必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.16.66.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59502
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.16.66.52.			IN	A

;; AUTHORITY SECTION:
.			536	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032101 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 22 06:09:31 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 52.66.16.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.66.16.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.70.149.66 attack
Jul  7 01:39:32 statusweb1.srvfarm.net postfix/smtps/smtpd[29806]: warning: unknown[212.70.149.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 01:39:38 statusweb1.srvfarm.net postfix/smtps/smtpd[29806]: lost connection after AUTH from unknown[212.70.149.66]
Jul  7 01:41:38 statusweb1.srvfarm.net postfix/smtps/smtpd[29806]: warning: unknown[212.70.149.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 01:41:46 statusweb1.srvfarm.net postfix/smtps/smtpd[29806]: lost connection after AUTH from unknown[212.70.149.66]
Jul  7 01:43:41 statusweb1.srvfarm.net postfix/smtps/smtpd[29806]: warning: unknown[212.70.149.66]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-07-07 07:52:40
193.169.252.21 attackbotsspam
Jul  7 01:21:42 debian-2gb-nbg1-2 kernel: \[16336308.547019\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=193.169.252.21 DST=195.201.40.59 LEN=92 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=UDP SPT=46893 DPT=17185 LEN=72
2020-07-07 07:41:17
192.241.227.139 attack
ZGrab Application Layer Scanner Detection
2020-07-07 07:38:33
218.92.0.138 attackspambots
Scanned 26 times in the last 24 hours on port 22
2020-07-07 08:14:07
113.173.254.111 attackspam
Failed password for invalid user from 113.173.254.111 port 39472 ssh2
2020-07-07 08:00:09
40.73.6.36 attackbotsspam
Failed password for invalid user from 40.73.6.36 port 10129 ssh2
2020-07-07 08:05:01
54.39.133.91 attackspam
srv02 Mass scanning activity detected Target: 12329  ..
2020-07-07 07:39:34
51.79.57.12 attack
 UDP 51.79.57.12:9090 -> port 5060, len 480
2020-07-07 07:45:16
95.155.21.83 attack
2020-07-06T23:00:45.698173 X postfix/smtpd[257953]: NOQUEUE: reject: RCPT from unknown[95.155.21.83]: 554 5.7.1 Service unavailable; Client host [95.155.21.83] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?95.155.21.83; from= to= proto=ESMTP helo=
2020-07-07 07:42:21
23.152.32.242 attackspam
2020-07-07 08:06:16
45.141.84.10 attackbotsspam
2020-07-06T22:14:16.734345dmca.cloudsearch.cf sshd[22084]: Invalid user admin from 45.141.84.10 port 33850
2020-07-06T22:14:17.033039dmca.cloudsearch.cf sshd[22084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.141.84.10
2020-07-06T22:14:16.734345dmca.cloudsearch.cf sshd[22084]: Invalid user admin from 45.141.84.10 port 33850
2020-07-06T22:14:19.349687dmca.cloudsearch.cf sshd[22084]: Failed password for invalid user admin from 45.141.84.10 port 33850 ssh2
2020-07-06T22:14:21.676817dmca.cloudsearch.cf sshd[22088]: Invalid user support from 45.141.84.10 port 63485
2020-07-06T22:14:21.824273dmca.cloudsearch.cf sshd[22088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.141.84.10
2020-07-06T22:14:21.676817dmca.cloudsearch.cf sshd[22088]: Invalid user support from 45.141.84.10 port 63485
2020-07-06T22:14:24.025149dmca.cloudsearch.cf sshd[22088]: Failed password for invalid user support from 45.141.84.1
...
2020-07-07 08:03:48
193.239.44.212 attack
193.239.44.212 - - [06/Jul/2020:15:00:48 -0600] "GET /js/mage/cookies.js HTTP/1.1" 301 463 "posturography.info" "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/533.4 (KHTML, like Gecko) Chrome/5.0.375.99 Safari/533.4"
...
2020-07-07 07:37:50
209.141.41.4 attackbotsspam
377. On Jul 6 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 209.141.41.4.
2020-07-07 08:14:19
115.66.126.142 attackbots
Failed password for invalid user from 115.66.126.142 port 35662 ssh2
2020-07-07 07:59:13
189.112.81.246 attackbots
Failed password for invalid user from 189.112.81.246 port 48686 ssh2
2020-07-07 08:15:58

最近上报的IP列表

104.16.65.76 104.160.27.245 104.161.24.98 104.161.46.212
104.168.139.93 104.168.69.26 104.17.130.20 104.17.174.39
104.17.175.39 104.17.185.204 104.17.186.204 104.17.187.204
104.17.188.204 104.17.189.204 104.17.207.65 104.17.208.65
104.17.217.248 104.17.26.52 104.17.27.76 104.17.57.69