必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.111.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.111.145.			IN	A

;; AUTHORITY SECTION:
.			215	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032401 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 25 06:00:47 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 145.111.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.111.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.78.41.147 attackbots
Unauthorized connection attempt detected from IP address 36.78.41.147 to port 445
2019-12-16 18:34:31
40.92.67.15 attack
Dec 16 10:48:44 debian-2gb-vpn-nbg1-1 kernel: [860894.682784] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.67.15 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=110 ID=5528 DF PROTO=TCP SPT=8965 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-16 18:11:06
104.248.124.165 attackspam
IP: 104.248.124.165
ASN: AS14061 DigitalOcean LLC
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 16/12/2019 10:07:44 AM UTC
2019-12-16 18:17:31
183.186.204.147 attack
FTP Brute Force
2019-12-16 18:24:33
40.92.71.48 attackspam
Dec 16 09:26:46 debian-2gb-vpn-nbg1-1 kernel: [855976.720629] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.71.48 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=18633 DF PROTO=TCP SPT=60805 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-16 18:09:18
156.216.181.255 attack
IP: 156.216.181.255
ASN: AS8452 TE-AS
Port: Message Submission 587
Found in one or more Blacklists
Date: 16/12/2019 9:52:46 AM UTC
2019-12-16 18:01:40
148.70.210.77 attackspam
Fail2Ban - SSH Bruteforce Attempt
2019-12-16 18:32:35
202.6.234.123 attack
1576477584 - 12/16/2019 07:26:24 Host: 202.6.234.123/202.6.234.123 Port: 445 TCP Blocked
2019-12-16 18:36:05
49.234.60.13 attackspambots
...
2019-12-16 18:03:25
37.187.192.162 attackspam
Dec 16 05:07:50 linuxvps sshd\[43121\]: Invalid user passwd777 from 37.187.192.162
Dec 16 05:07:50 linuxvps sshd\[43121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.192.162
Dec 16 05:07:52 linuxvps sshd\[43121\]: Failed password for invalid user passwd777 from 37.187.192.162 port 47726 ssh2
Dec 16 05:13:36 linuxvps sshd\[46916\]: Invalid user ej from 37.187.192.162
Dec 16 05:13:36 linuxvps sshd\[46916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.192.162
2019-12-16 18:14:28
222.252.243.20 attackspam
Unauthorised access (Dec 16) SRC=222.252.243.20 LEN=52 PREC=0x20 TTL=54 ID=27634 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-16 18:14:52
186.170.28.46 attack
Dec 16 10:42:11 * sshd[3713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.170.28.46
Dec 16 10:42:13 * sshd[3713]: Failed password for invalid user di from 186.170.28.46 port 17465 ssh2
2019-12-16 18:31:45
40.92.19.60 attackspam
Dec 16 11:39:44 debian-2gb-vpn-nbg1-1 kernel: [863954.485721] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.19.60 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=104 ID=21495 DF PROTO=TCP SPT=57696 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-16 18:34:15
49.88.112.72 attack
Dec 16 11:16:36 MK-Soft-VM7 sshd[6438]: Failed password for root from 49.88.112.72 port 55154 ssh2
Dec 16 11:16:39 MK-Soft-VM7 sshd[6438]: Failed password for root from 49.88.112.72 port 55154 ssh2
...
2019-12-16 18:26:44
180.168.198.142 attackbotsspam
Dec 16 07:12:18 herz-der-gamer sshd[26259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.198.142  user=root
Dec 16 07:12:19 herz-der-gamer sshd[26259]: Failed password for root from 180.168.198.142 port 60452 ssh2
Dec 16 07:26:32 herz-der-gamer sshd[26418]: Invalid user raymonde from 180.168.198.142 port 39668
...
2019-12-16 18:25:42

最近上报的IP列表

104.199.197.118 104.20.112.206 150.222.248.118 104.20.124.23
104.20.183.171 104.22.28.166 104.22.29.166 104.22.3.48
104.22.3.5 104.22.32.121 104.22.32.164 104.22.33.121
104.22.33.164 104.22.33.180 104.22.34.67 104.22.35.67
104.22.36.218 104.22.36.5 104.22.37.218 104.22.4.196