必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.196.161.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40071
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.196.161.80.			IN	A

;; AUTHORITY SECTION:
.			130	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 03:45:21 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
80.161.196.104.in-addr.arpa domain name pointer 80.161.196.104.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.161.196.104.in-addr.arpa	name = 80.161.196.104.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.83.90.12 attackbotsspam
Automatic report - Port Scan Attack
2019-09-23 00:33:37
222.186.15.204 attack
Sep 22 12:30:46 plusreed sshd[25204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.204  user=root
Sep 22 12:30:48 plusreed sshd[25204]: Failed password for root from 222.186.15.204 port 48168 ssh2
...
2019-09-23 00:34:27
200.11.219.206 attackspam
Sep 22 18:41:04 mail sshd\[25716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.219.206
Sep 22 18:41:06 mail sshd\[25716\]: Failed password for invalid user kayla from 200.11.219.206 port 22433 ssh2
Sep 22 18:45:27 mail sshd\[26155\]: Invalid user qo from 200.11.219.206 port 4068
Sep 22 18:45:27 mail sshd\[26155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.219.206
Sep 22 18:45:28 mail sshd\[26155\]: Failed password for invalid user qo from 200.11.219.206 port 4068 ssh2
2019-09-23 00:50:40
49.88.112.70 attack
Sep 22 19:52:26 pkdns2 sshd\[64729\]: Failed password for root from 49.88.112.70 port 44145 ssh2Sep 22 19:52:28 pkdns2 sshd\[64729\]: Failed password for root from 49.88.112.70 port 44145 ssh2Sep 22 19:52:30 pkdns2 sshd\[64729\]: Failed password for root from 49.88.112.70 port 44145 ssh2Sep 22 19:53:49 pkdns2 sshd\[64774\]: Failed password for root from 49.88.112.70 port 15076 ssh2Sep 22 19:54:39 pkdns2 sshd\[64803\]: Failed password for root from 49.88.112.70 port 18965 ssh2Sep 22 19:55:25 pkdns2 sshd\[64877\]: Failed password for root from 49.88.112.70 port 11822 ssh2
...
2019-09-23 01:16:04
185.137.234.127 attackbots
$f2bV_matches
2019-09-23 01:00:30
58.87.92.153 attackbots
2019-09-21 06:35:14,580 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 58.87.92.153
2019-09-21 07:06:33,659 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 58.87.92.153
2019-09-21 07:38:48,917 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 58.87.92.153
2019-09-21 08:11:16,916 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 58.87.92.153
2019-09-21 08:43:59,868 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 58.87.92.153
...
2019-09-23 00:52:19
207.154.194.16 attackspam
Sep 22 18:47:11 MK-Soft-VM3 sshd[26021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.194.16 
Sep 22 18:47:13 MK-Soft-VM3 sshd[26021]: Failed password for invalid user techsupport from 207.154.194.16 port 49786 ssh2
...
2019-09-23 01:23:12
59.149.237.145 attack
2019-09-18 17:05:48,619 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 59.149.237.145
2019-09-18 17:36:13,352 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 59.149.237.145
2019-09-18 18:10:49,465 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 59.149.237.145
2019-09-18 18:45:22,213 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 59.149.237.145
2019-09-18 19:19:56,076 fail2ban.actions        \[946\]: NOTICE  \[sshd\] Ban 59.149.237.145
...
2019-09-23 00:37:14
59.27.125.131 attackbotsspam
2019-09-22T16:56:38.944841abusebot-8.cloudsearch.cf sshd\[8769\]: Invalid user samples from 59.27.125.131 port 50364
2019-09-23 00:59:01
119.246.48.56 attack
My-Apache-Badbots (ownc)
2019-09-23 01:10:00
106.52.24.64 attackbots
Sep 22 12:40:43 xtremcommunity sshd\[364573\]: Invalid user automak from 106.52.24.64 port 59146
Sep 22 12:40:43 xtremcommunity sshd\[364573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.24.64
Sep 22 12:40:44 xtremcommunity sshd\[364573\]: Failed password for invalid user automak from 106.52.24.64 port 59146 ssh2
Sep 22 12:47:29 xtremcommunity sshd\[364721\]: Invalid user madison from 106.52.24.64 port 44618
Sep 22 12:47:29 xtremcommunity sshd\[364721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.24.64
...
2019-09-23 00:58:04
165.22.26.134 attackspam
Sep 22 16:45:57 MainVPS sshd[15602]: Invalid user Samuel from 165.22.26.134 port 53376
Sep 22 16:45:57 MainVPS sshd[15602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.26.134
Sep 22 16:45:57 MainVPS sshd[15602]: Invalid user Samuel from 165.22.26.134 port 53376
Sep 22 16:45:59 MainVPS sshd[15602]: Failed password for invalid user Samuel from 165.22.26.134 port 53376 ssh2
Sep 22 16:50:19 MainVPS sshd[15986]: Invalid user password from 165.22.26.134 port 37832
...
2019-09-23 00:42:54
66.70.189.209 attackspam
$f2bV_matches
2019-09-23 01:23:30
51.77.103.71 attack
Sep 22 18:53:37 vps647732 sshd[12526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.103.71
Sep 22 18:53:39 vps647732 sshd[12526]: Failed password for invalid user sj from 51.77.103.71 port 34860 ssh2
...
2019-09-23 00:57:15
89.248.172.85 attackbots
firewall-block, port(s): 9303/tcp, 9314/tcp, 9316/tcp, 9324/tcp
2019-09-23 00:46:23

最近上报的IP列表

104.196.160.46 104.196.162.159 104.196.164.124 104.196.164.170
102.177.198.226 1.0.135.214 1.0.135.217 1.0.135.220
1.0.135.225 1.0.135.228 253.157.70.207 1.0.135.236
138.220.198.147 1.0.135.240 1.0.135.243 1.0.135.245
1.0.135.246 1.0.135.249 1.0.135.251 1.0.135.253