必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.139.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53040
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.139.117.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 16:37:51 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 117.139.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 117.139.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.133.232.248 attackspam
Oct 25 00:44:40 plusreed sshd[13703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.248  user=root
Oct 25 00:44:42 plusreed sshd[13703]: Failed password for root from 61.133.232.248 port 32570 ssh2
...
2019-10-25 19:19:18
148.72.64.192 attack
www.xn--netzfundstckderwoche-yec.de 148.72.64.192 \[25/Oct/2019:06:45:14 +0200\] "POST /wp-login.php HTTP/1.1" 200 5662 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
www.xn--netzfundstckderwoche-yec.de 148.72.64.192 \[25/Oct/2019:06:45:15 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4096 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-25 18:54:57
162.158.150.28 attackbotsspam
10/25/2019-11:57:06.399853 162.158.150.28 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-10-25 19:05:41
172.68.132.205 attack
10/25/2019-11:11:41.860802 172.68.132.205 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-10-25 19:17:12
54.37.130.197 attackspambots
Lines containing failures of 54.37.130.197
Oct 22 17:17:41 *** sshd[45176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.130.197  user=r.r
Oct 22 17:17:43 *** sshd[45176]: Failed password for r.r from 54.37.130.197 port 54254 ssh2
Oct 22 17:17:43 *** sshd[45176]: Received disconnect from 54.37.130.197 port 54254:11: Bye Bye [preauth]
Oct 22 17:17:43 *** sshd[45176]: Disconnected from authenticating user r.r 54.37.130.197 port 54254 [preauth]
Oct 22 17:31:04 *** sshd[46121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.130.197  user=r.r
Oct 22 17:31:05 *** sshd[46121]: Failed password for r.r from 54.37.130.197 port 52592 ssh2
Oct 22 17:31:06 *** sshd[46121]: Received disconnect from 54.37.130.197 port 52592:11: Bye Bye [preauth]
Oct 22 17:31:06 *** sshd[46121]: Disconnected from authenticating user r.r 54.37.130.197 port 52592 [preauth]
Oct 22 17:35:04 *** sshd[46496]: pam_u........
------------------------------
2019-10-25 19:10:39
175.145.234.225 attackspambots
Oct 25 08:41:08 MK-Soft-Root2 sshd[10404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.234.225 
Oct 25 08:41:11 MK-Soft-Root2 sshd[10404]: Failed password for invalid user ricarda from 175.145.234.225 port 51200 ssh2
...
2019-10-25 19:00:59
178.128.217.58 attackspambots
Oct 25 12:59:56 v22018076622670303 sshd\[16032\]: Invalid user wertyu from 178.128.217.58 port 40278
Oct 25 12:59:56 v22018076622670303 sshd\[16032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.217.58
Oct 25 12:59:58 v22018076622670303 sshd\[16032\]: Failed password for invalid user wertyu from 178.128.217.58 port 40278 ssh2
...
2019-10-25 19:13:37
60.251.237.1 attackspambots
Automatic report - Port Scan Attack
2019-10-25 19:25:46
45.117.168.236 attack
45.117.168.236 - - \[25/Oct/2019:10:13:35 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.117.168.236 - - \[25/Oct/2019:10:13:37 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-10-25 18:54:07
106.12.188.252 attack
Oct 25 07:05:11 www5 sshd\[25215\]: Invalid user oracle from 106.12.188.252
Oct 25 07:05:11 www5 sshd\[25215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.188.252
Oct 25 07:05:13 www5 sshd\[25215\]: Failed password for invalid user oracle from 106.12.188.252 port 60318 ssh2
...
2019-10-25 18:46:56
116.6.84.60 attack
Oct 25 10:57:33 sshgateway sshd\[14328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.6.84.60  user=root
Oct 25 10:57:35 sshgateway sshd\[14328\]: Failed password for root from 116.6.84.60 port 37204 ssh2
Oct 25 11:02:36 sshgateway sshd\[14334\]: Invalid user user from 116.6.84.60
2019-10-25 19:24:36
5.172.16.66 attackspambots
Chat Spam
2019-10-25 19:06:35
71.6.146.185 attackspambots
Automatic report - Banned IP Access
2019-10-25 18:53:07
43.226.150.187 attack
Oct 25 03:45:05   DDOS Attack: SRC=43.226.150.187 DST=[Masked] LEN=48 TOS=0x00 PREC=0x00 TTL=113  DF PROTO=TCP SPT=80 DPT=21489 WINDOW=8192 RES=0x00 ACK SYN URGP=0
2019-10-25 18:49:24
75.80.193.222 attackspam
Triggered by Fail2Ban at Vostok web server
2019-10-25 18:51:33

最近上报的IP列表

94.9.163.39 104.20.139.61 188.124.68.16 104.20.14.118
150.218.135.112 104.20.14.13 9.79.250.151 104.20.14.249
104.20.14.43 104.20.140.117 104.20.149.104 104.20.15.118
104.20.15.13 104.20.15.249 104.20.15.43 104.20.150.104
104.20.157.116 104.20.158.116 182.140.64.135 104.20.158.22