必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.152.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.152.49.			IN	A

;; AUTHORITY SECTION:
.			105	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 01:34:19 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 49.152.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.152.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
179.217.33.43 attackbots
Aug  3 17:11:05 mail1 sshd[31269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.217.33.43  user=r.r
Aug  3 17:11:06 mail1 sshd[31269]: Failed password for r.r from 179.217.33.43 port 38768 ssh2
Aug  3 17:11:06 mail1 sshd[31269]: Received disconnect from 179.217.33.43 port 38768:11: Bye Bye [preauth]
Aug  3 17:11:06 mail1 sshd[31269]: Disconnected from 179.217.33.43 port 38768 [preauth]
Aug  3 17:17:21 mail1 sshd[31787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.217.33.43  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.217.33.43
2020-08-10 06:47:09
118.71.28.53 attackspam
Telnetd brute force attack detected by fail2ban
2020-08-10 06:30:11
177.1.213.19 attack
prod6
...
2020-08-10 07:04:51
178.128.37.146 attackspambots
Lines containing failures of 178.128.37.146
Aug  8 08:19:55 newdogma sshd[27733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.37.146  user=r.r
Aug  8 08:19:56 newdogma sshd[27733]: Failed password for r.r from 178.128.37.146 port 46954 ssh2
Aug  8 08:19:57 newdogma sshd[27733]: Received disconnect from 178.128.37.146 port 46954:11: Bye Bye [preauth]
Aug  8 08:19:57 newdogma sshd[27733]: Disconnected from authenticating user r.r 178.128.37.146 port 46954 [preauth]
Aug  8 08:35:06 newdogma sshd[28427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.37.146  user=r.r
Aug  8 08:35:08 newdogma sshd[28427]: Failed password for r.r from 178.128.37.146 port 46700 ssh2
Aug  8 08:35:09 newdogma sshd[28427]: Received disconnect from 178.128.37.146 port 46700:11: Bye Bye [preauth]
Aug  8 08:35:09 newdogma sshd[28427]: Disconnected from authenticating user r.r 178.128.37.146 port 46700........
------------------------------
2020-08-10 07:04:29
173.165.132.138 attackspambots
$f2bV_matches
2020-08-10 06:40:30
45.176.208.50 attackspambots
Aug 10 03:19:45 webhost01 sshd[5787]: Failed password for root from 45.176.208.50 port 44393 ssh2
...
2020-08-10 06:26:43
223.223.187.2 attackbots
Aug  9 22:15:07 Ubuntu-1404-trusty-64-minimal sshd\[8169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.187.2  user=root
Aug  9 22:15:09 Ubuntu-1404-trusty-64-minimal sshd\[8169\]: Failed password for root from 223.223.187.2 port 34964 ssh2
Aug  9 22:20:27 Ubuntu-1404-trusty-64-minimal sshd\[12291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.187.2  user=root
Aug  9 22:20:29 Ubuntu-1404-trusty-64-minimal sshd\[12291\]: Failed password for root from 223.223.187.2 port 42978 ssh2
Aug  9 22:24:34 Ubuntu-1404-trusty-64-minimal sshd\[13901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.223.187.2  user=root
2020-08-10 06:25:36
51.75.18.212 attack
Aug 10 00:11:32 ip106 sshd[8147]: Failed password for root from 51.75.18.212 port 58224 ssh2
...
2020-08-10 06:34:07
118.24.140.69 attack
Aug  9 23:38:14 OPSO sshd\[15151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.140.69  user=root
Aug  9 23:38:16 OPSO sshd\[15151\]: Failed password for root from 118.24.140.69 port 49596 ssh2
Aug  9 23:42:57 OPSO sshd\[16127\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.140.69  user=root
Aug  9 23:42:59 OPSO sshd\[16127\]: Failed password for root from 118.24.140.69 port 49043 ssh2
Aug  9 23:47:40 OPSO sshd\[17383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.140.69  user=root
2020-08-10 06:44:15
218.92.0.219 attackbots
Aug 10 00:49:43 santamaria sshd\[32359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.219  user=root
Aug 10 00:49:45 santamaria sshd\[32359\]: Failed password for root from 218.92.0.219 port 57755 ssh2
Aug 10 00:49:48 santamaria sshd\[32359\]: Failed password for root from 218.92.0.219 port 57755 ssh2
...
2020-08-10 06:58:02
123.122.163.232 attackbotsspam
Aug  9 15:26:19 mockhub sshd[25875]: Failed password for root from 123.122.163.232 port 43464 ssh2
...
2020-08-10 06:52:21
152.32.201.168 attack
Aug  9 22:15:05 ovpn sshd[16979]: Did not receive identification string from 152.32.201.168
Aug  9 22:16:07 ovpn sshd[17270]: Did not receive identification string from 152.32.201.168
Aug  9 22:19:01 ovpn sshd[17906]: Invalid user ftpuser from 152.32.201.168
Aug  9 22:19:01 ovpn sshd[17906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.201.168
Aug  9 22:19:03 ovpn sshd[17906]: Failed password for invalid user ftpuser from 152.32.201.168 port 44548 ssh2
Aug  9 22:19:05 ovpn sshd[17906]: Received disconnect from 152.32.201.168 port 44548:11: Normal Shutdown, Thank you for playing [preauth]
Aug  9 22:19:05 ovpn sshd[17906]: Disconnected from 152.32.201.168 port 44548 [preauth]
Aug  9 22:23:33 ovpn sshd[19036]: Invalid user ghostname from 152.32.201.168
Aug  9 22:23:33 ovpn sshd[19036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.201.168
Aug  9 22:23:35 ovpn sshd[19036]: Fail........
------------------------------
2020-08-10 06:25:58
142.93.161.89 attackbotsspam
142.93.161.89 - - [09/Aug/2020:22:08:17 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.161.89 - - [09/Aug/2020:22:23:39 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-10 07:01:18
104.236.247.64 attackbots
Aug1000:15:04server4pure-ftpd:\(\?@68.66.224.3\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:14:58server4pure-ftpd:\(\?@68.66.224.3\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:13:56server4pure-ftpd:\(\?@104.236.247.64\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:13:50server4pure-ftpd:\(\?@104.236.247.64\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:13:45server4pure-ftpd:\(\?@104.236.247.64\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:20:09server4pure-ftpd:\(\?@68.183.58.220\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:15:13server4pure-ftpd:\(\?@68.66.224.3\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:20:14server4pure-ftpd:\(\?@68.183.58.220\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:13:38server4pure-ftpd:\(\?@104.236.247.64\)[WARNING]Authenticationfailedforuser[%user%]Aug1000:15:09server4pure-ftpd:\(\?@68.66.224.3\)[WARNING]Authenticationfailedforuser[%user%]IPAddressesBlocked:68.66.224.3\(US/UnitedStates/az1-ss2.a2hosting.com\)
2020-08-10 06:54:52
51.75.241.233 attack
Aug 10 03:36:44 gw1 sshd[18086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.241.233
Aug 10 03:36:46 gw1 sshd[18086]: Failed password for invalid user ramon from 51.75.241.233 port 52748 ssh2
...
2020-08-10 06:40:56

最近上报的IP列表

104.20.150.120 104.20.153.49 241.201.117.95 104.20.166.32
104.20.167.126 104.20.167.32 104.20.168.126 104.20.196.23
104.20.197.23 104.20.2.119 104.20.216.38 104.20.217.38
104.20.222.84 104.20.223.84 104.20.228.16 104.20.228.67
104.20.228.70 104.20.229.16 104.20.229.67 104.20.229.70