必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.216.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52666
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.216.68.			IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 17:53:23 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 68.216.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.216.18.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.61.128.209 attack
(mod_security) mod_security (id:210492) triggered by 217.61.128.209 (ES/Spain/server.disiarte.com): 5 in the last 300 secs
2020-08-24 08:23:38
186.4.235.4 attackbots
Aug 23 23:53:15 OPSO sshd\[24748\]: Invalid user ubuntu from 186.4.235.4 port 56244
Aug 23 23:53:15 OPSO sshd\[24748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.235.4
Aug 23 23:53:16 OPSO sshd\[24748\]: Failed password for invalid user ubuntu from 186.4.235.4 port 56244 ssh2
Aug 23 23:57:18 OPSO sshd\[25515\]: Invalid user odoo from 186.4.235.4 port 36292
Aug 23 23:57:18 OPSO sshd\[25515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.235.4
2020-08-24 08:16:30
138.59.17.40 attack
2020-08-23T20:32:07.234424shield sshd\[14062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.59.17.40  user=root
2020-08-23T20:32:09.338934shield sshd\[14062\]: Failed password for root from 138.59.17.40 port 37454 ssh2
2020-08-23T20:32:11.206794shield sshd\[14062\]: Failed password for root from 138.59.17.40 port 37454 ssh2
2020-08-23T20:32:14.052973shield sshd\[14062\]: Failed password for root from 138.59.17.40 port 37454 ssh2
2020-08-23T20:32:16.298231shield sshd\[14062\]: Failed password for root from 138.59.17.40 port 37454 ssh2
2020-08-24 08:15:55
80.82.78.100 attackbots
80.82.78.100 was recorded 8 times by 4 hosts attempting to connect to the following ports: 1023,998. Incident counter (4h, 24h, all-time): 8, 13, 29461
2020-08-24 08:09:46
106.51.50.2 attackspambots
Aug 23 22:44:54 PorscheCustomer sshd[30258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.50.2
Aug 23 22:44:55 PorscheCustomer sshd[30258]: Failed password for invalid user admin from 106.51.50.2 port 36348 ssh2
Aug 23 22:48:07 PorscheCustomer sshd[30376]: Failed password for root from 106.51.50.2 port 38379 ssh2
...
2020-08-24 07:54:38
192.144.185.74 attack
Aug 23 23:27:41 home sshd[3907216]: Failed password for root from 192.144.185.74 port 59106 ssh2
Aug 23 23:32:28 home sshd[3908950]: Invalid user bank from 192.144.185.74 port 46172
Aug 23 23:32:28 home sshd[3908950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.185.74 
Aug 23 23:32:28 home sshd[3908950]: Invalid user bank from 192.144.185.74 port 46172
Aug 23 23:32:29 home sshd[3908950]: Failed password for invalid user bank from 192.144.185.74 port 46172 ssh2
...
2020-08-24 08:12:47
14.32.187.194 attackspambots
81/tcp
[2020-08-23]1pkt
2020-08-24 08:03:12
47.110.59.52 attackspam
7002/tcp 7001/tcp 8088/tcp...
[2020-08-23]6pkt,3pt.(tcp)
2020-08-24 08:08:29
89.215.193.74 attackbotsspam
445/tcp
[2020-08-23]1pkt
2020-08-24 07:52:35
54.38.65.215 attackspambots
Aug 23 23:31:19 er4gw sshd[3235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.65.215  user=root
2020-08-24 08:02:37
118.25.27.67 attack
20 attempts against mh-ssh on cloud
2020-08-24 08:22:46
138.197.136.72 attack
138.197.136.72 - - [23/Aug/2020:22:54:54 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1865 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.136.72 - - [23/Aug/2020:22:54:56 +0100] "POST /wp/wp-login.php HTTP/1.1" 200 1857 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.197.136.72 - - [23/Aug/2020:22:54:56 +0100] "POST /wp/xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-24 08:11:55
118.25.5.116 attackspam
ThinkPHP Remote Code Execution Vulnerability , PTR: PTR record not found
2020-08-24 07:56:46
161.35.63.1 attackbots
Port 22 Scan, PTR: None
2020-08-24 08:25:36
204.42.253.132 attack
Port scan: Attack repeated for 24 hours
2020-08-24 08:10:08

最近上报的IP列表

104.18.216.51 104.18.216.85 104.18.216.93 104.18.217.150
104.18.217.51 104.18.217.68 104.18.217.93 104.18.218.150
104.18.218.232 104.18.219.150 104.18.219.229 104.18.219.232
104.18.219.68 104.18.219.81 104.18.22.103 104.18.22.105
104.18.22.11 104.18.22.114 104.18.22.119 109.102.12.139