必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.128.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.128.46.			IN	A

;; AUTHORITY SECTION:
.			444	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:25:36 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 46.128.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 46.128.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
156.96.47.37 attackbots
Aug  4 22:30:07 mail postfix/smtpd[112782]: warning: unknown[156.96.47.37]: SASL LOGIN authentication failed: generic failure
Aug  4 22:30:07 mail postfix/smtpd[112782]: warning: unknown[156.96.47.37]: SASL LOGIN authentication failed: generic failure
Aug  4 22:30:07 mail postfix/smtpd[112782]: warning: unknown[156.96.47.37]: SASL LOGIN authentication failed: generic failure
...
2020-08-05 06:52:10
45.236.128.93 attackspambots
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-08-05 06:21:40
176.197.5.34 attackspam
Aug  4 23:26:24 minden010 sshd[3157]: Failed password for root from 176.197.5.34 port 46478 ssh2
Aug  4 23:30:37 minden010 sshd[4707]: Failed password for root from 176.197.5.34 port 58218 ssh2
...
2020-08-05 06:32:06
218.92.0.203 attack
2020-08-04T23:48:15.811895vps751288.ovh.net sshd\[26465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
2020-08-04T23:48:17.600785vps751288.ovh.net sshd\[26465\]: Failed password for root from 218.92.0.203 port 41634 ssh2
2020-08-04T23:48:20.278356vps751288.ovh.net sshd\[26465\]: Failed password for root from 218.92.0.203 port 41634 ssh2
2020-08-04T23:48:22.368866vps751288.ovh.net sshd\[26465\]: Failed password for root from 218.92.0.203 port 41634 ssh2
2020-08-04T23:53:14.859665vps751288.ovh.net sshd\[26537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.203  user=root
2020-08-05 06:26:37
180.76.103.247 attack
Aug  4 23:40:38 dev0-dcde-rnet sshd[18236]: Failed password for root from 180.76.103.247 port 53564 ssh2
Aug  4 23:43:31 dev0-dcde-rnet sshd[18275]: Failed password for root from 180.76.103.247 port 42016 ssh2
2020-08-05 06:49:03
61.177.172.177 attack
2020-08-04T12:05:47.226022correo.[domain] sshd[10354]: Failed password for root from 61.177.172.177 port 14583 ssh2 2020-08-04T12:05:50.258620correo.[domain] sshd[10354]: Failed password for root from 61.177.172.177 port 14583 ssh2 2020-08-04T12:05:53.032594correo.[domain] sshd[10354]: Failed password for root from 61.177.172.177 port 14583 ssh2 ...
2020-08-05 06:43:42
157.245.124.160 attackbots
Aug  5 04:57:17 webhost01 sshd[8910]: Failed password for root from 157.245.124.160 port 60530 ssh2
...
2020-08-05 06:15:36
94.23.38.191 attackbotsspam
Aug  1 15:21:43 prox sshd[2308]: Failed password for root from 94.23.38.191 port 34706 ssh2
2020-08-05 06:42:50
177.38.177.18 attackspambots
Port probing on unauthorized port 8080
2020-08-05 06:16:59
87.1.165.78 attackbotsspam
400 BAD REQUEST
2020-08-05 06:41:33
61.177.172.61 attack
Aug  5 00:04:14 nas sshd[30878]: Failed password for root from 61.177.172.61 port 33369 ssh2
Aug  5 00:04:18 nas sshd[30878]: Failed password for root from 61.177.172.61 port 33369 ssh2
Aug  5 00:04:21 nas sshd[30878]: Failed password for root from 61.177.172.61 port 33369 ssh2
Aug  5 00:04:25 nas sshd[30878]: Failed password for root from 61.177.172.61 port 33369 ssh2
...
2020-08-05 06:16:28
177.220.178.171 attackbots
C2,WP GET /wp-login.php
2020-08-05 06:42:21
61.76.232.78 attackbots
Port Scan detected!
...
2020-08-05 06:45:46
222.186.175.216 attackspam
Aug  4 22:24:17 marvibiene sshd[4376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Aug  4 22:24:19 marvibiene sshd[4376]: Failed password for root from 222.186.175.216 port 17272 ssh2
Aug  4 22:24:23 marvibiene sshd[4376]: Failed password for root from 222.186.175.216 port 17272 ssh2
Aug  4 22:24:17 marvibiene sshd[4376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Aug  4 22:24:19 marvibiene sshd[4376]: Failed password for root from 222.186.175.216 port 17272 ssh2
Aug  4 22:24:23 marvibiene sshd[4376]: Failed password for root from 222.186.175.216 port 17272 ssh2
2020-08-05 06:27:27
222.186.180.6 attackbotsspam
2020-08-04T10:37:41.202904correo.[domain] sshd[41631]: Failed password for root from 222.186.180.6 port 33562 ssh2 2020-08-04T10:37:44.686577correo.[domain] sshd[41631]: Failed password for root from 222.186.180.6 port 33562 ssh2 2020-08-04T10:37:48.785374correo.[domain] sshd[41631]: Failed password for root from 222.186.180.6 port 33562 ssh2 ...
2020-08-05 06:41:58

最近上报的IP列表

104.20.128.124 104.20.13.41 104.20.130.42 104.20.129.46
104.20.130.33 104.20.131.117 104.20.130.53 104.20.13.132
104.18.18.37 104.20.132.108 104.20.13.52 104.20.131.108
104.20.131.33 104.20.132.46 104.20.132.11 104.20.131.42
104.20.132.117 229.36.124.83 104.20.133.46 104.20.135.13