必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.16.119.50 attack
SSH login attempts.
2020-06-19 18:05:55
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.11.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46782
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.11.242.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032301 1800 900 604800 86400

;; Query time: 129 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 24 04:24:29 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 242.11.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.11.16.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.142.59.73 attackbotsspam
Attempt to log onto Postfix
2020-08-30 17:43:33
45.227.255.209 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-30T07:35:31Z and 2020-08-30T08:02:36Z
2020-08-30 17:47:09
188.166.50.57 attackspambots
ssh brute force
2020-08-30 18:03:06
103.4.217.138 attackspam
2020-08-30T06:48:47.722770vps751288.ovh.net sshd\[2636\]: Invalid user internet from 103.4.217.138 port 37864
2020-08-30T06:48:47.729378vps751288.ovh.net sshd\[2636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.4.217.138
2020-08-30T06:48:50.479823vps751288.ovh.net sshd\[2636\]: Failed password for invalid user internet from 103.4.217.138 port 37864 ssh2
2020-08-30T06:53:46.716200vps751288.ovh.net sshd\[2648\]: Invalid user fjm from 103.4.217.138 port 39017
2020-08-30T06:53:46.722972vps751288.ovh.net sshd\[2648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.4.217.138
2020-08-30 17:22:16
117.136.2.159 attack
port scan and connect, tcp 1433 (ms-sql-s)
2020-08-30 18:02:25
218.92.0.165 attackspam
Aug 30 11:44:03 minden010 sshd[339]: Failed password for root from 218.92.0.165 port 10988 ssh2
Aug 30 11:44:06 minden010 sshd[339]: Failed password for root from 218.92.0.165 port 10988 ssh2
Aug 30 11:44:09 minden010 sshd[339]: Failed password for root from 218.92.0.165 port 10988 ssh2
Aug 30 11:44:12 minden010 sshd[339]: Failed password for root from 218.92.0.165 port 10988 ssh2
...
2020-08-30 17:55:00
148.70.149.39 attackspambots
Invalid user drake from 148.70.149.39 port 33452
2020-08-30 18:01:25
168.121.51.42 attack
Unauthorized connection attempt from IP address 168.121.51.42 on Port 445(SMB)
2020-08-30 17:47:25
113.163.234.101 attackbots
Unauthorized connection attempt from IP address 113.163.234.101 on Port 445(SMB)
2020-08-30 17:33:45
113.170.128.199 attackbotsspam
Unauthorized connection attempt from IP address 113.170.128.199 on Port 445(SMB)
2020-08-30 17:56:24
113.172.129.92 attackspam
Unauthorized connection attempt from IP address 113.172.129.92 on Port 445(SMB)
2020-08-30 17:46:13
94.217.219.229 attackspam
Attempted connection to port 25.
2020-08-30 17:22:51
186.192.226.81 attack
Unauthorized connection attempt from IP address 186.192.226.81 on Port 445(SMB)
2020-08-30 17:42:15
208.109.12.104 attackspambots
$f2bV_matches
2020-08-30 17:55:29
194.114.131.86 attackbotsspam
Attempted connection to port 445.
2020-08-30 17:31:01

最近上报的IP列表

104.16.11.241 104.16.11.244 104.16.11.245 104.16.11.246
104.16.11.247 104.16.11.248 104.16.11.249 104.16.11.250
104.16.11.251 104.16.11.252 104.16.11.253 104.16.11.254
104.16.11.255 104.16.110.7 104.16.111.7 104.16.111.79
104.16.12.0 104.16.12.1 104.16.12.10 104.16.12.102