必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.19.242.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46807
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.19.242.18.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:23:58 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 18.242.19.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.242.19.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.163.109.153 attackbotsspam
3,41-01/02 [bc01/m18] PostRequest-Spammer scoring: luanda
2020-05-14 01:57:03
120.70.101.85 attackspam
2020-05-13 17:05:00,512 fail2ban.actions        [1093]: NOTICE  [sshd] Ban 120.70.101.85
2020-05-13 17:38:28,894 fail2ban.actions        [1093]: NOTICE  [sshd] Ban 120.70.101.85
2020-05-13 18:12:40,384 fail2ban.actions        [1093]: NOTICE  [sshd] Ban 120.70.101.85
2020-05-13 18:45:03,832 fail2ban.actions        [1093]: NOTICE  [sshd] Ban 120.70.101.85
2020-05-13 19:18:15,683 fail2ban.actions        [1093]: NOTICE  [sshd] Ban 120.70.101.85
...
2020-05-14 02:15:24
86.57.207.113 attackbotsspam
Unauthorised access (May 13) SRC=86.57.207.113 LEN=52 TTL=118 ID=25257 DF TCP DPT=445 WINDOW=8192 SYN
2020-05-14 01:58:09
212.92.105.117 attack
found in my netstat
2020-05-14 01:45:05
34.78.176.66 attackbots
Malicious/Probing: /util/login.aspx
2020-05-14 02:03:19
68.168.128.94 attackbots
May 13 19:25:56 server sshd[8944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.128.94
May 13 19:25:58 server sshd[8944]: Failed password for invalid user tsdev from 68.168.128.94 port 42250 ssh2
May 13 19:34:16 server sshd[9622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.168.128.94
...
2020-05-14 01:54:44
94.25.229.42 attackspam
1589373229 - 05/13/2020 14:33:49 Host: 94.25.229.42/94.25.229.42 Port: 445 TCP Blocked
2020-05-14 02:20:05
180.76.136.81 attackbotsspam
May 13 14:47:48 srv01 sshd[5286]: Invalid user teapot from 180.76.136.81 port 44312
May 13 14:47:48 srv01 sshd[5286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.136.81
May 13 14:47:48 srv01 sshd[5286]: Invalid user teapot from 180.76.136.81 port 44312
May 13 14:47:50 srv01 sshd[5286]: Failed password for invalid user teapot from 180.76.136.81 port 44312 ssh2
May 13 14:51:42 srv01 sshd[5427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.136.81  user=root
May 13 14:51:45 srv01 sshd[5427]: Failed password for root from 180.76.136.81 port 53098 ssh2
...
2020-05-14 02:01:18
164.132.47.139 attackspam
May 13 14:54:23 vps46666688 sshd[8701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.47.139
May 13 14:54:24 vps46666688 sshd[8701]: Failed password for invalid user cqc from 164.132.47.139 port 47544 ssh2
...
2020-05-14 02:20:41
139.194.247.116 attackbots
Automatic report - Port Scan Attack
2020-05-14 01:48:44
218.78.105.98 attack
Invalid user popo from 218.78.105.98 port 54970
2020-05-14 02:23:19
123.207.142.208 attack
2020-05-13T13:10:46.851745shield sshd\[18418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.142.208  user=root
2020-05-13T13:10:49.292441shield sshd\[18418\]: Failed password for root from 123.207.142.208 port 46772 ssh2
2020-05-13T13:12:21.455655shield sshd\[18787\]: Invalid user tecnofrota_teste from 123.207.142.208 port 34852
2020-05-13T13:12:21.459285shield sshd\[18787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.142.208
2020-05-13T13:12:22.941402shield sshd\[18787\]: Failed password for invalid user tecnofrota_teste from 123.207.142.208 port 34852 ssh2
2020-05-14 01:59:47
49.231.201.242 attack
odoo8
...
2020-05-14 02:06:39
111.127.41.235 attack
IP reached maximum auth failures
2020-05-14 02:19:44
179.27.71.18 attack
May 13 15:32:18 ns382633 sshd\[24391\]: Invalid user zebra from 179.27.71.18 port 55940
May 13 15:32:18 ns382633 sshd\[24391\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.71.18
May 13 15:32:20 ns382633 sshd\[24391\]: Failed password for invalid user zebra from 179.27.71.18 port 55940 ssh2
May 13 15:37:11 ns382633 sshd\[25305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.27.71.18  user=root
May 13 15:37:13 ns382633 sshd\[25305\]: Failed password for root from 179.27.71.18 port 56984 ssh2
2020-05-14 02:08:38

最近上报的IP列表

104.18.13.82 104.19.242.6 104.19.242.107 104.19.243.14
104.19.246.11 104.19.243.107 104.19.243.18 104.19.243.6
104.19.248.11 104.19.248.12 104.19.248.91 104.19.245.11
104.19.249.91 104.19.250.121 104.19.254.74 104.18.13.83
104.19.247.11 104.19.249.12 104.19.251.121 104.19.255.83