必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.42.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.42.219.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051902 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 20 11:45:45 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 219.42.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.42.18.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.108.196.203 attackspambots
May 26 02:43:37 gw1 sshd[15107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.108.196.203
May 26 02:43:39 gw1 sshd[15107]: Failed password for invalid user mzj from 180.108.196.203 port 3072 ssh2
...
2020-05-26 05:53:09
27.124.39.148 attackbotsspam
...
2020-05-26 06:21:03
112.85.42.176 attackspambots
May 26 00:05:06 h1745522 sshd[14692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
May 26 00:05:08 h1745522 sshd[14692]: Failed password for root from 112.85.42.176 port 39030 ssh2
May 26 00:05:17 h1745522 sshd[14692]: Failed password for root from 112.85.42.176 port 39030 ssh2
May 26 00:05:06 h1745522 sshd[14692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
May 26 00:05:08 h1745522 sshd[14692]: Failed password for root from 112.85.42.176 port 39030 ssh2
May 26 00:05:17 h1745522 sshd[14692]: Failed password for root from 112.85.42.176 port 39030 ssh2
May 26 00:05:06 h1745522 sshd[14692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
May 26 00:05:08 h1745522 sshd[14692]: Failed password for root from 112.85.42.176 port 39030 ssh2
May 26 00:05:17 h1745522 sshd[14692]: Failed password for
...
2020-05-26 06:10:53
200.132.7.10 attackbots
Invalid user nvidia from 200.132.7.10 port 2085
2020-05-26 06:01:34
185.234.218.42 attack
[Mon May 25 22:48:40.335536 2020] [authz_core:error] [pid 14897] [client 185.234.218.42:37382] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/.git
[Mon May 25 22:48:40.479451 2020] [authz_core:error] [pid 15145] [client 185.234.218.42:37770] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/vod_installer
[Mon May 25 22:48:40.619235 2020] [authz_core:error] [pid 15010] [client 185.234.218.42:38072] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/login
...
2020-05-26 06:06:20
73.217.24.242 attackbotsspam
Port Scan detected!
...
2020-05-26 06:09:49
185.234.218.84 attack
May 25 21:00:19 mail postfix/smtpd\[5961\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 25 21:38:20 mail postfix/smtpd\[7284\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 25 21:58:41 mail postfix/smtpd\[7711\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
May 25 22:19:16 mail postfix/smtpd\[8457\]: warning: unknown\[185.234.218.84\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-05-26 06:03:00
47.245.1.106 attackspam
Port probing on unauthorized port 26367
2020-05-26 06:13:19
128.199.155.218 attack
May 25 22:14:29 vpn01 sshd[17859]: Failed password for root from 128.199.155.218 port 32886 ssh2
...
2020-05-26 06:09:25
157.245.211.120 attackspam
2020-05-25T20:40:23.928590shield sshd\[26605\]: Invalid user desktop from 157.245.211.120 port 53178
2020-05-25T20:40:23.932132shield sshd\[26605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.211.120
2020-05-25T20:40:25.760596shield sshd\[26605\]: Failed password for invalid user desktop from 157.245.211.120 port 53178 ssh2
2020-05-25T20:43:56.584456shield sshd\[27941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.211.120  user=root
2020-05-25T20:43:58.653880shield sshd\[27941\]: Failed password for root from 157.245.211.120 port 60262 ssh2
2020-05-26 06:17:22
185.232.65.105 attack
May 25 17:30:04 r.ca sshd[2220]: Failed password for root from 185.232.65.105 port 40598 ssh2
2020-05-26 05:54:24
36.111.182.41 attack
2020-05-25T20:12:34.414366abusebot-8.cloudsearch.cf sshd[25593]: Invalid user guest from 36.111.182.41 port 42936
2020-05-25T20:12:34.420494abusebot-8.cloudsearch.cf sshd[25593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.41
2020-05-25T20:12:34.414366abusebot-8.cloudsearch.cf sshd[25593]: Invalid user guest from 36.111.182.41 port 42936
2020-05-25T20:12:36.124184abusebot-8.cloudsearch.cf sshd[25593]: Failed password for invalid user guest from 36.111.182.41 port 42936 ssh2
2020-05-25T20:15:57.791498abusebot-8.cloudsearch.cf sshd[25810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182.41  user=root
2020-05-25T20:16:00.031699abusebot-8.cloudsearch.cf sshd[25810]: Failed password for root from 36.111.182.41 port 60638 ssh2
2020-05-25T20:19:14.016864abusebot-8.cloudsearch.cf sshd[26062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.111.182
...
2020-05-26 05:47:30
117.58.241.69 attackspambots
May 25 16:18:44 mail sshd\[7564\]: Invalid user jeff from 117.58.241.69
May 25 16:18:44 mail sshd\[7564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.58.241.69
...
2020-05-26 06:19:19
27.154.33.210 attackspambots
May 25 17:42:13 NPSTNNYC01T sshd[17202]: Failed password for root from 27.154.33.210 port 39883 ssh2
May 25 17:45:43 NPSTNNYC01T sshd[17449]: Failed password for root from 27.154.33.210 port 39416 ssh2
...
2020-05-26 05:59:06
188.166.217.55 attack
May 25 15:02:34 propaganda sshd[47394]: Connection from 188.166.217.55 port 39072 on 10.0.0.161 port 22 rdomain ""
May 25 15:02:35 propaganda sshd[47394]: Connection closed by 188.166.217.55 port 39072 [preauth]
2020-05-26 06:10:18

最近上报的IP列表

104.18.42.212 104.18.42.22 104.18.42.224 43.129.235.247
104.18.42.225 104.18.42.227 104.18.42.233 246.128.97.56
104.18.42.234 104.18.42.236 104.18.42.237 93.141.186.159
104.18.42.247 104.18.42.25 104.18.42.253 104.18.42.27
145.49.22.114 10.29.72.16 104.18.42.32 104.18.42.33