必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.130.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.130.18.			IN	A

;; AUTHORITY SECTION:
.			206	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 12:17:38 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 18.130.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.130.16.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
47.74.231.192 attackbotsspam
2019-09-15T16:59:37.383777lon01.zurich-datacenter.net sshd\[12525\]: Invalid user brands from 47.74.231.192 port 45684
2019-09-15T16:59:37.390309lon01.zurich-datacenter.net sshd\[12525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.231.192
2019-09-15T16:59:39.891318lon01.zurich-datacenter.net sshd\[12525\]: Failed password for invalid user brands from 47.74.231.192 port 45684 ssh2
2019-09-15T17:04:30.501558lon01.zurich-datacenter.net sshd\[12652\]: Invalid user elasticsearch from 47.74.231.192 port 60700
2019-09-15T17:04:30.507478lon01.zurich-datacenter.net sshd\[12652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.231.192
...
2019-09-16 03:09:59
63.175.159.27 attackspam
Sep 16 01:57:20 webhost01 sshd[20353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.175.159.27
Sep 16 01:57:22 webhost01 sshd[20353]: Failed password for invalid user user from 63.175.159.27 port 38438 ssh2
...
2019-09-16 03:24:53
23.129.64.166 attackspambots
www.belitungshipwreck.org 23.129.64.166 \[15/Sep/2019:20:00:48 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 509 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_13_6\) AppleWebKit/605.1.15 \(KHTML, like Gecko\) Version/11.1.2 Safari/605.1.15"
belitungshipwreck.org 23.129.64.166 \[15/Sep/2019:20:00:50 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 3793 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_13_6\) AppleWebKit/605.1.15 \(KHTML, like Gecko\) Version/11.1.2 Safari/605.1.15"
2019-09-16 03:21:01
74.62.75.164 attackspam
Sep 15 03:52:07 zimbra sshd[10362]: Invalid user gulzar from 74.62.75.164
Sep 15 03:52:07 zimbra sshd[10362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.62.75.164
Sep 15 03:52:09 zimbra sshd[10362]: Failed password for invalid user gulzar from 74.62.75.164 port 30228 ssh2
Sep 15 03:52:09 zimbra sshd[10362]: Received disconnect from 74.62.75.164 port 30228:11: Bye Bye [preauth]
Sep 15 03:52:09 zimbra sshd[10362]: Disconnected from 74.62.75.164 port 30228 [preauth]
Sep 15 04:30:33 zimbra sshd[1355]: Invalid user server from 74.62.75.164
Sep 15 04:30:33 zimbra sshd[1355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.62.75.164
Sep 15 04:30:35 zimbra sshd[1355]: Failed password for invalid user server from 74.62.75.164 port 63889 ssh2
Sep 15 04:30:36 zimbra sshd[1355]: Received disconnect from 74.62.75.164 port 63889:11: Bye Bye [preauth]
Sep 15 04:30:36 zimbra sshd[1355]: Disconnec........
-------------------------------
2019-09-16 03:27:22
46.105.157.97 attackbots
2019-09-15T19:02:11.306455abusebot-8.cloudsearch.cf sshd\[25105\]: Invalid user 0 from 46.105.157.97 port 63151
2019-09-16 03:25:48
178.12.95.173 attack
Sep 15 15:11:19 mail sshd[28969]: Invalid user rajan from 178.12.95.173
Sep 15 15:11:19 mail sshd[28969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.12.95.173
Sep 15 15:11:19 mail sshd[28969]: Invalid user rajan from 178.12.95.173
Sep 15 15:11:21 mail sshd[28969]: Failed password for invalid user rajan from 178.12.95.173 port 58120 ssh2
Sep 15 15:17:38 mail sshd[29665]: Invalid user kq from 178.12.95.173
...
2019-09-16 03:29:29
221.2.35.78 attackspambots
Sep 15 13:30:30 ny01 sshd[27412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.2.35.78
Sep 15 13:30:32 ny01 sshd[27412]: Failed password for invalid user reginaldo from 221.2.35.78 port 4284 ssh2
Sep 15 13:35:48 ny01 sshd[28320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.2.35.78
2019-09-16 03:15:56
104.168.215.181 attack
detected by Fail2Ban
2019-09-16 03:13:51
133.167.95.236 attackbotsspam
Sep 15 16:01:50 microserver sshd[4482]: Invalid user jzapata from 133.167.95.236 port 44724
Sep 15 16:01:50 microserver sshd[4482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.167.95.236
Sep 15 16:01:52 microserver sshd[4482]: Failed password for invalid user jzapata from 133.167.95.236 port 44724 ssh2
Sep 15 16:06:24 microserver sshd[5185]: Invalid user ABC123 from 133.167.95.236 port 59180
Sep 15 16:06:24 microserver sshd[5185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.167.95.236
Sep 15 16:19:39 microserver sshd[6818]: Invalid user q1w2e3r4t from 133.167.95.236 port 46088
Sep 15 16:19:39 microserver sshd[6818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.167.95.236
Sep 15 16:19:41 microserver sshd[6818]: Failed password for invalid user q1w2e3r4t from 133.167.95.236 port 46088 ssh2
Sep 15 16:24:14 microserver sshd[7513]: Invalid user shader from 133.167.95.236 po
2019-09-16 03:19:32
104.244.74.11 attackbots
Trying ports that it shouldn't be.
2019-09-16 03:18:01
203.177.70.171 attackspambots
Sep 15 20:29:55 nextcloud sshd\[15824\]: Invalid user informix from 203.177.70.171
Sep 15 20:29:55 nextcloud sshd\[15824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.177.70.171
Sep 15 20:29:58 nextcloud sshd\[15824\]: Failed password for invalid user informix from 203.177.70.171 port 53944 ssh2
...
2019-09-16 03:16:12
80.82.77.139 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-09-16 03:23:56
70.89.88.3 attackbots
Sep 15 20:40:51 nextcloud sshd\[2028\]: Invalid user user from 70.89.88.3
Sep 15 20:40:51 nextcloud sshd\[2028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.89.88.3
Sep 15 20:40:53 nextcloud sshd\[2028\]: Failed password for invalid user user from 70.89.88.3 port 42558 ssh2
...
2019-09-16 03:08:36
193.36.60.26 attackbotsspam
TR - 1H : (37)  Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TR 
 NAME ASN : ASN43391 
 
 IP : 193.36.60.26 
 
 CIDR : 193.36.60.0/24 
 
 PREFIX COUNT : 76 
 
 UNIQUE IP COUNT : 29696 
 
 
 WYKRYTE ATAKI Z ASN43391 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery 
  https://help-dysk.pl
2019-09-16 03:13:26
62.234.122.141 attackspambots
Sep 15 17:13:41 MK-Soft-VM3 sshd\[23597\]: Invalid user xmpp from 62.234.122.141 port 33773
Sep 15 17:13:41 MK-Soft-VM3 sshd\[23597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.122.141
Sep 15 17:13:44 MK-Soft-VM3 sshd\[23597\]: Failed password for invalid user xmpp from 62.234.122.141 port 33773 ssh2
...
2019-09-16 03:15:04

最近上报的IP列表

104.16.13.69 240.182.13.241 104.16.130.186 104.16.130.63
104.16.131.18 104.16.131.98 104.16.132.18 104.16.132.64
104.16.132.98 104.16.133.18 104.16.133.22 104.16.134.18
104.16.134.22 104.16.134.30 104.16.134.50 104.16.134.8
104.16.135.12 104.16.135.30 104.16.135.50 104.16.136.12