必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.16.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.16.53.			IN	A

;; AUTHORITY SECTION:
.			424	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 14:06:18 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 53.16.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.16.16.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.241.193.116 attackspam
Sep 11 20:49:16 tdfoods sshd\[29010\]: Invalid user teamspeak1 from 162.241.193.116
Sep 11 20:49:16 tdfoods sshd\[29010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.193.116
Sep 11 20:49:19 tdfoods sshd\[29010\]: Failed password for invalid user teamspeak1 from 162.241.193.116 port 45556 ssh2
Sep 11 20:55:32 tdfoods sshd\[29524\]: Invalid user m1n3cr@ft from 162.241.193.116
Sep 11 20:55:32 tdfoods sshd\[29524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.241.193.116
2019-09-12 14:56:06
134.209.81.60 attack
Sep 12 02:55:16 plusreed sshd[17367]: Invalid user 1 from 134.209.81.60
...
2019-09-12 14:59:59
134.209.21.83 attack
Sep 12 09:09:54 minden010 sshd[4599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.21.83
Sep 12 09:09:56 minden010 sshd[4599]: Failed password for invalid user demo from 134.209.21.83 port 36308 ssh2
Sep 12 09:15:56 minden010 sshd[8834]: Failed password for www-data from 134.209.21.83 port 47814 ssh2
...
2019-09-12 15:32:52
82.200.80.46 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 03:41:55,038 INFO [amun_request_handler] PortScan Detected on Port: 445 (82.200.80.46)
2019-09-12 15:11:09
179.217.182.149 attackspambots
DATE:2019-09-12 05:56:02, IP:179.217.182.149, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-09-12 15:09:09
188.136.244.3 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 03:42:01,045 INFO [amun_request_handler] PortScan Detected on Port: 445 (188.136.244.3)
2019-09-12 15:07:40
157.230.91.45 attackbots
Sep 11 21:02:31 hpm sshd\[19124\]: Invalid user 123456 from 157.230.91.45
Sep 11 21:02:31 hpm sshd\[19124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45
Sep 11 21:02:33 hpm sshd\[19124\]: Failed password for invalid user 123456 from 157.230.91.45 port 57862 ssh2
Sep 11 21:08:20 hpm sshd\[19656\]: Invalid user sysadmin123 from 157.230.91.45
Sep 11 21:08:20 hpm sshd\[19656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45
2019-09-12 15:20:22
66.167.77.252 attack
Brute force attempt
2019-09-12 15:19:35
114.47.213.223 attack
Telnet Server BruteForce Attack
2019-09-12 15:02:28
218.98.26.166 attack
Reported by AbuseIPDB proxy server.
2019-09-12 15:41:52
80.17.244.2 attackbotsspam
Sep 12 08:49:31 mail sshd\[3769\]: Invalid user teamspeak from 80.17.244.2 port 47876
Sep 12 08:49:31 mail sshd\[3769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.17.244.2
Sep 12 08:49:33 mail sshd\[3769\]: Failed password for invalid user teamspeak from 80.17.244.2 port 47876 ssh2
Sep 12 08:55:53 mail sshd\[4847\]: Invalid user vnc from 80.17.244.2 port 43688
Sep 12 08:55:53 mail sshd\[4847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.17.244.2
2019-09-12 15:14:19
138.68.18.66 attackbotsspam
138.68.18.66 - - \[12/Sep/2019:05:56:20 +0200\] "POST /wp-login.php HTTP/1.1" 200 2111 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.68.18.66 - - \[12/Sep/2019:05:56:22 +0200\] "POST /wp-login.php HTTP/1.1" 200 2092 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-09-12 14:43:40
60.176.39.83 attackspam
Lines containing failures of 60.176.39.83
Sep 12 07:30:07 hvs sshd[32388]: error: maximum authentication attempts exceeded for r.r from 60.176.39.83 port 35354 ssh2 [preauth]
Sep 12 07:30:07 hvs sshd[32388]: Disconnecting authenticating user r.r 60.176.39.83 port 35354: Too many authentication failures [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=60.176.39.83
2019-09-12 15:08:46
165.231.212.58 attackspambots
Automatic report - Banned IP Access
2019-09-12 15:03:26
222.186.15.101 attackbotsspam
12.09.2019 07:18:38 SSH access blocked by firewall
2019-09-12 15:16:23

最近上报的IP列表

104.17.244.82 104.16.16.45 104.16.16.7 104.16.16.6
104.16.16.8 104.16.16.54 104.16.16.9 104.16.165.13
104.16.166.13 104.16.164.229 104.16.165.229 104.16.170.230
104.17.245.74 104.16.173.247 104.16.173.82 104.16.171.4
104.16.175.51 104.16.174.82 104.16.173.24 104.16.180.236