必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.149.87.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60333
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.149.87.143.			IN	A

;; AUTHORITY SECTION:
.			420	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030302 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 11:46:09 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
143.87.149.104.in-addr.arpa domain name pointer unassigned.psychz.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
143.87.149.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
88.149.248.9 attack
Invalid user test from 88.149.248.9 port 42812
2020-06-17 18:18:46
103.4.217.139 attack
Invalid user ftp from 103.4.217.139 port 58131
2020-06-17 18:10:09
104.154.236.204 attackspam
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.236.154.104.bc.googleusercontent.com
Invalid user cda from 104.154.236.204 port 53088
Failed password for invalid user cda from 104.154.236.204 port 53088 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.236.154.104.bc.googleusercontent.com  user=root
Failed password for root from 104.154.236.204 port 34036 ssh2
2020-06-17 18:06:13
106.12.186.74 attack
Invalid user batch from 106.12.186.74 port 32848
2020-06-17 18:14:43
61.177.172.168 attack
2020-06-17T10:00:17.460219shield sshd\[18130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
2020-06-17T10:00:18.763830shield sshd\[18130\]: Failed password for root from 61.177.172.168 port 11938 ssh2
2020-06-17T10:00:23.362926shield sshd\[18130\]: Failed password for root from 61.177.172.168 port 11938 ssh2
2020-06-17T10:00:26.529644shield sshd\[18130\]: Failed password for root from 61.177.172.168 port 11938 ssh2
2020-06-17T10:00:30.106214shield sshd\[18130\]: Failed password for root from 61.177.172.168 port 11938 ssh2
2020-06-17 18:21:47
101.91.208.117 attackspam
Jun 17 07:00:25 vps647732 sshd[16348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.208.117
Jun 17 07:00:28 vps647732 sshd[16348]: Failed password for invalid user 123qweasd!@# from 101.91.208.117 port 58330 ssh2
...
2020-06-17 18:29:20
107.170.91.121 attackbotsspam
Jun 17 15:15:12 gw1 sshd[17278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.91.121
Jun 17 15:15:14 gw1 sshd[17278]: Failed password for invalid user michals from 107.170.91.121 port 55796 ssh2
...
2020-06-17 18:35:38
67.230.38.103 attackbotsspam
 TCP (SYN) 67.230.38.103:27897 -> port 23, len 44
2020-06-17 18:09:05
132.232.68.138 attackbots
Jun 17 08:27:06 scw-6657dc sshd[15839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.138
Jun 17 08:27:06 scw-6657dc sshd[15839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.68.138
Jun 17 08:27:08 scw-6657dc sshd[15839]: Failed password for invalid user bep from 132.232.68.138 port 45070 ssh2
...
2020-06-17 18:12:49
197.33.236.67 attackbots
failed_logins
2020-06-17 18:44:39
192.185.130.230 attack
Jun 17 02:26:59 dignus sshd[24521]: Invalid user gentoo from 192.185.130.230 port 35624
Jun 17 02:26:59 dignus sshd[24521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.185.130.230
Jun 17 02:27:01 dignus sshd[24521]: Failed password for invalid user gentoo from 192.185.130.230 port 35624 ssh2
Jun 17 02:29:21 dignus sshd[24694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.185.130.230  user=root
Jun 17 02:29:23 dignus sshd[24694]: Failed password for root from 192.185.130.230 port 44728 ssh2
...
2020-06-17 18:30:03
94.102.50.137 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 60206 proto: TCP cat: Misc Attack
2020-06-17 18:22:47
95.110.129.91 attack
LGS,WP GET /wp/wp-login.php
2020-06-17 18:28:07
42.159.121.246 attackbots
Jun 17 11:35:11 ns3164893 sshd[10938]: Failed password for root from 42.159.121.246 port 42140 ssh2
Jun 17 11:48:03 ns3164893 sshd[11091]: Invalid user lizhen from 42.159.121.246 port 60040
...
2020-06-17 18:38:42
129.211.65.70 attackspam
Jun 17 15:25:48 dhoomketu sshd[819578]: Failed password for root from 129.211.65.70 port 40466 ssh2
Jun 17 15:29:49 dhoomketu sshd[819610]: Invalid user chy from 129.211.65.70 port 55860
Jun 17 15:29:49 dhoomketu sshd[819610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.65.70 
Jun 17 15:29:49 dhoomketu sshd[819610]: Invalid user chy from 129.211.65.70 port 55860
Jun 17 15:29:51 dhoomketu sshd[819610]: Failed password for invalid user chy from 129.211.65.70 port 55860 ssh2
...
2020-06-17 18:27:02

最近上报的IP列表

104.154.53.125 104.154.90.113 104.152.110.20 104.155.179.212
104.155.155.195 112.66.108.70 104.155.179.62 104.155.52.125
104.156.164.70 104.156.236.58 104.156.161.80 104.155.99.87
104.156.237.139 104.156.229.240 104.156.251.40 112.66.109.0
104.156.48.156 104.156.253.56 104.156.51.209 104.156.92.35