必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.33.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7458
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.33.159.			IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032701 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 28 10:09:13 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 159.33.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.33.16.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
47.97.117.182 attackbotsspam
Port Scan
2019-10-17 04:13:57
106.13.144.8 attackbots
Oct 16 22:13:29 server sshd\[31208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8  user=root
Oct 16 22:13:31 server sshd\[31208\]: Failed password for root from 106.13.144.8 port 52644 ssh2
Oct 16 22:29:37 server sshd\[2834\]: Invalid user timemachine from 106.13.144.8
Oct 16 22:29:37 server sshd\[2834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8 
Oct 16 22:29:38 server sshd\[2834\]: Failed password for invalid user timemachine from 106.13.144.8 port 35232 ssh2
...
2019-10-17 03:46:48
91.208.253.222 attack
Sent mail to address hacked/leaked from Dailymotion
2019-10-17 04:01:54
51.77.147.51 attackbots
Oct 16 22:16:24 server sshd\[32109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.ip-51-77-147.eu  user=root
Oct 16 22:16:27 server sshd\[32109\]: Failed password for root from 51.77.147.51 port 60630 ssh2
Oct 16 22:26:15 server sshd\[2261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.ip-51-77-147.eu  user=root
Oct 16 22:26:17 server sshd\[2261\]: Failed password for root from 51.77.147.51 port 37512 ssh2
Oct 16 22:29:47 server sshd\[2883\]: Invalid user ping from 51.77.147.51
Oct 16 22:29:47 server sshd\[2883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.ip-51-77-147.eu 
...
2019-10-17 03:41:11
150.223.23.24 attackspambots
Oct 16 09:26:21 friendsofhawaii sshd\[14260\]: Invalid user abc123 from 150.223.23.24
Oct 16 09:26:21 friendsofhawaii sshd\[14260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.23.24
Oct 16 09:26:23 friendsofhawaii sshd\[14260\]: Failed password for invalid user abc123 from 150.223.23.24 port 41756 ssh2
Oct 16 09:29:44 friendsofhawaii sshd\[14497\]: Invalid user serendipity from 150.223.23.24
Oct 16 09:29:44 friendsofhawaii sshd\[14497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.23.24
2019-10-17 03:43:13
23.94.46.192 attackspambots
Oct 16 21:25:19 MK-Soft-Root2 sshd[2429]: Failed password for root from 23.94.46.192 port 33468 ssh2
...
2019-10-17 04:10:48
185.246.75.146 attackbots
Oct 16 20:32:27 microserver sshd[46197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.75.146  user=root
Oct 16 20:32:30 microserver sshd[46197]: Failed password for root from 185.246.75.146 port 44068 ssh2
Oct 16 20:37:56 microserver sshd[46887]: Invalid user oktoberfest from 185.246.75.146 port 55880
Oct 16 20:37:56 microserver sshd[46887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.75.146
Oct 16 20:37:58 microserver sshd[46887]: Failed password for invalid user oktoberfest from 185.246.75.146 port 55880 ssh2
Oct 16 20:48:16 microserver sshd[48274]: Invalid user support from 185.246.75.146 port 52410
Oct 16 20:48:16 microserver sshd[48274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.246.75.146
Oct 16 20:48:18 microserver sshd[48274]: Failed password for invalid user support from 185.246.75.146 port 52410 ssh2
Oct 16 20:53:21 microserver sshd[48974]: pam_unix
2019-10-17 03:55:13
95.155.2.227 attack
Automatic report - Port Scan Attack
2019-10-17 04:09:56
125.130.110.20 attackbots
2019-10-16T19:41:28.487606shield sshd\[7789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20  user=root
2019-10-16T19:41:30.580044shield sshd\[7789\]: Failed password for root from 125.130.110.20 port 44042 ssh2
2019-10-16T19:45:34.405379shield sshd\[8305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20  user=root
2019-10-16T19:45:35.935774shield sshd\[8305\]: Failed password for root from 125.130.110.20 port 34742 ssh2
2019-10-16T19:49:36.873632shield sshd\[8824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20  user=root
2019-10-17 03:51:29
222.122.31.133 attackspambots
F2B jail: sshd. Time: 2019-10-16 21:29:37, Reported by: VKReport
2019-10-17 03:47:36
212.237.14.203 attackspambots
Oct 17 02:29:59 webhost01 sshd[27844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.14.203
Oct 17 02:30:01 webhost01 sshd[27844]: Failed password for invalid user samejies from 212.237.14.203 port 44368 ssh2
...
2019-10-17 03:47:56
45.172.79.232 attackspam
Oct 16 13:36:24 our-server-hostname postfix/smtpd[15335]: connect from unknown[45.172.79.232]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct 16 13:36:29 our-server-hostname postfix/smtpd[15335]: lost connection after RCPT from unknown[45.172.79.232]
Oct 16 13:36:29 our-server-hostname postfix/smtpd[15335]: disconnect from unknown[45.172.79.232]
Oct 16 14:44:48 our-server-hostname postfix/smtpd[20452]: connect from unknown[45.172.79.232]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct 16 14:44:58 our-server-hostname postfix/smtpd[20452]: lost connection after RCPT from unknown[45.172.79.232]
Oct 16 14:44:58 our-server-hostname postfix/smtpd[20452]: disconnect from unknown[45.172.79.232]
Oct 16 14:51:24 our-server-hostname postfix/smtpd[21800]: connect from unknown[45.172.79.232]
Oct x@x
Oct x@x
Oct x@x
Oct x@x
Oct 16 14:51:32 our-server-hostname postfix/smtpd[19088]: connect from unknown[45.172.79.232]
Oct x@x
Oct x@x
Oct x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=
2019-10-17 03:54:44
200.194.28.116 attackbots
Oct 16 15:36:47 plusreed sshd[10963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.194.28.116  user=root
Oct 16 15:36:49 plusreed sshd[10963]: Failed password for root from 200.194.28.116 port 60336 ssh2
...
2019-10-17 03:57:44
51.15.87.74 attackbots
Automatic report - Banned IP Access
2019-10-17 03:41:29
220.76.107.50 attackspambots
Oct 16 09:25:30 hanapaa sshd\[20837\]: Invalid user oracle from 220.76.107.50
Oct 16 09:25:30 hanapaa sshd\[20837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
Oct 16 09:25:32 hanapaa sshd\[20837\]: Failed password for invalid user oracle from 220.76.107.50 port 54156 ssh2
Oct 16 09:29:45 hanapaa sshd\[21170\]: Invalid user johanna from 220.76.107.50
Oct 16 09:29:45 hanapaa sshd\[21170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
2019-10-17 03:41:50

最近上报的IP列表

104.16.33.158 104.16.33.160 104.16.33.161 104.16.33.162
104.16.33.163 104.16.33.164 104.16.33.165 104.16.33.166
104.16.33.167 104.16.33.168 104.16.33.169 104.16.33.170
104.16.33.171 104.16.33.172 104.16.33.173 104.16.33.174
104.16.33.175 104.16.33.176 104.16.33.177 104.16.33.178