必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): Rethem Hosting LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
*Port Scan* detected from 104.152.52.29 (US/United States/internettl.org). 4 hits in the last 280 seconds
2020-02-16 18:26:11
attack
Unauthorized connection attempt detected from IP address 104.152.52.29 to port 1707 [T]
2020-01-27 04:35:01
attackbotsspam
SMB Server BruteForce Attack
2019-08-03 08:54:35
相同子网IP讨论:
IP 类型 评论内容 时间
104.152.52.231 botsattackproxy
Bot attacker IP
2025-03-25 13:44:38
104.152.52.145 botsattackproxy
Vulnerability Scanner
2025-03-20 13:41:36
104.152.52.100 spamattackproxy
VoIP blacklist IP
2025-03-14 22:09:59
104.152.52.139 attack
Brute-force attacker IP
2025-03-10 13:45:36
104.152.52.219 botsattackproxy
Bot attacker IP
2025-03-04 13:55:48
104.152.52.124 botsattackproxy
Vulnerability Scanner
2025-02-26 17:12:59
104.152.52.146 botsattackproxy
Bot attacker IP
2025-02-21 12:31:03
104.152.52.161 botsattackproxy
Vulnerability Scanner
2025-02-05 14:00:57
104.152.52.176 botsattackproxy
Botnet DB Scanner
2025-01-20 14:03:26
104.152.52.141 botsattack
Vulnerability Scanner
2025-01-09 22:45:15
104.152.52.165 botsattackproxy
Bot attacker IP
2024-09-24 16:44:08
104.152.52.226 botsattackproxy
Vulnerability Scanner
2024-08-28 12:46:53
104.152.52.142 spambotsattack
Vulnerability Scanner
2024-08-26 12:47:13
104.152.52.116 spamattack
Compromised IP
2024-07-06 14:07:26
104.152.52.204 attack
Bad IP
2024-07-01 12:36:27
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.152.52.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45666
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.152.52.29.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042901 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 30 06:39:09 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
29.52.152.104.in-addr.arpa domain name pointer internettl.org.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
29.52.152.104.in-addr.arpa	name = internettl.org.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.224.105.225 attackbotsspam
Nov 28 23:43:39 ns3042688 courier-imapd: LOGIN FAILED, method=PLAIN, ip=\[::ffff:45.224.105.225\]
...
2019-11-29 09:21:51
118.24.38.53 attackspam
Nov 28 23:43:23 serwer sshd\[17404\]: Invalid user bob from 118.24.38.53 port 54992
Nov 28 23:43:23 serwer sshd\[17404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.38.53
Nov 28 23:43:25 serwer sshd\[17404\]: Failed password for invalid user bob from 118.24.38.53 port 54992 ssh2
...
2019-11-29 09:29:28
180.76.175.156 attackspambots
2019-11-29T00:20:44.785668abusebot-7.cloudsearch.cf sshd\[2986\]: Invalid user ftptest01 from 180.76.175.156 port 56294
2019-11-29 09:14:03
96.65.158.1 attackspam
RDP Bruteforce
2019-11-29 13:07:25
158.69.63.244 attack
Nov 28 23:43:47 MK-Soft-VM4 sshd[28958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.63.244 
Nov 28 23:43:50 MK-Soft-VM4 sshd[28958]: Failed password for invalid user scharrer from 158.69.63.244 port 44490 ssh2
...
2019-11-29 09:18:49
222.223.129.254 attackbots
" "
2019-11-29 09:22:53
106.12.152.194 attackspam
11/28/2019-23:59:06.975780 106.12.152.194 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-29 13:02:24
172.94.99.203 attackbotsspam
Automatic report - SSH Brute-Force Attack
2019-11-29 13:01:05
95.213.177.122 attackspambots
Nov 28 22:41:41   TCP Attack: SRC=95.213.177.122 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=241  PROTO=TCP SPT=40901 DPT=8080 WINDOW=1024 RES=0x00 SYN URGP=0
2019-11-29 09:16:42
66.186.162.29 attack
Autoban   66.186.162.29 ABORTED AUTH
2019-11-29 09:21:08
122.144.131.93 attack
Nov 29 06:55:35 server sshd\[31531\]: User root from 122.144.131.93 not allowed because listed in DenyUsers
Nov 29 06:55:35 server sshd\[31531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.131.93  user=root
Nov 29 06:55:37 server sshd\[31531\]: Failed password for invalid user root from 122.144.131.93 port 39818 ssh2
Nov 29 07:00:02 server sshd\[12492\]: Invalid user taib from 122.144.131.93 port 9808
Nov 29 07:00:02 server sshd\[12492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.144.131.93
2019-11-29 13:02:45
118.25.133.121 attack
Nov 28 23:36:21 minden010 sshd[2597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.133.121
Nov 28 23:36:23 minden010 sshd[2597]: Failed password for invalid user efdal from 118.25.133.121 port 55782 ssh2
Nov 28 23:43:22 minden010 sshd[5035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.133.121
...
2019-11-29 09:26:02
170.210.60.30 attackbotsspam
Nov 29 01:53:40 nextcloud sshd\[31448\]: Invalid user silverthorn from 170.210.60.30
Nov 29 01:53:40 nextcloud sshd\[31448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.210.60.30
Nov 29 01:53:41 nextcloud sshd\[31448\]: Failed password for invalid user silverthorn from 170.210.60.30 port 43692 ssh2
...
2019-11-29 08:59:42
117.5.106.183 attack
failed_logins
2019-11-29 09:28:00
106.12.15.235 attack
5x Failed Password
2019-11-29 09:24:32

最近上报的IP列表

201.219.216.131 103.20.191.242 109.245.240.153 96.77.77.53
84.51.56.123 64.246.165.200 139.255.108.114 95.181.45.234
114.35.118.48 103.197.93.2 81.177.6.117 185.36.81.173
216.244.66.233 37.49.227.124 189.116.83.46 206.214.143.120
37.252.73.141 84.132.20.74 91.238.243.215 171.246.250.21