必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.207.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63410
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.207.52.			IN	A

;; AUTHORITY SECTION:
.			317	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 06:50:52 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 52.207.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.207.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.73.145.82 attack
Event: Failed Login
Website: http://tourlaparguera.com
IP Address: 113.73.145.82
Reverse IP: 113.73.145.82
Date/Time: July 9, 2019 4:49 am


Message: User authentication failed: admin
2019-07-10 06:35:13
106.12.213.162 attackbotsspam
Jul  9 15:32:55 ip-172-31-62-245 sshd\[3191\]: Invalid user usuario from 106.12.213.162\
Jul  9 15:32:57 ip-172-31-62-245 sshd\[3191\]: Failed password for invalid user usuario from 106.12.213.162 port 52872 ssh2\
Jul  9 15:40:54 ip-172-31-62-245 sshd\[3326\]: Invalid user theo from 106.12.213.162\
Jul  9 15:40:56 ip-172-31-62-245 sshd\[3326\]: Failed password for invalid user theo from 106.12.213.162 port 59312 ssh2\
Jul  9 15:42:25 ip-172-31-62-245 sshd\[3346\]: Invalid user odoo from 106.12.213.162\
2019-07-10 06:56:39
85.111.77.177 attack
Scanning random ports - tries to find possible vulnerable services
2019-07-10 06:56:04
51.75.146.122 attackspambots
Jul  9 16:54:44 mail sshd\[25409\]: Invalid user admin from 51.75.146.122 port 51392
Jul  9 16:54:44 mail sshd\[25409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.146.122
Jul  9 16:54:47 mail sshd\[25409\]: Failed password for invalid user admin from 51.75.146.122 port 51392 ssh2
Jul  9 16:56:20 mail sshd\[25651\]: Invalid user dy from 51.75.146.122 port 40324
Jul  9 16:56:20 mail sshd\[25651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.146.122
2019-07-10 06:38:03
63.143.33.110 attack
\[2019-07-09 18:23:12\] NOTICE\[13443\] chan_sip.c: Registration from '"119" \' failed for '63.143.33.110:5608' - Wrong password
\[2019-07-09 18:23:12\] SECURITY\[13451\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-09T18:23:12.410-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="119",SessionID="0x7f02f98e5508",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/63.143.33.110/5608",Challenge="0700dca9",ReceivedChallenge="0700dca9",ReceivedHash="728f9f83c91199b039198b0e2f7d86ec"
\[2019-07-09 18:23:12\] NOTICE\[13443\] chan_sip.c: Registration from '"119" \' failed for '63.143.33.110:5608' - Wrong password
\[2019-07-09 18:23:12\] SECURITY\[13451\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-09T18:23:12.498-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="119",SessionID="0x7f02f9191e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/
2019-07-10 07:04:30
115.42.204.254 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-09 19:05:34,794 INFO [amun_request_handler] PortScan Detected on Port: 445 (115.42.204.254)
2019-07-10 06:39:48
120.89.47.88 attackbots
DDoS on port 53 UDP
2019-07-10 07:08:39
185.220.101.29 attack
2019-07-09T21:15:55.097789scmdmz1 sshd\[26896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.220.101.29  user=root
2019-07-09T21:15:57.099343scmdmz1 sshd\[26896\]: Failed password for root from 185.220.101.29 port 35133 ssh2
2019-07-09T21:16:00.095877scmdmz1 sshd\[26896\]: Failed password for root from 185.220.101.29 port 35133 ssh2
...
2019-07-10 07:16:40
157.230.93.62 attackspam
Automatic report - Web App Attack
2019-07-10 07:10:20
37.191.77.136 attackspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-09 15:21:58]
2019-07-10 06:38:32
182.147.243.50 attackbotsspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-10 07:13:34
196.219.60.68 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-09 13:03:08,745 INFO [shellcode_manager] (196.219.60.68) no match, writing hexdump (5ca807c582ab0fb756ea8089e830d6a4 :2126107) - MS17010 (EternalBlue)
2019-07-10 06:46:05
105.106.197.216 attackbots
PHI,WP GET /wp-login.php
2019-07-10 06:46:56
79.236.254.209 attackbotsspam
Autoban   79.236.254.209 AUTH/CONNECT
2019-07-10 06:48:14
181.49.106.234 attack
(mod_security) mod_security (id:211630) triggered by 181.49.106.234 (CO/Colombia/-): 5 in the last 3600 secs
2019-07-10 06:40:42

最近上报的IP列表

204.20.161.201 252.132.78.108 104.20.207.62 104.20.208.69
200.136.253.165 104.20.209.69 54.243.42.191 104.20.21.134
104.20.212.46 104.20.212.66 37.183.47.65 104.20.213.46
104.20.213.66 104.20.214.24 145.3.229.27 46.0.242.148
104.20.214.50 104.20.215.24 132.17.178.223 154.129.78.123