必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.132.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.132.30.			IN	A

;; AUTHORITY SECTION:
.			145	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032502 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 26 07:03:48 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 30.132.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 30.132.16.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.163.220.61 attackbots
Multiport scan : 13 ports scanned 89 902 987 1055 1072 1095 1147 1352 5811 6129 14238 18988 40193
2019-12-07 09:17:23
185.53.88.5 attackspambots
*Port Scan* detected from 185.53.88.5 (NL/Netherlands/-). 4 hits in the last 286 seconds
2019-12-07 09:20:27
180.163.220.101 attackspam
Multiport scan : 14 ports scanned 70 427 687 1007 1119 1594 3546 3690 5902 8222 16012 19101 21571 44443
2019-12-07 09:10:26
180.163.220.126 attackbots
Multiport scan : 9 ports scanned 1032 1066 2401 3077 5050 6003 7402 16001 22939
2019-12-07 09:08:19
185.156.73.11 attack
Multiport scan : 10 ports scanned 18118 18120 18859 18860 18861 34105 34107 35734 35735 35736
2019-12-07 08:59:15
59.149.237.145 attackbots
Dec  7 05:45:14 vps666546 sshd\[10454\]: Invalid user zhou from 59.149.237.145 port 36813
Dec  7 05:45:14 vps666546 sshd\[10454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.149.237.145
Dec  7 05:45:17 vps666546 sshd\[10454\]: Failed password for invalid user zhou from 59.149.237.145 port 36813 ssh2
Dec  7 05:55:03 vps666546 sshd\[10786\]: Invalid user evelynp from 59.149.237.145 port 42455
Dec  7 05:55:03 vps666546 sshd\[10786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.149.237.145
...
2019-12-07 13:11:38
69.229.6.52 attackbotsspam
2019-12-06T23:26:04.768857abusebot-8.cloudsearch.cf sshd\[20127\]: Invalid user aaaaaa from 69.229.6.52 port 41062
2019-12-07 09:19:25
185.156.73.14 attackspambots
Fail2Ban Ban Triggered
2019-12-07 08:58:46
129.211.24.187 attackbotsspam
Dec  7 00:50:06 h2177944 sshd\[19948\]: Invalid user vk from 129.211.24.187 port 52319
Dec  7 00:50:06 h2177944 sshd\[19948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.187
Dec  7 00:50:08 h2177944 sshd\[19948\]: Failed password for invalid user vk from 129.211.24.187 port 52319 ssh2
Dec  7 01:01:12 h2177944 sshd\[21422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.187  user=backup
...
2019-12-07 08:54:24
185.175.93.25 attackbots
888/tcp 7700/tcp 9099/tcp...
[2019-10-06/12-06]1204pkt,190pt.(tcp)
2019-12-07 08:53:15
222.186.175.155 attack
Dec  7 05:59:32 nextcloud sshd\[17369\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Dec  7 05:59:34 nextcloud sshd\[17369\]: Failed password for root from 222.186.175.155 port 22458 ssh2
Dec  7 05:59:37 nextcloud sshd\[17369\]: Failed password for root from 222.186.175.155 port 22458 ssh2
...
2019-12-07 13:04:36
139.155.151.50 attackspam
Dec  6 18:47:59 sachi sshd\[13261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.151.50  user=backup
Dec  6 18:48:01 sachi sshd\[13261\]: Failed password for backup from 139.155.151.50 port 37474 ssh2
Dec  6 18:55:08 sachi sshd\[13907\]: Invalid user named from 139.155.151.50
Dec  6 18:55:08 sachi sshd\[13907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.151.50
Dec  6 18:55:10 sachi sshd\[13907\]: Failed password for invalid user named from 139.155.151.50 port 43042 ssh2
2019-12-07 13:01:55
180.163.220.124 attackbots
Automatic report - Banned IP Access
2019-12-07 09:09:08
185.53.88.96 attack
185.53.88.96 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 5, 5, 429
2019-12-07 13:12:33
185.143.223.182 attackspambots
Multiport scan : 38 ports scanned 11039 11051 11201 11233 11264 11285 11345 11346 11437 11498 11505 11512 11524 11577 11580 11582 11600 11608 11612 11618 11631 11726 11746 11748 11762 11772 11793 11800 11806 11808 11827 11843 11845 11857 11869 11961 11967 11993
2019-12-07 09:01:52

最近上报的IP列表

104.16.130.161 104.16.133.30 104.16.137.19 104.16.137.93
104.16.138.19 104.16.138.93 104.16.143.88 104.16.144.88
104.16.151.45 104.16.152.45 104.16.160.191 80.36.135.71
104.16.167.76 104.16.168.76 104.16.183.83 104.16.183.92
104.16.184.92 104.16.185.230 104.16.188.59 225.60.196.90