必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.162.132.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33646
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.162.132.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 18:17:03 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
12.132.162.104.in-addr.arpa domain name pointer syn-104-162-132-012.res.spectrum.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.132.162.104.in-addr.arpa	name = syn-104-162-132-012.res.spectrum.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
47.149.93.97 attackspambots
Oct 11 05:22:17 firewall sshd[12070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.149.93.97  user=root
Oct 11 05:22:19 firewall sshd[12070]: Failed password for root from 47.149.93.97 port 59298 ssh2
Oct 11 05:25:45 firewall sshd[12420]: Invalid user abcd from 47.149.93.97
...
2020-10-11 23:55:29
49.88.112.111 attack
Oct 11 15:55:31 email sshd\[22254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Oct 11 15:55:32 email sshd\[22254\]: Failed password for root from 49.88.112.111 port 50179 ssh2
Oct 11 15:56:27 email sshd\[22405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
Oct 11 15:56:29 email sshd\[22405\]: Failed password for root from 49.88.112.111 port 26881 ssh2
Oct 11 15:57:18 email sshd\[22558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.111  user=root
...
2020-10-12 00:09:16
218.92.0.250 attackbotsspam
Oct 11 17:37:20 marvibiene sshd[22972]: Failed password for root from 218.92.0.250 port 63832 ssh2
Oct 11 17:37:25 marvibiene sshd[22972]: Failed password for root from 218.92.0.250 port 63832 ssh2
2020-10-11 23:44:49
51.223.146.4 attackbots
Unauthorized connection attempt from IP address 51.223.146.4 on Port 445(SMB)
2020-10-12 00:15:30
195.154.232.205 attackbots
hzb4 195.154.232.205 [11/Oct/2020:03:03:58 "-" "POST /wp-login.php 200 2309
195.154.232.205 [11/Oct/2020:22:17:32 "-" "GET /wp-login.php 200 2189
195.154.232.205 [11/Oct/2020:22:17:34 "-" "POST /wp-login.php 200 2309
2020-10-12 00:14:01
82.200.226.226 attackbots
Oct 11 20:55:09 dhoomketu sshd[3765399]: Failed password for root from 82.200.226.226 port 51812 ssh2
Oct 11 20:57:05 dhoomketu sshd[3765459]: Invalid user bianka from 82.200.226.226 port 51326
Oct 11 20:57:05 dhoomketu sshd[3765459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.200.226.226 
Oct 11 20:57:05 dhoomketu sshd[3765459]: Invalid user bianka from 82.200.226.226 port 51326
Oct 11 20:57:08 dhoomketu sshd[3765459]: Failed password for invalid user bianka from 82.200.226.226 port 51326 ssh2
...
2020-10-11 23:41:57
218.92.0.248 attack
2020-10-11T18:39:14.011211lavrinenko.info sshd[12026]: Failed password for root from 218.92.0.248 port 4790 ssh2
2020-10-11T18:39:18.976335lavrinenko.info sshd[12026]: Failed password for root from 218.92.0.248 port 4790 ssh2
2020-10-11T18:39:24.405947lavrinenko.info sshd[12026]: Failed password for root from 218.92.0.248 port 4790 ssh2
2020-10-11T18:39:29.048844lavrinenko.info sshd[12026]: Failed password for root from 218.92.0.248 port 4790 ssh2
2020-10-11T18:39:32.060356lavrinenko.info sshd[12026]: Failed password for root from 218.92.0.248 port 4790 ssh2
...
2020-10-12 00:06:50
114.67.83.42 attackspam
Oct 11 15:39:18 *hidden* sshd[34522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.83.42 Oct 11 15:39:20 *hidden* sshd[34522]: Failed password for invalid user nieto from 114.67.83.42 port 40842 ssh2 Oct 11 15:43:12 *hidden* sshd[34616]: Invalid user silja from 114.67.83.42 port 50270
2020-10-11 23:42:54
154.221.19.204 attack
SSH login attempts.
2020-10-11 23:51:46
188.166.211.91 attackspam
Unauthorised access (Oct 10) SRC=188.166.211.91 LEN=40 TTL=245 ID=19616 TCP DPT=443 WINDOW=5840
2020-10-12 00:04:53
112.249.237.26 attack
20/10/10@16:46:19: FAIL: IoT-Telnet address from=112.249.237.26
...
2020-10-11 23:46:39
185.42.170.203 attackbots
Oct 11 01:50:38 ssh2 sshd[34372]: Invalid user admin from 185.42.170.203 port 42213
Oct 11 01:50:39 ssh2 sshd[34372]: Failed password for invalid user admin from 185.42.170.203 port 42213 ssh2
Oct 11 01:50:39 ssh2 sshd[34372]: Connection closed by invalid user admin 185.42.170.203 port 42213 [preauth]
...
2020-10-12 00:07:16
103.245.181.2 attackbotsspam
Automatic report - Banned IP Access
2020-10-11 23:57:49
141.98.80.22 attackbots
Fail2Ban Ban Triggered
2020-10-12 00:23:22
180.226.47.134 attackspam
Oct 10 23:58:31 server1 sshd[12153]: Bad protocol version identification 'GET / HTTP/1.1' from 180.226.47.134 port 57889
Oct 10 23:59:04 server1 sshd[14469]: Bad protocol version identification 'GET / HTTP/1.1' from 180.226.47.134 port 58396
Oct 10 23:59:08 server1 sshd[14843]: Bad protocol version identification 'GET / HTTP/1.1' from 180.226.47.134 port 58491
...
2020-10-11 23:49:36

最近上报的IP列表

87.238.26.166 77.187.62.184 169.152.111.121 143.190.53.26
253.255.190.166 38.54.0.131 93.53.29.13 148.117.138.54
81.23.45.94 243.227.57.149 133.45.36.112 52.130.23.153
247.140.84.133 223.103.73.231 184.173.77.149 203.170.23.136
194.112.6.132 136.105.233.127 226.154.47.37 199.67.126.166