必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.18.116.17 attack
14red.com casino spam - casino with very bad reputation
Received: from HE1EUR01HT170.eop-EUR01.prod.protection.outlook.com (2603:10a6:802:1::35) by VI1PR0501MB2301.eurprd05.prod.outlook.com with HTTPS via VI1PR0902CA0046.EURPRD09.PROD.OUTLOOK.COM; Wed, 31 Jul 2019 16:52:30 +0000 Received: from HE1EUR01FT007.eop-EUR01.prod.protection.outlook.com (10.152.0.51) by HE1EUR01HT170.eop-EUR01.prod.protection.outlook.com (10.152.1.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2136.14; Wed, 31 Jul 2019 16:52:30 +0000 Authentication-Results: spf=none (sender IP is 169.159.171.139) smtp.mailfrom=luxido.cz; hotmail.co.uk; dkim=none (message not signed) header.d=none;hotmail.co.uk; dmarc=none action=none header.from=luxido.cz; Received-SPF: None (protection.outlook.com: luxido.cz does not designate permitted sender hosts) Received: from static-public-169.159.171.igen.co.za (169.159.171.139)
2019-08-01 05:33:34
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.11.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.11.54.			IN	A

;; AUTHORITY SECTION:
.			573	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:23:07 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 54.11.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.11.18.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.204.116.176 attack
2020-01-10T06:40:26.673Z CLOSE host=85.204.116.176 port=51538 fd=4 time=20.015 bytes=3
...
2020-03-13 00:32:25
82.66.233.168 attackspam
2019-10-24T00:06:53.352Z CLOSE host=82.66.233.168 port=49232 fd=4 time=30.016 bytes=55
...
2020-03-13 01:05:59
27.104.160.176 attackbotsspam
Triggered: repeated knocking on closed ports.
2020-03-13 00:33:47
61.95.245.148 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 12-03-2020 12:30:10.
2020-03-13 00:39:09
50.47.100.106 attackbotsspam
Scan detected 2020.03.12 13:30:02 blocked until 2020.04.06 11:01:25
2020-03-13 00:43:48
82.202.212.238 attackbots
Mar 12 14:20:54 raspberrypi sshd\[7198\]: Invalid user gituser from 82.202.212.238Mar 12 14:20:55 raspberrypi sshd\[7198\]: Failed password for invalid user gituser from 82.202.212.238 port 41762 ssh2Mar 12 14:34:16 raspberrypi sshd\[9407\]: Failed password for root from 82.202.212.238 port 39040 ssh2
...
2020-03-13 01:09:21
37.142.237.6 attackbots
Unauthorized connection attempt from IP address 37.142.237.6 on Port 445(SMB)
2020-03-13 00:27:00
42.201.211.67 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 12-03-2020 12:30:09.
2020-03-13 00:44:48
82.252.129.36 attackspambots
2019-12-07T17:30:48.085Z CLOSE host=82.252.129.36 port=53288 fd=4 time=20.003 bytes=27
...
2020-03-13 01:06:46
113.53.234.130 attackbots
Unauthorized connection attempt from IP address 113.53.234.130 on Port 445(SMB)
2020-03-13 00:48:41
2607:5300:203:2be:: attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2020-03-13 00:33:19
118.172.201.204 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 00:53:50
182.160.119.154 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 12-03-2020 12:30:08.
2020-03-13 00:46:59
23.236.13.167 attackspam
firewall-block, port(s): 8000/tcp
2020-03-13 01:00:05
222.186.190.92 attack
SSH bruteforce
2020-03-13 00:24:43

最近上报的IP列表

104.18.11.155 104.18.11.51 125.209.67.11 104.18.114.56
104.18.11.96 104.18.12.102 104.18.115.56 104.18.12.104
104.18.12.217 104.18.12.211 104.18.12.21 104.18.12.200
104.18.12.34 104.18.12.53 104.18.12.155 125.21.154.30
104.18.13.21 104.18.13.34 104.18.13.217 104.18.13.102