必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.20.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.20.26.			IN	A

;; AUTHORITY SECTION:
.			245	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:48:48 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 26.20.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 26.20.18.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.76.246.149 attack
Dec 23 16:38:10 ns3042688 sshd\[15251\]: Invalid user Kaino from 180.76.246.149
Dec 23 16:38:10 ns3042688 sshd\[15251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.149 
Dec 23 16:38:13 ns3042688 sshd\[15251\]: Failed password for invalid user Kaino from 180.76.246.149 port 52396 ssh2
Dec 23 16:45:11 ns3042688 sshd\[18486\]: Invalid user craig from 180.76.246.149
Dec 23 16:45:11 ns3042688 sshd\[18486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.246.149 
...
2019-12-24 00:04:23
129.28.132.8 attack
Mar 10 02:53:39 dillonfme sshd\[29353\]: Invalid user gpadmin from 129.28.132.8 port 46608
Mar 10 02:53:39 dillonfme sshd\[29353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.132.8
Mar 10 02:53:41 dillonfme sshd\[29353\]: Failed password for invalid user gpadmin from 129.28.132.8 port 46608 ssh2
Mar 10 03:03:17 dillonfme sshd\[29920\]: User root from 129.28.132.8 not allowed because not listed in AllowUsers
Mar 10 03:03:17 dillonfme sshd\[29920\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.132.8  user=root
...
2019-12-24 00:20:36
13.113.152.0 attack
Feb 25 18:27:45 dillonfme sshd\[29523\]: Invalid user piotr from 13.113.152.0 port 58432
Feb 25 18:27:45 dillonfme sshd\[29523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.113.152.0
Feb 25 18:27:47 dillonfme sshd\[29523\]: Failed password for invalid user piotr from 13.113.152.0 port 58432 ssh2
Feb 25 18:33:02 dillonfme sshd\[29797\]: Invalid user teamspeak3 from 13.113.152.0 port 57024
Feb 25 18:33:02 dillonfme sshd\[29797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.113.152.0
...
2019-12-23 23:42:25
138.68.4.198 attackspam
Feb 25 04:46:02 dillonfme sshd\[378\]: Invalid user ftpuser from 138.68.4.198 port 59076
Feb 25 04:46:02 dillonfme sshd\[378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198
Feb 25 04:46:04 dillonfme sshd\[378\]: Failed password for invalid user ftpuser from 138.68.4.198 port 59076 ssh2
Feb 25 04:50:38 dillonfme sshd\[773\]: Invalid user hadoop from 138.68.4.198 port 56876
Feb 25 04:50:38 dillonfme sshd\[773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198
...
2019-12-23 23:51:30
188.166.101.173 attack
Dec 23 16:45:32 srv01 sshd[8173]: Invalid user vason from 188.166.101.173 port 39418
Dec 23 16:45:32 srv01 sshd[8173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.101.173
Dec 23 16:45:32 srv01 sshd[8173]: Invalid user vason from 188.166.101.173 port 39418
Dec 23 16:45:34 srv01 sshd[8173]: Failed password for invalid user vason from 188.166.101.173 port 39418 ssh2
Dec 23 16:51:51 srv01 sshd[8637]: Invalid user harkin from 188.166.101.173 port 45874
...
2019-12-24 00:23:17
124.156.55.236 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 00:21:48
112.196.54.35 attackbotsspam
Dec 23 16:51:45 vps647732 sshd[28870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.196.54.35
Dec 23 16:51:47 vps647732 sshd[28870]: Failed password for invalid user kavaler from 112.196.54.35 port 52944 ssh2
...
2019-12-24 00:12:58
129.28.96.43 attackbotsspam
Mar 19 01:20:27 yesfletchmain sshd\[8360\]: Invalid user redmine from 129.28.96.43 port 48120
Mar 19 01:20:27 yesfletchmain sshd\[8360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.96.43
Mar 19 01:20:30 yesfletchmain sshd\[8360\]: Failed password for invalid user redmine from 129.28.96.43 port 48120 ssh2
Mar 19 01:27:03 yesfletchmain sshd\[8490\]: Invalid user mobaxterm from 129.28.96.43 port 45506
Mar 19 01:27:04 yesfletchmain sshd\[8490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.96.43
...
2019-12-23 23:43:01
39.33.98.169 attackspambots
Automatic report - Port Scan Attack
2019-12-23 23:55:37
128.199.178.188 attack
ssh failed login
2019-12-24 00:08:05
212.237.63.28 attack
Dec 23 16:43:44 meumeu sshd[31404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.63.28 
Dec 23 16:43:46 meumeu sshd[31404]: Failed password for invalid user spiegel from 212.237.63.28 port 46648 ssh2
Dec 23 16:49:19 meumeu sshd[32520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.237.63.28 
...
2019-12-23 23:57:34
181.48.139.118 attackspam
Dec 23 10:52:24 TORMINT sshd\[25495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.139.118  user=root
Dec 23 10:52:26 TORMINT sshd\[25495\]: Failed password for root from 181.48.139.118 port 43110 ssh2
Dec 23 10:58:35 TORMINT sshd\[26088\]: Invalid user asterisk from 181.48.139.118
Dec 23 10:58:35 TORMINT sshd\[26088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.48.139.118
...
2019-12-24 00:07:37
192.207.205.98 attack
2019-12-23T15:23:32.778990host3.slimhost.com.ua sshd[1158422]: Invalid user hendryson from 192.207.205.98 port 57084
2019-12-23T15:23:32.783991host3.slimhost.com.ua sshd[1158422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.207.205.98
2019-12-23T15:23:32.778990host3.slimhost.com.ua sshd[1158422]: Invalid user hendryson from 192.207.205.98 port 57084
2019-12-23T15:23:34.710187host3.slimhost.com.ua sshd[1158422]: Failed password for invalid user hendryson from 192.207.205.98 port 57084 ssh2
2019-12-23T15:30:05.280096host3.slimhost.com.ua sshd[1164018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.207.205.98  user=mysql
2019-12-23T15:30:07.823222host3.slimhost.com.ua sshd[1164018]: Failed password for mysql from 192.207.205.98 port 35634 ssh2
2019-12-23T15:59:16.758338host3.slimhost.com.ua sshd[1187191]: Invalid user guest from 192.207.205.98 port 25032
2019-12-23T15:59:16.762938host3.slimhost.c
...
2019-12-24 00:04:08
196.1.208.226 attackspambots
2019-12-23T16:55:55.280238centos sshd\[24496\]: Invalid user administrator from 196.1.208.226 port 43378
2019-12-23T16:55:55.284899centos sshd\[24496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.1.208.226
2019-12-23T16:55:57.166617centos sshd\[24496\]: Failed password for invalid user administrator from 196.1.208.226 port 43378 ssh2
2019-12-24 00:19:22
137.74.167.250 attackspam
Dec 13 07:21:22 yesfletchmain sshd\[16277\]: Invalid user gp from 137.74.167.250 port 47572
Dec 13 07:21:22 yesfletchmain sshd\[16277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.167.250
Dec 13 07:21:24 yesfletchmain sshd\[16277\]: Failed password for invalid user gp from 137.74.167.250 port 47572 ssh2
Dec 13 07:26:15 yesfletchmain sshd\[16333\]: Invalid user maku from 137.74.167.250 port 51673
Dec 13 07:26:15 yesfletchmain sshd\[16333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.167.250
...
2019-12-24 00:09:19

最近上报的IP列表

104.18.20.231 104.21.65.145 104.18.20.44 104.18.20.49
104.18.20.33 104.18.20.24 104.18.20.54 104.18.20.75
104.18.20.48 104.21.65.152 104.18.20.68 104.18.20.52
104.18.20.55 104.18.20.8 104.18.20.82 104.18.200.129
104.18.20.83 104.21.65.153 125.168.227.1 104.18.200.25