必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.255.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.255.168.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052300 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 24 01:31:32 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 168.255.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.255.16.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.99.144.16 attackbots
May  2 15:43:01 server sshd\[242301\]: Invalid user zabbix from 139.99.144.16
May  2 15:43:01 server sshd\[242301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.144.16
May  2 15:43:03 server sshd\[242301\]: Failed password for invalid user zabbix from 139.99.144.16 port 48362 ssh2
...
2019-07-12 06:30:44
14.142.57.66 attackspambots
May 10 05:18:44 server sshd\[40792\]: Invalid user chai from 14.142.57.66
May 10 05:18:44 server sshd\[40792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.142.57.66
May 10 05:18:46 server sshd\[40792\]: Failed password for invalid user chai from 14.142.57.66 port 56310 ssh2
...
2019-07-12 06:22:38
139.59.82.78 attackspambots
Jul  6 06:11:31 server sshd\[235813\]: Invalid user wwwadmin from 139.59.82.78
Jul  6 06:11:31 server sshd\[235813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.82.78
Jul  6 06:11:33 server sshd\[235813\]: Failed password for invalid user wwwadmin from 139.59.82.78 port 34796 ssh2
...
2019-07-12 06:39:54
113.23.109.29 attackspam
Jul 11 15:57:26 mxgate1 postfix/postscreen[28241]: CONNECT from [113.23.109.29]:12557 to [176.31.12.44]:25
Jul 11 15:57:26 mxgate1 postfix/dnsblog[28410]: addr 113.23.109.29 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 11 15:57:26 mxgate1 postfix/dnsblog[28410]: addr 113.23.109.29 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 11 15:57:26 mxgate1 postfix/dnsblog[28410]: addr 113.23.109.29 listed by domain zen.spamhaus.org as 127.0.0.10
Jul 11 15:57:26 mxgate1 postfix/dnsblog[28411]: addr 113.23.109.29 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 11 15:57:26 mxgate1 postfix/dnsblog[28409]: addr 113.23.109.29 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 11 15:57:32 mxgate1 postfix/postscreen[28241]: DNSBL rank 4 for [113.23.109.29]:12557
Jul x@x
Jul 11 15:57:33 mxgate1 postfix/postscreen[28241]: HANGUP after 1.1 from [113.23.109.29]:12557 in tests after SMTP handshake
Jul 11 15:57:33 mxgate1 postfix/postscreen[28241]: DISCONNECT [113.23.109.29]:........
-------------------------------
2019-07-12 06:52:29
94.74.141.237 attackspam
Jul 11 15:53:28 rigel postfix/smtpd[17690]: connect from unknown[94.74.141.237]
Jul 11 15:53:30 rigel postfix/smtpd[17690]: warning: unknown[94.74.141.237]: SASL CRAM-MD5 authentication failed: authentication failure
Jul 11 15:53:30 rigel postfix/smtpd[17690]: warning: unknown[94.74.141.237]: SASL PLAIN authentication failed: authentication failure
Jul 11 15:53:31 rigel postfix/smtpd[17690]: warning: unknown[94.74.141.237]: SASL LOGIN authentication failed: authentication failure


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.74.141.237
2019-07-12 06:06:07
176.126.83.22 attackbotsspam
\[2019-07-12 00:11:31\] NOTICE\[9010\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '176.126.83.22:1229' \(callid: 647673507-1152647609-1769992082\) - Failed to authenticate
\[2019-07-12 00:11:31\] SECURITY\[3671\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-07-12T00:11:31.212+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="647673507-1152647609-1769992082",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/176.126.83.22/1229",Challenge="1562883091/bf2a62b835046c9efe3b39458b2120e5",Response="a09e4623f7a621f032ed2c9abe7a43e7",ExpectedResponse=""
\[2019-07-12 00:11:31\] NOTICE\[11540\] res_pjsip/pjsip_distributor.c: Request 'REGISTER' from '\' failed for '176.126.83.22:1229' \(callid: 647673507-1152647609-1769992082\) - Failed to authenticate
\[2019-07-12 00:11:31\] SECURITY\[3671\] res_security_log.c: SecurityEvent="ChallengeResponseFai
2019-07-12 06:15:37
14.118.234.24 attackspambots
Apr 23 03:08:18 server sshd\[58163\]: Invalid user gas from 14.118.234.24
Apr 23 03:08:18 server sshd\[58163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.118.234.24
Apr 23 03:08:20 server sshd\[58163\]: Failed password for invalid user gas from 14.118.234.24 port 35026 ssh2
...
2019-07-12 06:24:37
14.161.9.171 attack
Unauthorized connection attempt from IP address 14.161.9.171 on Port 445(SMB)
2019-07-12 06:51:59
14.246.4.7 attackspambots
Jul  2 09:16:24 server sshd\[152450\]: Invalid user admin from 14.246.4.7
Jul  2 09:16:24 server sshd\[152450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.246.4.7
Jul  2 09:16:26 server sshd\[152450\]: Failed password for invalid user admin from 14.246.4.7 port 60356 ssh2
...
2019-07-12 06:08:31
14.41.77.225 attackbots
Jul 11 23:29:28 tux-35-217 sshd\[28274\]: Invalid user nagiosadmin from 14.41.77.225 port 49164
Jul 11 23:29:28 tux-35-217 sshd\[28274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.41.77.225
Jul 11 23:29:29 tux-35-217 sshd\[28274\]: Failed password for invalid user nagiosadmin from 14.41.77.225 port 49164 ssh2
Jul 11 23:35:32 tux-35-217 sshd\[28431\]: Invalid user jane from 14.41.77.225 port 50496
Jul 11 23:35:32 tux-35-217 sshd\[28431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.41.77.225
...
2019-07-12 06:04:37
185.220.102.8 attackspam
Jul 11 23:49:45 bouncer sshd\[26101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.102.8  user=root
Jul 11 23:49:48 bouncer sshd\[26101\]: Failed password for root from 185.220.102.8 port 44099 ssh2
Jul 11 23:49:49 bouncer sshd\[26101\]: Failed password for root from 185.220.102.8 port 44099 ssh2
...
2019-07-12 06:11:42
45.55.88.21 attackspam
Apr  7 06:17:20 mail sshd\[39448\]: Invalid user car from 45.55.88.21
Apr  7 06:17:20 mail sshd\[39448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.21
Apr  7 06:17:22 mail sshd\[39448\]: Failed password for invalid user car from 45.55.88.21 port 46244 ssh2
Apr  7 06:21:42 mail sshd\[39480\]: Invalid user jr from 45.55.88.21
Apr  7 06:21:42 mail sshd\[39480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.21
Apr  7 06:21:44 mail sshd\[39480\]: Failed password for invalid user jr from 45.55.88.21 port 44206 ssh2
Apr  7 06:24:26 mail sshd\[39514\]: Invalid user js from 45.55.88.21
Apr  7 06:24:26 mail sshd\[39514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.21
Apr  7 06:24:28 mail sshd\[39514\]: Failed password for invalid user js from 45.55.88.21 port 34066 ssh2
Apr  7 06:27:12 mail sshd\[39826\]: Invalid user hosts from 45.55.88.21
2019-07-12 06:12:15
14.186.117.98 attackbotsspam
Apr 18 00:48:07 server sshd\[129263\]: Invalid user student8 from 14.186.117.98
Apr 18 00:48:07 server sshd\[129263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.186.117.98
Apr 18 00:48:09 server sshd\[129263\]: Failed password for invalid user student8 from 14.186.117.98 port 37568 ssh2
...
2019-07-12 06:16:40
14.36.118.74 attackspambots
Jun 16 17:08:53 server sshd\[36711\]: Invalid user ralf from 14.36.118.74
Jun 16 17:08:53 server sshd\[36711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.36.118.74
Jun 16 17:08:55 server sshd\[36711\]: Failed password for invalid user ralf from 14.36.118.74 port 35314 ssh2
...
2019-07-12 06:05:00
114.236.201.150 attack
Automatic report - Banned IP Access
2019-07-12 06:28:14

最近上报的IP列表

104.16.252.32 104.16.26.82 104.16.31.109 104.16.38.63
104.16.40.32 104.16.41.91 104.16.43.83 104.16.45.48
104.16.45.63 104.16.46.63 104.16.46.84 104.16.47.84
104.16.48.79 104.16.52.129 104.16.56.76 104.16.57.76
104.16.58.76 104.16.59.76 104.16.6.238 104.16.60.76