nov 17 09:15:46 nextcloud sshd\[7274\]: Failed password for invalid user rada from 115.159.220.190 port 34128 ssh2
...
2019-11-17 18:14:03
129.211.92.114 attackspam
SSH Brute Force
2019-11-17 18:34:12
201.55.126.57 attackbots
Nov 17 09:37:20 minden010 sshd[7265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.126.57
Nov 17 09:37:22 minden010 sshd[7265]: Failed password for invalid user www from 201.55.126.57 port 39005 ssh2
Nov 17 09:42:42 minden010 sshd[9218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.126.57
...
2019-11-17 18:48:27
134.209.252.119 attackbotsspam
$f2bV_matches
2019-11-17 18:40:14
70.39.250.129 attackspam
Automatic report - XMLRPC Attack
2019-11-17 18:46:15
63.83.78.195 attack
Postfix DNSBL listed. Trying to send SPAM.
2019-11-17 18:11:23
166.62.123.55 attack
Wordpress Attacks (Scanning for wp-login.php) @ 2019-11-17 10:21:48
2019-11-17 18:39:25
51.83.32.232 attackspam
Nov 17 14:11:50 itv-usvr-01 sshd[25495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.32.232  user=root
Nov 17 14:11:52 itv-usvr-01 sshd[25495]: Failed password for root from 51.83.32.232 port 35222 ssh2
2019-11-17 18:35:32
182.73.245.70 attack
F2B jail: sshd. Time: 2019-11-17 09:08:13, Reported by: VKReport
2019-11-17 18:18:37
117.50.38.202 attackbots
Jul  6 13:55:07 vtv3 sshd\[15795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.202  user=root
Jul  6 13:55:09 vtv3 sshd\[15795\]: Failed password for root from 117.50.38.202 port 55480 ssh2
Jul  6 13:57:45 vtv3 sshd\[16917\]: Invalid user mani from 117.50.38.202 port 43788
Jul  6 13:57:45 vtv3 sshd\[16917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.202
Jul  6 13:57:47 vtv3 sshd\[16917\]: Failed password for invalid user mani from 117.50.38.202 port 43788 ssh2
Jul  6 14:08:50 vtv3 sshd\[22343\]: Invalid user jasper from 117.50.38.202 port 54562
Jul  6 14:08:50 vtv3 sshd\[22343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.202
Jul  6 14:08:52 vtv3 sshd\[22343\]: Failed password for invalid user jasper from 117.50.38.202 port 54562 ssh2
Jul  6 14:11:45 vtv3 sshd\[23887\]: Invalid user atul from 117.50.38.202 port 43312
Jul  6 14:11:45 vtv3
2019-11-17 18:33:56
196.35.41.86 attackspam
"Fail2Ban detected SSH brute force attempt"
2019-11-17 18:15:03
207.38.86.27 attackbots
Automatic report - XMLRPC Attack
2019-11-17 18:29:00
220.92.16.94 attackbots
Nov 17 08:00:07 pornomens sshd\[16121\]: Invalid user goryus from 220.92.16.94 port 51276
Nov 17 08:00:07 pornomens sshd\[16121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.92.16.94
Nov 17 08:00:09 pornomens sshd\[16121\]: Failed password for invalid user goryus from 220.92.16.94 port 51276 ssh2
...
2019-11-17 18:49:27
159.203.201.53 attack
11/17/2019-03:10:04.501615 159.203.201.53 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-17 18:43:59
77.247.108.14 attack
77.247.108.14 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 5, 29, 50
2019-11-17 18:13:41

最近上报的IP列表

104.149.154.36 104.152.108.29 104.152.109.153 247.199.223.218
104.152.110.156 104.152.110.44 104.152.174.74 104.152.190.78
104.152.208.183 104.152.208.207 189.135.184.89 104.152.210.37
104.152.64.213 104.152.70.156 104.154.119.132 104.156.229.131
104.16.120.227 104.16.121.227 104.16.122.227 104.16.123.227