必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.187.139.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.187.139.145.		IN	A

;; AUTHORITY SECTION:
.			251	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103000 1800 900 604800 86400

;; Query time: 308 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 01:14:30 CST 2019
;; MSG SIZE  rcvd: 119
HOST信息:
145.139.187.104.in-addr.arpa domain name pointer 104-187-139-145.lightspeed.okcbok.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.139.187.104.in-addr.arpa	name = 104-187-139-145.lightspeed.okcbok.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
50.207.12.103 attackspam
Dec 12 12:28:44 h2177944 sshd\[9601\]: Invalid user host from 50.207.12.103 port 58512
Dec 12 12:28:44 h2177944 sshd\[9601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.207.12.103
Dec 12 12:28:45 h2177944 sshd\[9601\]: Failed password for invalid user host from 50.207.12.103 port 58512 ssh2
Dec 12 12:34:08 h2177944 sshd\[9845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.207.12.103  user=root
...
2019-12-12 20:12:18
1.53.88.143 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 12-12-2019 06:25:14.
2019-12-12 20:10:14
185.156.73.52 attackbots
12/12/2019-07:06:37.663590 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-12 20:11:56
222.186.169.194 attackspam
Dec 12 13:03:50 amit sshd\[1025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
Dec 12 13:03:52 amit sshd\[1025\]: Failed password for root from 222.186.169.194 port 28454 ssh2
Dec 12 13:04:16 amit sshd\[1029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
...
2019-12-12 20:10:59
112.216.93.141 attackspam
2019-12-12T12:20:02.257903  sshd[28346]: Invalid user alinus from 112.216.93.141 port 59264
2019-12-12T12:20:02.271166  sshd[28346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.216.93.141
2019-12-12T12:20:02.257903  sshd[28346]: Invalid user alinus from 112.216.93.141 port 59264
2019-12-12T12:20:04.346124  sshd[28346]: Failed password for invalid user alinus from 112.216.93.141 port 59264 ssh2
2019-12-12T12:26:09.238476  sshd[28421]: Invalid user server from 112.216.93.141 port 35386
...
2019-12-12 20:04:16
51.68.123.192 attackbotsspam
2019-12-12T11:40:57.354732shield sshd\[15418\]: Invalid user sa from 51.68.123.192 port 42368
2019-12-12T11:40:57.357764shield sshd\[15418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-51-68-123.eu
2019-12-12T11:40:59.401269shield sshd\[15418\]: Failed password for invalid user sa from 51.68.123.192 port 42368 ssh2
2019-12-12T11:46:24.764078shield sshd\[17510\]: Invalid user rk from 51.68.123.192 port 51288
2019-12-12T11:46:24.768432shield sshd\[17510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.ip-51-68-123.eu
2019-12-12 19:51:04
46.182.7.35 attack
Dec 12 11:58:36 MK-Soft-VM4 sshd[21809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.182.7.35 
Dec 12 11:58:38 MK-Soft-VM4 sshd[21809]: Failed password for invalid user cyrus from 46.182.7.35 port 51434 ssh2
...
2019-12-12 19:51:37
112.198.194.11 attackspam
Dec 12 11:36:04 MK-Soft-VM4 sshd[9493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.194.11 
Dec 12 11:36:06 MK-Soft-VM4 sshd[9493]: Failed password for invalid user webmaster from 112.198.194.11 port 47622 ssh2
...
2019-12-12 19:57:26
200.127.85.171 attack
web-1 [ssh] SSH Attack
2019-12-12 20:00:29
168.187.106.103 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 12-12-2019 06:25:15.
2019-12-12 20:07:49
59.25.197.138 attack
Dec 12 01:24:32 Tower sshd[33625]: Connection from 59.25.197.138 port 34924 on 192.168.10.220 port 22
Dec 12 01:24:44 Tower sshd[33625]: Invalid user robert from 59.25.197.138 port 34924
Dec 12 01:24:44 Tower sshd[33625]: error: Could not get shadow information for NOUSER
Dec 12 01:24:44 Tower sshd[33625]: Failed password for invalid user robert from 59.25.197.138 port 34924 ssh2
Dec 12 01:24:44 Tower sshd[33625]: Received disconnect from 59.25.197.138 port 34924:11: Bye Bye [preauth]
Dec 12 01:24:44 Tower sshd[33625]: Disconnected from invalid user robert 59.25.197.138 port 34924 [preauth]
2019-12-12 20:17:24
125.74.27.185 attack
2019-12-12T11:14:37.796901abusebot-2.cloudsearch.cf sshd\[12253\]: Invalid user gayla from 125.74.27.185 port 41539
2019-12-12T11:14:37.804231abusebot-2.cloudsearch.cf sshd\[12253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.27.185
2019-12-12T11:14:39.597559abusebot-2.cloudsearch.cf sshd\[12253\]: Failed password for invalid user gayla from 125.74.27.185 port 41539 ssh2
2019-12-12T11:23:01.175772abusebot-2.cloudsearch.cf sshd\[12317\]: Invalid user cool from 125.74.27.185 port 38934
2019-12-12 20:09:36
178.62.239.205 attackbotsspam
Dec 12 13:00:09 lnxded63 sshd[27947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.239.205
2019-12-12 20:19:42
103.91.85.189 attack
Unauthorized connection attempt detected from IP address 103.91.85.189 to port 26
2019-12-12 20:05:43
13.82.228.197 attack
Dec 12 12:16:50 ArkNodeAT sshd\[2700\]: Invalid user belldandy from 13.82.228.197
Dec 12 12:16:50 ArkNodeAT sshd\[2700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.228.197
Dec 12 12:16:52 ArkNodeAT sshd\[2700\]: Failed password for invalid user belldandy from 13.82.228.197 port 60143 ssh2
2019-12-12 19:58:44

最近上报的IP列表

7.106.198.150 218.248.187.240 208.12.113.154 66.169.206.217
206.22.99.141 251.43.203.0 65.225.221.207 44.214.228.26
93.56.178.67 185.220.101.216 22.14.160.15 49.243.22.231
204.40.35.91 226.102.62.250 101.36.151.78 159.60.140.120
44.219.225.21 105.179.65.52 24.175.73.244 140.178.168.205