必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       104.16.0.0 - 104.31.255.255
CIDR:           104.16.0.0/12
NetName:        CLOUDFLARENET
NetHandle:      NET-104-16-0-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cloudflare, Inc. (CLOUD14)
RegDate:        2014-03-28
Updated:        2024-09-04
Comment:        All Cloudflare abuse reporting can be done via https://www.cloudflare.com/abuse
Comment:        Geofeed: https://api.cloudflare.com/local-ip-ranges.csv
Ref:            https://rdap.arin.net/registry/ip/104.16.0.0



OrgName:        Cloudflare, Inc.
OrgId:          CLOUD14
Address:        101 Townsend Street
City:           San Francisco
StateProv:      CA
PostalCode:     94107
Country:        US
RegDate:        2010-07-09
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/CLOUD14


OrgAbuseHandle: ABUSE2916-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-650-319-8930 
OrgAbuseEmail:  abuse@cloudflare.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE2916-ARIN

OrgRoutingHandle: CLOUD146-ARIN
OrgRoutingName:   Cloudflare-NOC
OrgRoutingPhone:  +1-650-319-8930 
OrgRoutingEmail:  noc@cloudflare.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/CLOUD146-ARIN

OrgNOCHandle: CLOUD146-ARIN
OrgNOCName:   Cloudflare-NOC
OrgNOCPhone:  +1-650-319-8930 
OrgNOCEmail:  noc@cloudflare.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/CLOUD146-ARIN

OrgTechHandle: ADMIN2521-ARIN
OrgTechName:   Admin
OrgTechPhone:  +1-650-319-8930 
OrgTechEmail:  rir@cloudflare.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ADMIN2521-ARIN

RAbuseHandle: ABUSE2916-ARIN
RAbuseName:   Abuse
RAbusePhone:  +1-650-319-8930 
RAbuseEmail:  abuse@cloudflare.com
RAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE2916-ARIN

RNOCHandle: NOC11962-ARIN
RNOCName:   NOC
RNOCPhone:  +1-650-319-8930 
RNOCEmail:  noc@cloudflare.com
RNOCRef:    https://rdap.arin.net/registry/entity/NOC11962-ARIN

RTechHandle: ADMIN2521-ARIN
RTechName:   Admin
RTechPhone:  +1-650-319-8930 
RTechEmail:  rir@cloudflare.com
RTechRef:    https://rdap.arin.net/registry/entity/ADMIN2521-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.253.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11668
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.253.120.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051802 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 19 14:56:54 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 120.253.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.253.16.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.243.252.244 attackbotsspam
Jul 14 17:43:07 TORMINT sshd\[1811\]: Invalid user rf from 103.243.252.244
Jul 14 17:43:07 TORMINT sshd\[1811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.243.252.244
Jul 14 17:43:09 TORMINT sshd\[1811\]: Failed password for invalid user rf from 103.243.252.244 port 41384 ssh2
...
2019-07-15 05:53:11
118.170.205.10 attackbots
Caught in portsentry honeypot
2019-07-15 05:52:52
185.220.101.24 attackspam
WordPress login attempts.
2019-07-15 05:24:25
37.187.0.29 attackbots
Jul 14 23:17:26 MK-Soft-Root2 sshd\[27792\]: Invalid user ghost from 37.187.0.29 port 38658
Jul 14 23:17:26 MK-Soft-Root2 sshd\[27792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.0.29
Jul 14 23:17:29 MK-Soft-Root2 sshd\[27792\]: Failed password for invalid user ghost from 37.187.0.29 port 38658 ssh2
...
2019-07-15 05:43:31
218.92.0.190 attackspambots
Jul 14 23:35:22 mail sshd\[2663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.190  user=root
Jul 14 23:35:24 mail sshd\[2663\]: Failed password for root from 218.92.0.190 port 28977 ssh2
Jul 14 23:35:26 mail sshd\[2663\]: Failed password for root from 218.92.0.190 port 28977 ssh2
Jul 14 23:35:28 mail sshd\[2663\]: Failed password for root from 218.92.0.190 port 28977 ssh2
Jul 14 23:39:46 mail sshd\[3478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.190  user=root
2019-07-15 05:55:23
132.232.52.35 attack
Jul 14 23:17:49 rpi sshd[30624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.52.35 
Jul 14 23:17:51 rpi sshd[30624]: Failed password for invalid user postgres from 132.232.52.35 port 45314 ssh2
2019-07-15 05:31:57
5.135.165.51 attack
Jul 14 23:31:02 eventyay sshd[8383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.165.51
Jul 14 23:31:04 eventyay sshd[8383]: Failed password for invalid user install from 5.135.165.51 port 35784 ssh2
Jul 14 23:35:38 eventyay sshd[9455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.165.51
...
2019-07-15 05:39:00
2604:a880:0:1010::2b7d:6001 attackspam
PHI,WP GET /wp-login.php
2019-07-15 05:20:37
197.243.60.218 attack
Sent mail to generic email address never used before.
2019-07-15 05:51:07
211.23.61.194 attack
Jul 15 02:59:57 vibhu-HP-Z238-Microtower-Workstation sshd\[23992\]: Invalid user nagios from 211.23.61.194
Jul 15 02:59:57 vibhu-HP-Z238-Microtower-Workstation sshd\[23992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.61.194
Jul 15 02:59:59 vibhu-HP-Z238-Microtower-Workstation sshd\[23992\]: Failed password for invalid user nagios from 211.23.61.194 port 50220 ssh2
Jul 15 03:05:27 vibhu-HP-Z238-Microtower-Workstation sshd\[24212\]: Invalid user ma from 211.23.61.194
Jul 15 03:05:27 vibhu-HP-Z238-Microtower-Workstation sshd\[24212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.23.61.194
...
2019-07-15 05:43:46
76.115.138.33 attackspam
Jul 14 17:32:00 TORMINT sshd\[1046\]: Invalid user joh from 76.115.138.33
Jul 14 17:32:00 TORMINT sshd\[1046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.115.138.33
Jul 14 17:32:02 TORMINT sshd\[1046\]: Failed password for invalid user joh from 76.115.138.33 port 37156 ssh2
...
2019-07-15 05:54:53
23.251.128.200 attackspambots
Jul 14 23:47:00 mail sshd\[4709\]: Invalid user guest from 23.251.128.200 port 36852
Jul 14 23:47:00 mail sshd\[4709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.251.128.200
Jul 14 23:47:02 mail sshd\[4709\]: Failed password for invalid user guest from 23.251.128.200 port 36852 ssh2
Jul 14 23:51:30 mail sshd\[5558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.251.128.200  user=root
Jul 14 23:51:32 mail sshd\[5558\]: Failed password for root from 23.251.128.200 port 35867 ssh2
2019-07-15 05:58:04
190.0.159.86 attackbotsspam
Jul 14 23:30:06 localhost sshd\[20312\]: Invalid user pradeep from 190.0.159.86
Jul 14 23:30:06 localhost sshd\[20312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.86
Jul 14 23:30:08 localhost sshd\[20312\]: Failed password for invalid user pradeep from 190.0.159.86 port 55982 ssh2
Jul 14 23:36:54 localhost sshd\[20637\]: Invalid user acs from 190.0.159.86
Jul 14 23:36:54 localhost sshd\[20637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.86
...
2019-07-15 05:52:06
92.249.148.32 attackbots
2019-07-14T21:17:54.066500abusebot-3.cloudsearch.cf sshd\[27807\]: Invalid user david from 92.249.148.32 port 54112
2019-07-15 05:30:25
153.36.242.114 attackbots
Triggered by Fail2Ban at Ares web server
2019-07-15 06:03:13

最近上报的IP列表

2606:4700:10::6814:9512 2606:4700:10::6816:4580 2606:4700:10::6814:6800 45.156.129.163
45.156.129.161 45.156.129.160 45.156.129.162 121.14.11.50
69.5.169.214 43.156.51.128 120.232.251.11 2606:4700:10::6814:9165
2606:4700:10::6814:9335 103.236.86.94 104.16.254.120 20.12.237.107
139.155.134.17 43.128.87.4 14.212.61.101 2606:4700:10::ac43:944