必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.202.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36280
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.202.134.			IN	A

;; AUTHORITY SECTION:
.			202	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 125 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 07:00:25 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 134.202.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.202.16.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.21.93.44 attackspambots
94.21.93.44 (HU/Hungary/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 22 08:46:26 jbs1 sshd[6737]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.169.214.217  user=root
Sep 22 08:44:30 jbs1 sshd[4582]: Failed password for root from 94.21.93.44 port 54473 ssh2
Sep 22 08:44:17 jbs1 sshd[4391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.189  user=root
Sep 22 08:44:19 jbs1 sshd[4391]: Failed password for root from 120.71.145.189 port 59136 ssh2
Sep 22 08:46:29 jbs1 sshd[6737]: Failed password for root from 95.169.214.217 port 55436 ssh2
Sep 22 08:47:47 jbs1 sshd[8178]: Failed password for root from 193.107.91.24 port 53904 ssh2

IP Addresses Blocked:

95.169.214.217 (BG/Bulgaria/-)
2020-09-22 21:00:42
141.98.9.162 attack
Invalid user support from 141.98.9.162 port 45046
2020-09-22 21:01:50
172.82.239.23 attackspambots
Sep 22 14:29:10 mail.srvfarm.net postfix/smtpd[3572593]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23]
Sep 22 14:30:13 mail.srvfarm.net postfix/smtpd[3572586]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23]
Sep 22 14:31:38 mail.srvfarm.net postfix/smtpd[3572592]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23]
Sep 22 14:31:52 mail.srvfarm.net postfix/smtpd[3572589]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23]
Sep 22 14:32:23 mail.srvfarm.net postfix/smtpd[3572593]: lost connection after STARTTLS from r23.news.eu.rvca.com[172.82.239.23]
2020-09-22 21:12:20
198.44.215.159 attack
Port 22 Scan, PTR: None
2020-09-22 21:04:01
91.134.173.100 attackspam
Invalid user daniela from 91.134.173.100 port 59782
2020-09-22 20:48:33
196.0.86.58 attackspam
Sep 22 14:43:03 mail.srvfarm.net postfix/smtpd[3579231]: warning: unknown[196.0.86.58]: SASL PLAIN authentication failed: 
Sep 22 14:43:03 mail.srvfarm.net postfix/smtpd[3579231]: lost connection after AUTH from unknown[196.0.86.58]
Sep 22 14:44:02 mail.srvfarm.net postfix/smtps/smtpd[3577475]: warning: unknown[196.0.86.58]: SASL PLAIN authentication failed: 
Sep 22 14:44:03 mail.srvfarm.net postfix/smtps/smtpd[3577475]: lost connection after AUTH from unknown[196.0.86.58]
Sep 22 14:45:36 mail.srvfarm.net postfix/smtps/smtpd[3573795]: warning: unknown[196.0.86.58]: SASL PLAIN authentication failed:
2020-09-22 21:10:55
191.238.209.170 attack
$f2bV_matches
2020-09-22 21:03:19
182.190.4.53 attackspam
Autoban   182.190.4.53 ABORTED AUTH
2020-09-22 21:04:23
156.54.170.118 attackspambots
SSH brute force
2020-09-22 21:17:08
178.62.24.145 attackbots
178.62.24.145 - - \[21/Sep/2020:21:44:01 +0200\] "POST /wp-login.php HTTP/1.0" 200 8625 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
178.62.24.145 - - \[21/Sep/2020:21:44:12 +0200\] "POST /wp-login.php HTTP/1.0" 200 8409 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
178.62.24.145 - - \[21/Sep/2020:21:44:17 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-09-22 20:52:50
51.178.50.20 attack
Brute%20Force%20SSH
2020-09-22 20:42:40
94.57.252.147 attackspam
Invalid user git from 94.57.252.147 port 33720
2020-09-22 21:17:38
91.236.175.7 attack
Sep 21 18:53:41 mail.srvfarm.net postfix/smtps/smtpd[2947603]: warning: unknown[91.236.175.7]: SASL PLAIN authentication failed: 
Sep 21 18:53:41 mail.srvfarm.net postfix/smtps/smtpd[2947603]: lost connection after AUTH from unknown[91.236.175.7]
Sep 21 18:57:18 mail.srvfarm.net postfix/smtpd[2952345]: warning: unknown[91.236.175.7]: SASL PLAIN authentication failed: 
Sep 21 18:57:18 mail.srvfarm.net postfix/smtpd[2952345]: lost connection after AUTH from unknown[91.236.175.7]
Sep 21 18:58:57 mail.srvfarm.net postfix/smtps/smtpd[2949479]: warning: unknown[91.236.175.7]: SASL PLAIN authentication failed:
2020-09-22 21:14:27
160.124.103.55 attackspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-22 21:19:34
144.34.240.47 attackspambots
2020-09-22 14:40:37 wonderland sshd[7382]: Invalid user automation from 144.34.240.47 port 35052
2020-09-22 21:03:36

最近上报的IP列表

104.16.201.35 104.16.202.35 104.16.203.134 104.16.203.35
104.16.204.136 104.16.204.33 104.16.205.136 251.188.73.90
104.16.205.85 104.16.206.28 104.16.206.85 104.16.206.96
104.16.207.28 104.16.208.139 104.16.21.94 104.16.210.64
104.16.211.42 104.16.216.130 104.16.217.130 104.16.221.24