必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.214.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50171
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.214.90.			IN	A

;; AUTHORITY SECTION:
.			396	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:25:55 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 90.214.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 90.214.19.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
102.39.47.163 attackbotsspam
Lines containing failures of 102.39.47.163
Sep  2 10:10:05 omfg postfix/smtpd[17604]: connect from unknown[102.39.47.163]
Sep x@x
Sep  2 10:10:06 omfg postfix/smtpd[17604]: lost connection after DATA from unknown[102.39.47.163]
Sep  2 10:10:06 omfg postfix/smtpd[17604]: disconnect from unknown[102.39.47.163] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=102.39.47.163
2020-09-04 22:23:25
129.250.206.86 attackspambots
 UDP 129.250.206.86:46621 -> port 123, len 220
2020-09-04 22:45:54
54.37.68.66 attackspambots
(sshd) Failed SSH login from 54.37.68.66 (FR/France/66.ip-54-37-68.eu): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  4 08:09:24 server sshd[13971]: Invalid user monte from 54.37.68.66 port 57634
Sep  4 08:09:27 server sshd[13971]: Failed password for invalid user monte from 54.37.68.66 port 57634 ssh2
Sep  4 08:21:16 server sshd[17514]: Failed password for ftp from 54.37.68.66 port 60958 ssh2
Sep  4 08:26:01 server sshd[18893]: Failed password for root from 54.37.68.66 port 38122 ssh2
Sep  4 08:30:32 server sshd[20697]: Failed password for root from 54.37.68.66 port 43504 ssh2
2020-09-04 22:54:33
37.30.38.109 attack
Sep  3 18:48:34 mellenthin postfix/smtpd[20953]: NOQUEUE: reject: RCPT from 37.30.38.109.nat.umts.dynamic.t-mobile.pl[37.30.38.109]: 554 5.7.1 Service unavailable; Client host [37.30.38.109] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/37.30.38.109; from= to= proto=ESMTP helo=<37.30.38.109.nat.umts.dynamic.t-mobile.pl>
2020-09-04 22:53:33
124.160.96.249 attackbotsspam
(sshd) Failed SSH login from 124.160.96.249 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  4 09:28:27 server2 sshd[29612]: Invalid user lb from 124.160.96.249
Sep  4 09:28:27 server2 sshd[29612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249 
Sep  4 09:28:29 server2 sshd[29612]: Failed password for invalid user lb from 124.160.96.249 port 53170 ssh2
Sep  4 09:46:34 server2 sshd[7509]: Invalid user helen from 124.160.96.249
Sep  4 09:46:34 server2 sshd[7509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249
2020-09-04 22:14:27
107.170.57.221 attackspam
Sep  3 21:11:04 vpn01 sshd[8504]: Failed password for root from 107.170.57.221 port 42853 ssh2
...
2020-09-04 22:32:16
190.186.42.130 attackspam
Sep  4 16:39:25 lnxmysql61 sshd[4380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.186.42.130
Sep  4 16:39:25 lnxmysql61 sshd[4380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.186.42.130
Sep  4 16:39:27 lnxmysql61 sshd[4380]: Failed password for invalid user admin from 190.186.42.130 port 16560 ssh2
2020-09-04 22:42:40
51.75.64.187 attackspam
Sep  4 16:02:15 ncomp sshd[28721]: Invalid user admin from 51.75.64.187 port 46505
Sep  4 16:02:15 ncomp sshd[28721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.64.187
Sep  4 16:02:15 ncomp sshd[28721]: Invalid user admin from 51.75.64.187 port 46505
Sep  4 16:02:17 ncomp sshd[28721]: Failed password for invalid user admin from 51.75.64.187 port 46505 ssh2
2020-09-04 22:15:26
183.237.191.186 attack
$f2bV_matches
2020-09-04 22:38:30
45.95.168.157 attack
SSH Brute-Forcing (server1)
2020-09-04 22:33:47
206.174.214.90 attackbotsspam
Last failed login: Wed Sep  2 16:17:20 CEST 2020 from 206.174.214.90 on ssh:notty
There were 2 failed login attempts since the last successful login.
2020-09-04 22:16:12
45.142.120.179 attackbotsspam
2020-09-04T07:59:47.762676linuxbox-skyline auth[78267]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=ato rhost=45.142.120.179
...
2020-09-04 22:33:18
190.196.229.117 attackspambots
failed_logins
2020-09-04 22:27:49
179.52.103.220 attackbotsspam
Sep  3 18:48:54 mellenthin postfix/smtpd[20982]: NOQUEUE: reject: RCPT from unknown[179.52.103.220]: 554 5.7.1 Service unavailable; Client host [179.52.103.220] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/179.52.103.220; from= to= proto=ESMTP helo=<220.103.52.179.d.dyn.claro.net.do>
2020-09-04 22:28:44
80.24.149.228 attack
Invalid user jmy from 80.24.149.228 port 54284
2020-09-04 22:46:40

最近上报的IP列表

104.19.186.114 104.19.212.50 104.19.211.50 104.19.215.90
104.19.217.126 104.19.216.126 104.19.222.12 104.19.249.124
104.19.221.12 104.19.250.124 125.228.77.61 104.192.4.61
104.19.237.115 104.193.110.123 104.192.4.94 104.19.255.116
104.193.108.152 104.19.236.115 104.193.110.161 104.193.110.36