必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.168.126.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46056
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.168.126.12.			IN	A

;; AUTHORITY SECTION:
.			567	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:36:34 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
12.126.168.104.in-addr.arpa domain name pointer 104-168-126-12-host.colocrossing.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.126.168.104.in-addr.arpa	name = 104-168-126-12-host.colocrossing.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
211.24.100.128 attackspam
Jul 21 23:58:08 localhost sshd[53398]: Invalid user nico from 211.24.100.128 port 46512
Jul 21 23:58:08 localhost sshd[53398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.100.128
Jul 21 23:58:08 localhost sshd[53398]: Invalid user nico from 211.24.100.128 port 46512
Jul 21 23:58:10 localhost sshd[53398]: Failed password for invalid user nico from 211.24.100.128 port 46512 ssh2
Jul 22 00:03:31 localhost sshd[54106]: Invalid user courtier from 211.24.100.128 port 37950
...
2020-07-22 08:15:01
121.121.91.95 attackspambots
Jul 21 20:36:25 firewall sshd[17846]: Invalid user gs from 121.121.91.95
Jul 21 20:36:26 firewall sshd[17846]: Failed password for invalid user gs from 121.121.91.95 port 48558 ssh2
Jul 21 20:44:38 firewall sshd[18122]: Invalid user weiguo from 121.121.91.95
...
2020-07-22 08:07:30
60.161.152.28 attackbots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-07-22 08:22:34
79.127.127.186 attack
Port Scan
...
2020-07-22 08:21:12
142.93.226.18 attackbotsspam
Jun 29 10:18:39 server sshd[12325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.226.18
Jun 29 10:18:41 server sshd[12325]: Failed password for invalid user sdi from 142.93.226.18 port 34094 ssh2
Jun 29 10:31:40 server sshd[12887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.226.18
Jun 29 10:31:43 server sshd[12887]: Failed password for invalid user zhangsan from 142.93.226.18 port 48128 ssh2
2020-07-22 08:17:09
60.16.242.159 attack
Invalid user sftpuser from 60.16.242.159 port 42122
2020-07-22 08:22:52
79.190.96.105 attackspambots
2020-07-21T22:37:28.330229ionos.janbro.de sshd[27481]: Invalid user deploy from 79.190.96.105 port 60014
2020-07-21T22:37:30.750552ionos.janbro.de sshd[27481]: Failed password for invalid user deploy from 79.190.96.105 port 60014 ssh2
2020-07-21T22:46:51.021210ionos.janbro.de sshd[27527]: Invalid user top from 79.190.96.105 port 44242
2020-07-21T22:46:51.229183ionos.janbro.de sshd[27527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.96.105
2020-07-21T22:46:51.021210ionos.janbro.de sshd[27527]: Invalid user top from 79.190.96.105 port 44242
2020-07-21T22:46:53.204801ionos.janbro.de sshd[27527]: Failed password for invalid user top from 79.190.96.105 port 44242 ssh2
2020-07-21T22:55:58.177064ionos.janbro.de sshd[27571]: Invalid user gitlab-runner from 79.190.96.105 port 56704
2020-07-21T22:55:58.421401ionos.janbro.de sshd[27571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.96.105
2020-07-
...
2020-07-22 08:10:21
183.134.65.197 attackspam
Invalid user meng from 183.134.65.197 port 37134
2020-07-22 08:00:29
51.68.224.53 attackspambots
Invalid user sharon from 51.68.224.53 port 44732
2020-07-22 08:12:48
157.245.252.154 attackbotsspam
Jul 21 19:47:01 NPSTNNYC01T sshd[14119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.154
Jul 21 19:47:03 NPSTNNYC01T sshd[14119]: Failed password for invalid user sdv from 157.245.252.154 port 47482 ssh2
Jul 21 19:51:58 NPSTNNYC01T sshd[15934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.252.154
...
2020-07-22 08:02:58
123.206.81.59 attackbotsspam
Jul 21 22:04:14 game-panel sshd[29751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.81.59
Jul 21 22:04:17 game-panel sshd[29751]: Failed password for invalid user brix from 123.206.81.59 port 42286 ssh2
Jul 21 22:08:45 game-panel sshd[29881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.81.59
2020-07-22 08:06:22
115.159.124.199 attackspambots
Jul 22 01:42:33 eventyay sshd[11732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.124.199
Jul 22 01:42:35 eventyay sshd[11732]: Failed password for invalid user celka from 115.159.124.199 port 53214 ssh2
Jul 22 01:45:51 eventyay sshd[11872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.124.199
...
2020-07-22 08:35:03
91.82.85.85 attackbotsspam
2020-07-21 17:12:01.259643-0500  localhost sshd[83220]: Failed password for invalid user federica from 91.82.85.85 port 50884 ssh2
2020-07-22 08:37:23
111.229.165.57 attackbots
Jun 26 02:23:54 server sshd[10651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.165.57
Jun 26 02:23:56 server sshd[10651]: Failed password for invalid user academy from 111.229.165.57 port 33156 ssh2
Jun 26 02:27:04 server sshd[10826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.165.57  user=root
Jun 26 02:27:06 server sshd[10826]: Failed password for invalid user root from 111.229.165.57 port 35522 ssh2
2020-07-22 08:09:02
119.236.20.108 attackspam
Invalid user admin from 119.236.20.108 port 52793
2020-07-22 08:07:44

最近上报的IP列表

104.168.126.113 104.168.126.124 104.168.126.126 104.168.126.131
104.168.126.128 104.168.126.132 101.109.184.25 104.168.126.134
104.168.126.136 104.168.126.142 104.168.126.139 104.168.126.150
104.168.126.14 104.168.126.152 104.168.126.148 104.168.126.157
104.168.126.154 104.168.126.146 101.109.184.29 101.109.184.54