必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.142.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.142.100.			IN	A

;; AUTHORITY SECTION:
.			89	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:57:05 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 100.142.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.142.19.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
87.255.206.58 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-24 23:21:25
202.77.114.34 attackbots
Aug 24 15:11:03 hcbbdb sshd\[7282\]: Invalid user testuser from 202.77.114.34
Aug 24 15:11:03 hcbbdb sshd\[7282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.114.34
Aug 24 15:11:05 hcbbdb sshd\[7282\]: Failed password for invalid user testuser from 202.77.114.34 port 51742 ssh2
Aug 24 15:16:41 hcbbdb sshd\[7922\]: Invalid user jenkins from 202.77.114.34
Aug 24 15:16:41 hcbbdb sshd\[7922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.114.34
2019-08-24 23:25:59
73.74.61.113 attackspambots
port scan and connect, tcp 80 (http)
2019-08-25 00:39:34
111.252.254.27 attack
Honeypot attack, port: 23, PTR: 111-252-254-27.dynamic-ip.hinet.net.
2019-08-25 00:08:30
92.222.181.159 attackspam
Aug 24 17:49:27 ns3110291 sshd\[13632\]: Invalid user www from 92.222.181.159
Aug 24 17:49:28 ns3110291 sshd\[13632\]: Failed password for invalid user www from 92.222.181.159 port 52209 ssh2
Aug 24 17:53:26 ns3110291 sshd\[14056\]: Invalid user dl from 92.222.181.159
Aug 24 17:53:28 ns3110291 sshd\[14056\]: Failed password for invalid user dl from 92.222.181.159 port 52425 ssh2
Aug 24 17:57:29 ns3110291 sshd\[14371\]: Invalid user portfolio from 92.222.181.159
...
2019-08-25 00:12:12
192.99.56.117 attackbots
Aug 24 17:51:17 lnxmail61 sshd[23827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.56.117
Aug 24 17:51:19 lnxmail61 sshd[23827]: Failed password for invalid user Ezam from 192.99.56.117 port 59300 ssh2
Aug 24 17:56:35 lnxmail61 sshd[24369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.56.117
2019-08-25 00:07:31
103.38.194.139 attackbotsspam
Aug 24 05:48:14 aiointranet sshd\[29208\]: Invalid user cmc from 103.38.194.139
Aug 24 05:48:14 aiointranet sshd\[29208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.194.139
Aug 24 05:48:16 aiointranet sshd\[29208\]: Failed password for invalid user cmc from 103.38.194.139 port 60424 ssh2
Aug 24 05:53:20 aiointranet sshd\[29618\]: Invalid user imarks from 103.38.194.139
Aug 24 05:53:20 aiointranet sshd\[29618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.38.194.139
2019-08-24 23:58:05
89.248.168.202 attackspambots
08/24/2019-10:46:11.042486 89.248.168.202 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 100
2019-08-24 23:29:02
211.143.127.37 attack
Aug 24 15:08:12 localhost sshd\[8410\]: Invalid user rsync from 211.143.127.37 port 40955
Aug 24 15:08:12 localhost sshd\[8410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.127.37
Aug 24 15:08:15 localhost sshd\[8410\]: Failed password for invalid user rsync from 211.143.127.37 port 40955 ssh2
Aug 24 15:13:31 localhost sshd\[8620\]: Invalid user fg from 211.143.127.37 port 57744
Aug 24 15:13:31 localhost sshd\[8620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.127.37
...
2019-08-24 23:35:56
94.191.50.165 attackbots
Aug 24 16:56:44 vps691689 sshd[16362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.50.165
Aug 24 16:56:46 vps691689 sshd[16362]: Failed password for invalid user bip from 94.191.50.165 port 42164 ssh2
...
2019-08-24 23:47:45
159.65.54.221 attackbots
Aug 24 22:59:48 itv-usvr-01 sshd[11748]: Invalid user backup1 from 159.65.54.221
2019-08-25 00:11:31
213.22.204.82 attackbotsspam
Lines containing failures of 213.22.204.82
Aug 24 12:57:11 server01 postfix/smtpd[31918]: connect from a213-22-204-82.cpe.netcabo.pt[213.22.204.82]
Aug x@x
Aug x@x
Aug 24 12:57:12 server01 postfix/policy-spf[31926]: : Policy action=PREPEND Received-SPF: none (frabil.se: No applicable sender policy available) receiver=x@x
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.22.204.82
2019-08-24 23:58:46
85.38.164.51 attack
Aug 24 11:26:30 *** sshd[24061]: Invalid user jeffrey from 85.38.164.51
2019-08-25 00:16:13
87.103.120.250 attackbots
Aug 24 18:49:59 tuotantolaitos sshd[6902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.103.120.250
Aug 24 18:50:01 tuotantolaitos sshd[6902]: Failed password for invalid user daniel from 87.103.120.250 port 42576 ssh2
...
2019-08-24 23:51:15
206.189.200.22 attackbots
Aug 24 18:00:29 vps647732 sshd[12308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.200.22
Aug 24 18:00:30 vps647732 sshd[12308]: Failed password for invalid user dark from 206.189.200.22 port 41628 ssh2
...
2019-08-25 00:19:58

最近上报的IP列表

104.19.140.77 104.19.142.77 104.19.143.100 104.21.66.103
104.19.142.75 104.19.143.75 104.19.145.129 104.19.146.122
104.19.146.33 104.19.146.129 104.19.146.29 104.19.146.132
104.19.147.29 104.19.147.132 104.19.147.33 104.19.148.69
104.19.150.35 104.21.66.105 104.19.149.69 104.19.150.69