必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.20.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47673
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.20.104.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 14:34:28 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 104.20.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.20.18.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.57.236.202 attackspam
(From edwardfrancis792@gmail.com) Greetings!

I'm an online digital marketer, and I just finished conducting some SEO reporting tests on your site. The results showed a few issues preventing it from being easily found by people searching online for products/services relevant to your business. There's also a great amount of additional web traffic we can get you by making your website get a better placement on the search engine results with search engine optimization.

I'd really like to discuss with you more helpful information about this, so please reply let me know if you're interested. I can also provide a free consultation to present you the data about your website's potential and where I can take it further. Don't worry about my rates since they're considered cheap even by small start-up companies.

I hope to speak with you and share some helpful insights. Just let me know about the best time to give you a call. Talk to you soon! 

Best regards,
Edward Francis
2019-12-11 20:16:40
36.76.255.92 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-12-2019 06:25:22.
2019-12-11 20:32:53
190.200.4.98 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-11 20:56:49
202.61.85.33 attack
2019-12-11T06:25:40.414127abusebot-4.cloudsearch.cf sshd\[11709\]: Invalid user rpc from 202.61.85.33 port 44698
2019-12-11 20:13:42
139.59.22.169 attackbotsspam
Dec  9 16:39:28 heissa sshd\[32533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.22.169  user=root
Dec  9 16:39:30 heissa sshd\[32533\]: Failed password for root from 139.59.22.169 port 50860 ssh2
Dec  9 16:48:25 heissa sshd\[1504\]: Invalid user admin from 139.59.22.169 port 35768
Dec  9 16:48:25 heissa sshd\[1504\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.22.169
Dec  9 16:48:27 heissa sshd\[1504\]: Failed password for invalid user admin from 139.59.22.169 port 35768 ssh2
2019-12-11 20:57:56
113.170.125.170 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-12-2019 06:25:15.
2019-12-11 20:48:56
137.226.113.56 attack
UTC: 2019-12-10 port: 102/tcp
2019-12-11 20:25:05
88.119.196.11 attackspam
Unauthorized connection attempt detected from IP address 88.119.196.11 to port 445
2019-12-11 20:49:42
106.12.13.247 attackbotsspam
Dec 11 04:53:14 ny01 sshd[9819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247
Dec 11 04:53:16 ny01 sshd[9819]: Failed password for invalid user http from 106.12.13.247 port 47258 ssh2
Dec 11 04:59:35 ny01 sshd[10918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247
2019-12-11 20:15:12
82.81.211.248 attackspambots
Dec 11 11:38:42 freya sshd[24664]: Did not receive identification string from 82.81.211.248 port 36120
Dec 11 11:56:07 freya sshd[27252]: Connection closed by 82.81.211.248 port 53247 [preauth]
Dec 11 12:00:22 freya sshd[27883]: Connection closed by 82.81.211.248 port 57465 [preauth]
Dec 11 12:04:38 freya sshd[28506]: Connection closed by 82.81.211.248 port 33428 [preauth]
Dec 11 12:08:52 freya sshd[29148]: Connection closed by 82.81.211.248 port 37627 [preauth]
...
2019-12-11 20:43:35
50.127.71.5 attackbotsspam
SSH Brute Force
2019-12-11 20:19:36
103.236.134.13 attackspam
Dec 11 11:56:15 v22018086721571380 sshd[8528]: Failed password for invalid user admin from 103.236.134.13 port 35322 ssh2
Dec 11 13:01:57 v22018086721571380 sshd[12932]: Failed password for invalid user koln from 103.236.134.13 port 34462 ssh2
2019-12-11 20:59:57
89.109.23.190 attackspam
Dec 11 02:47:27 eddieflores sshd\[9029\]: Invalid user pul from 89.109.23.190
Dec 11 02:47:27 eddieflores sshd\[9029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.23.190
Dec 11 02:47:29 eddieflores sshd\[9029\]: Failed password for invalid user pul from 89.109.23.190 port 58456 ssh2
Dec 11 02:53:09 eddieflores sshd\[9584\]: Invalid user deetta from 89.109.23.190
Dec 11 02:53:09 eddieflores sshd\[9584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.109.23.190
2019-12-11 20:53:47
122.51.57.78 attack
SSH Bruteforce attempt
2019-12-11 20:37:34
202.98.213.218 attack
2019-12-11T07:45:24.587582scmdmz1 sshd\[1508\]: Invalid user lo9\;p0' from 202.98.213.218 port 21147
2019-12-11T07:45:24.590129scmdmz1 sshd\[1508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.98.213.218
2019-12-11T07:45:26.641954scmdmz1 sshd\[1508\]: Failed password for invalid user lo9\;p0' from 202.98.213.218 port 21147 ssh2
...
2019-12-11 20:47:52

最近上报的IP列表

104.18.20.100 104.18.20.119 104.18.20.120 104.18.20.130
104.18.20.14 154.16.147.58 104.18.20.140 104.18.20.145
104.18.20.155 104.18.20.157 104.18.20.158 104.18.20.187
104.18.20.188 104.18.20.2 78.110.30.34 104.18.20.203
104.18.20.208 104.18.20.212 104.18.20.230 104.18.20.236