必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.18.50.120 attack
*** Phishing website that camouflaged Amazon.com.
(redirect from)
https://subscriber.jglboots.com/
domain: subscriber.jglboots.com
IP v6 address: 2606:4700:3037::6812:3378 / 2606:4700:3033::6812:3278
IP v4 address: 104.18.50.120 / 104.18.51.120
location: USA
hosting: Cloudflare, Inc
web: https://www.cloudflare.com/abuse
abuse contact: abuse@cloudflare.com, abuse+law@cloudflare.com, rir@cloudflare.com
(redirect to)
https://counts-pontis-name-flare-and-safty.telemagico.com/
domain: counts-pontis-name-flare-and-safty.telemagico.com
IP v6 address: 2606:4700:3030::6818:62f1 / 2606:4700:3033::6818:63f1
IP v4 address: 104.24.99.241 / 104.24.98.241
location: USA
hosting: Cloudflare, Inc
web: https://www.cloudflare.com/abuse
abuse contact: abuse@cloudflare.com, abuse+law@cloudflare.com, rir@cloudflare.com
2020-05-04 03:15:46
104.18.54.70 spam
Used undred times per day for SPAM, PHISHING, SCAM and SEXE on STOLLEN list we don't know where without our agreement, as usual with LIERS and ROBERS !
Especially by namecheap.com with creatensend.com ?
https://www.mywot.com/scorecard/creatensend.com
https://www.mywot.com/scorecard/namecheap.com
Or uniregistry.com with casinovips.com ?
https://www.mywot.com/scorecard/casinovips.com
https://www.mywot.com/scorecard/uniregistry.com
And the same few hours before...
By GoDaddy.com, une autre SOUS MERDE adepte d'ESCROCS commebonusmasters.com...
https://www.mywot.com/scorecard/bonusmasters.com
https://www.mywot.com/scorecard/godaddy.com
2020-02-20 05:28:25
104.18.53.191 attack
*** Phishing website that camouflaged Google.
https://google-chrome.doysstv.com/?index
2020-01-04 20:34:01
104.18.52.191 attackspambots
*** Phishing website that camouflaged Google.
https://google-chrome.doysstv.com/?index
2020-01-04 18:36:35
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.18.5.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.18.5.21.			IN	A

;; AUTHORITY SECTION:
.			408	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022100 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 01:29:27 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 21.5.18.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.5.18.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.209.0.131 attackspambots
 TCP (SYN) 85.209.0.131:24444 -> port 22, len 60
2020-08-15 18:21:12
41.38.27.54 attackbots
20/8/14@23:50:57: FAIL: Alarm-Telnet address from=41.38.27.54
...
2020-08-15 18:12:53
5.188.84.228 attackspambots
2,50-01/03 [bc01/m10] PostRequest-Spammer scoring: rome
2020-08-15 18:16:35
134.175.228.215 attackbotsspam
2020-08-15T04:21:02.207823morrigan.ad5gb.com sshd[3787613]: Failed password for root from 134.175.228.215 port 57504 ssh2
2020-08-15T04:21:02.669916morrigan.ad5gb.com sshd[3787613]: Disconnected from authenticating user root 134.175.228.215 port 57504 [preauth]
2020-08-15 18:07:03
139.155.127.59 attackspam
Aug 15 10:05:52 pornomens sshd\[20440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.127.59  user=root
Aug 15 10:05:54 pornomens sshd\[20440\]: Failed password for root from 139.155.127.59 port 49502 ssh2
Aug 15 10:24:59 pornomens sshd\[20655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.127.59  user=root
...
2020-08-15 18:22:21
222.186.61.191 attackbotsspam
Aug 15 10:30:43 inter-technics postfix/smtpd[22491]: warning: unknown[222.186.61.191]: SASL LOGIN authentication failed: authentication failure
Aug 15 10:30:45 inter-technics postfix/smtpd[22491]: warning: unknown[222.186.61.191]: SASL LOGIN authentication failed: authentication failure
Aug 15 10:30:46 inter-technics postfix/smtpd[22491]: warning: unknown[222.186.61.191]: SASL LOGIN authentication failed: authentication failure
...
2020-08-15 18:21:42
188.120.235.117 attack
CMS (WordPress or Joomla) login attempt.
2020-08-15 18:18:05
61.177.172.128 attackbots
Aug 15 09:56:53 game-panel sshd[28767]: Failed password for root from 61.177.172.128 port 12571 ssh2
Aug 15 09:57:03 game-panel sshd[28767]: Failed password for root from 61.177.172.128 port 12571 ssh2
Aug 15 09:57:06 game-panel sshd[28767]: Failed password for root from 61.177.172.128 port 12571 ssh2
Aug 15 09:57:06 game-panel sshd[28767]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 12571 ssh2 [preauth]
2020-08-15 18:01:27
122.160.10.220 attackspambots
1597463514 - 08/15/2020 05:51:54 Host: 122.160.10.220/122.160.10.220 Port: 23 TCP Blocked
...
2020-08-15 17:42:41
197.185.101.46 attackspambots
Email rejected due to spam filtering
2020-08-15 18:09:37
36.90.63.130 attackspambots
1597463488 - 08/15/2020 05:51:28 Host: 36.90.63.130/36.90.63.130 Port: 445 TCP Blocked
2020-08-15 17:59:09
140.143.203.40 attackbots
140.143.203.40 - - [15/Aug/2020:11:42:41 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
140.143.203.40 - - [15/Aug/2020:11:42:43 +0200] "POST /wp-login.php HTTP/1.1" 200 1819 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
140.143.203.40 - - [15/Aug/2020:11:42:45 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
140.143.203.40 - - [15/Aug/2020:11:42:59 +0200] "POST /wp-login.php HTTP/1.1" 200 1796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
140.143.203.40 - - [15/Aug/2020:11:43:00 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
140.143.203.40 - - [15/Aug/2020:11:43:02 +0200] "POST /wp-login.php HTTP/1.1" 200 1797 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/201001
...
2020-08-15 18:01:47
172.253.11.4 attackspambots
[N10.H1.VM1] Port Scanner Detected Blocked by UFW
2020-08-15 17:50:21
75.112.68.166 attackspambots
Aug 14 22:41:47 web1 sshd\[4552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.112.68.166  user=root
Aug 14 22:41:49 web1 sshd\[4552\]: Failed password for root from 75.112.68.166 port 44899 ssh2
Aug 14 22:46:34 web1 sshd\[4907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.112.68.166  user=root
Aug 14 22:46:35 web1 sshd\[4907\]: Failed password for root from 75.112.68.166 port 21666 ssh2
Aug 14 22:51:17 web1 sshd\[5256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.112.68.166  user=root
2020-08-15 17:52:22
106.54.200.209 attackspambots
$f2bV_matches
2020-08-15 17:46:14

最近上报的IP列表

104.18.4.75 104.18.5.211 104.18.5.23 104.18.5.75
104.18.6.117 104.18.6.122 104.18.6.203 104.18.7.117
104.18.7.122 104.18.7.203 104.18.75.15 104.18.8.163
104.18.8.176 104.18.8.24 104.18.81.231 104.18.82.231
104.18.83.241 104.18.84.241 104.18.85.8 104.18.86.8