必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.154.20.180 attackspambots
[2020-09-09 17:39:53] SECURITY[2022] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-09-09T17:39:53.870+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID="1745980218-52213582-693732564",LocalAddress="IPV4/UDP/51.255.2.242/5060",RemoteAddress="IPV4/UDP/104.154.20.180/51889",Challenge="1599665993/bba66969114a6633a079db0a4c7f61dd",Response="1aae448624181b2435d3768bb895feeb",ExpectedResponse=""
[2020-09-09 17:39:54] SECURITY[2022] res_security_log.c: SecurityEvent="InvalidAccountID",EventTV="2020-09-09T17:39:54.153+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="222",SessionID="1745980218-52213582-693732564",LocalAddress="IPV4/UDP/51.255.2.242/5060",RemoteAddress="IPV4/UDP/104.154.20.180/51889"
[2020-09-09 17:39:54] SECURITY[2022] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-09-09T17:39:54.153+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID
...
2020-09-10 16:23:23
104.154.20.180 attackspambots
[2020-09-09 17:39:53] SECURITY[2022] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-09-09T17:39:53.870+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID="1745980218-52213582-693732564",LocalAddress="IPV4/UDP/51.255.2.242/5060",RemoteAddress="IPV4/UDP/104.154.20.180/51889",Challenge="1599665993/bba66969114a6633a079db0a4c7f61dd",Response="1aae448624181b2435d3768bb895feeb",ExpectedResponse=""
[2020-09-09 17:39:54] SECURITY[2022] res_security_log.c: SecurityEvent="InvalidAccountID",EventTV="2020-09-09T17:39:54.153+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="222",SessionID="1745980218-52213582-693732564",LocalAddress="IPV4/UDP/51.255.2.242/5060",RemoteAddress="IPV4/UDP/104.154.20.180/51889"
[2020-09-09 17:39:54] SECURITY[2022] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2020-09-09T17:39:54.153+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="",SessionID
...
2020-09-10 07:01:22
104.154.20.180 attack
[2020-08-22 x@x
[2020-08-22 x@x
[2020-08-25 x@x
[2020-08-25 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.154.20.180
2020-08-27 18:18:52
104.154.205.102 attack
 TCP (SYN) 104.154.205.102:52410 -> port 587, len 44
2020-08-24 01:33:13
104.154.20.180 attackspam
[2020-08-23 04:43:04] NOTICE[1185] chan_sip.c: Registration from '' failed for '104.154.20.180:56831' - Wrong password
[2020-08-23 04:43:04] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-23T04:43:04.973-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="853",SessionID="0x7f10c43f67a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/104.154.20.180/56831",Challenge="12d61ef8",ReceivedChallenge="12d61ef8",ReceivedHash="73d1e4ad8ccb2b36a05e58fd3a3f666f"
[2020-08-23 04:43:57] NOTICE[1185] chan_sip.c: Registration from '' failed for '104.154.20.180:62864' - Wrong password
[2020-08-23 04:43:57] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-23T04:43:57.792-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="853",SessionID="0x7f10c43f67a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/104.154.20.180
...
2020-08-23 17:38:37
104.154.208.252 attackspambots
Aug 21 19:39:42 areeb-Workstation sshd\[4152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.154.208.252  user=root
Aug 21 19:39:43 areeb-Workstation sshd\[4152\]: Failed password for root from 104.154.208.252 port 42900 ssh2
Aug 21 19:44:16 areeb-Workstation sshd\[5494\]: Invalid user rodney from 104.154.208.252
Aug 21 19:44:16 areeb-Workstation sshd\[5494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.154.208.252
...
2019-08-21 22:23:52
104.154.208.252 attackspam
Aug 21 13:12:19 areeb-Workstation sshd\[19140\]: Invalid user rh from 104.154.208.252
Aug 21 13:12:19 areeb-Workstation sshd\[19140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.154.208.252
Aug 21 13:12:22 areeb-Workstation sshd\[19140\]: Failed password for invalid user rh from 104.154.208.252 port 54102 ssh2
...
2019-08-21 15:50:53
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.154.20.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50712
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.154.20.22.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 02:50:04 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
22.20.154.104.in-addr.arpa domain name pointer 22.20.154.104.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
22.20.154.104.in-addr.arpa	name = 22.20.154.104.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.88.112.55 attackspam
(sshd) Failed SSH login from 49.88.112.55 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 30 21:45:38 cwp sshd[3860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
Nov 30 21:45:40 cwp sshd[3860]: Failed password for root from 49.88.112.55 port 4333 ssh2
Nov 30 21:45:43 cwp sshd[3860]: Failed password for root from 49.88.112.55 port 4333 ssh2
Nov 30 21:45:46 cwp sshd[3860]: Failed password for root from 49.88.112.55 port 4333 ssh2
Nov 30 21:45:49 cwp sshd[3860]: Failed password for root from 49.88.112.55 port 4333 ssh2
2019-12-01 08:46:28
222.186.180.223 attackspambots
Dec  1 03:06:42 sauna sshd[132595]: Failed password for root from 222.186.180.223 port 35578 ssh2
Dec  1 03:06:55 sauna sshd[132595]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 35578 ssh2 [preauth]
...
2019-12-01 09:07:33
116.239.107.79 attackspambots
Nov 28 15:57:59 eola postfix/smtpd[16179]: connect from unknown[116.239.107.79]
Nov 28 15:57:59 eola postfix/smtpd[16179]: lost connection after AUTH from unknown[116.239.107.79]
Nov 28 15:57:59 eola postfix/smtpd[16179]: disconnect from unknown[116.239.107.79] ehlo=1 auth=0/1 commands=1/2
Nov 28 15:57:59 eola postfix/smtpd[16490]: connect from unknown[116.239.107.79]
Nov 28 15:58:00 eola postfix/smtpd[16490]: lost connection after AUTH from unknown[116.239.107.79]
Nov 28 15:58:00 eola postfix/smtpd[16490]: disconnect from unknown[116.239.107.79] ehlo=1 auth=0/1 commands=1/2
Nov 28 15:58:00 eola postfix/smtpd[16179]: connect from unknown[116.239.107.79]
Nov 28 15:58:01 eola postfix/smtpd[16179]: lost connection after AUTH from unknown[116.239.107.79]
Nov 28 15:58:01 eola postfix/smtpd[16179]: disconnect from unknown[116.239.107.79] ehlo=1 auth=0/1 commands=1/2
Nov 28 15:58:01 eola postfix/smtpd[16490]: connect from unknown[116.239.107.79]
Nov 28 15:58:01 eola postfix/sm........
-------------------------------
2019-12-01 13:14:29
112.35.26.43 attackspambots
Nov 30 23:49:03 linuxvps sshd\[38811\]: Invalid user ocano from 112.35.26.43
Nov 30 23:49:03 linuxvps sshd\[38811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.26.43
Nov 30 23:49:05 linuxvps sshd\[38811\]: Failed password for invalid user ocano from 112.35.26.43 port 51506 ssh2
Nov 30 23:58:50 linuxvps sshd\[43968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.26.43  user=root
Nov 30 23:58:52 linuxvps sshd\[43968\]: Failed password for root from 112.35.26.43 port 41684 ssh2
2019-12-01 13:07:23
118.24.92.216 attackbotsspam
Nov 30 18:55:14 hanapaa sshd\[12201\]: Invalid user 12345678 from 118.24.92.216
Nov 30 18:55:14 hanapaa sshd\[12201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.92.216
Nov 30 18:55:16 hanapaa sshd\[12201\]: Failed password for invalid user 12345678 from 118.24.92.216 port 46472 ssh2
Nov 30 18:58:57 hanapaa sshd\[12482\]: Invalid user test3333 from 118.24.92.216
Nov 30 18:58:57 hanapaa sshd\[12482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.92.216
2019-12-01 13:05:42
49.235.73.221 attackspambots
Invalid user florey from 49.235.73.221 port 41028
2019-12-01 08:48:38
104.211.216.173 attack
Automatic report - Banned IP Access
2019-12-01 08:54:14
49.248.167.102 attack
Apr 14 07:27:36 meumeu sshd[3083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.167.102 
Apr 14 07:27:38 meumeu sshd[3083]: Failed password for invalid user demo from 49.248.167.102 port 36982 ssh2
Apr 14 07:31:37 meumeu sshd[3798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.167.102 
...
2019-12-01 08:54:31
41.193.122.77 attackbotsspam
$f2bV_matches
2019-12-01 08:56:10
183.207.177.132 attack
Nov 30 23:58:51 TORMINT sshd\[9055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.207.177.132  user=root
Nov 30 23:58:52 TORMINT sshd\[9055\]: Failed password for root from 183.207.177.132 port 33544 ssh2
Nov 30 23:59:04 TORMINT sshd\[9064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.207.177.132  user=root
...
2019-12-01 13:00:25
36.110.217.169 attackbotsspam
Dec  1 01:46:15 markkoudstaal sshd[1592]: Failed password for root from 36.110.217.169 port 49658 ssh2
Dec  1 01:49:46 markkoudstaal sshd[1983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.110.217.169
Dec  1 01:49:48 markkoudstaal sshd[1983]: Failed password for invalid user scarab from 36.110.217.169 port 49130 ssh2
2019-12-01 08:57:52
61.163.190.49 attackbots
Invalid user ziehn from 61.163.190.49 port 59107
2019-12-01 08:51:43
112.85.42.186 attackspam
Dec  1 06:08:32 areeb-Workstation sshd[6986]: Failed password for root from 112.85.42.186 port 19969 ssh2
...
2019-12-01 08:51:21
37.47.79.177 attack
Brute force SMTP login attempts.
2019-12-01 13:14:56
222.186.42.4 attack
Dec  1 01:03:41 zeus sshd[31620]: Failed password for root from 222.186.42.4 port 16310 ssh2
Dec  1 01:03:44 zeus sshd[31620]: Failed password for root from 222.186.42.4 port 16310 ssh2
Dec  1 01:03:49 zeus sshd[31620]: Failed password for root from 222.186.42.4 port 16310 ssh2
Dec  1 01:03:53 zeus sshd[31620]: Failed password for root from 222.186.42.4 port 16310 ssh2
Dec  1 01:03:56 zeus sshd[31620]: Failed password for root from 222.186.42.4 port 16310 ssh2
2019-12-01 09:04:47

最近上报的IP列表

243.135.142.112 253.172.50.74 211.148.215.231 134.249.195.145
51.184.68.195 29.239.76.95 92.141.77.12 23.211.93.100
63.156.35.120 51.150.83.24 184.217.169.190 179.162.6.61
81.80.184.16 236.180.31.43 148.177.12.72 126.255.42.123
103.38.20.145 239.164.110.93 190.90.64.168 150.218.44.183