必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.227.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.227.61.			IN	A

;; AUTHORITY SECTION:
.			138	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 07 18:45:44 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 61.227.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.227.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.98.53.133 attackspam
May414:15:34server6sshd[14009]:refusedconnectfrom198.98.53.133\(198.98.53.133\)May414:15:40server6sshd[14018]:refusedconnectfrom198.98.53.133\(198.98.53.133\)May414:15:45server6sshd[14028]:refusedconnectfrom198.98.53.133\(198.98.53.133\)May414:15:51server6sshd[14037]:refusedconnectfrom198.98.53.133\(198.98.53.133\)May414:15:57server6sshd[14050]:refusedconnectfrom198.98.53.133\(198.98.53.133\)
2020-05-04 20:16:05
209.150.146.126 attack
20/5/4@00:19:11: FAIL: Alarm-Network address from=209.150.146.126
20/5/4@00:19:11: FAIL: Alarm-Network address from=209.150.146.126
...
2020-05-04 20:13:26
85.192.138.149 attack
May  4 11:08:45 scw-6657dc sshd[17004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.192.138.149
May  4 11:08:45 scw-6657dc sshd[17004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.192.138.149
May  4 11:08:47 scw-6657dc sshd[17004]: Failed password for invalid user vhd from 85.192.138.149 port 48326 ssh2
...
2020-05-04 20:15:34
106.75.5.180 attackbotsspam
2020-05-04T12:26:29.995229shield sshd\[9213\]: Invalid user woody from 106.75.5.180 port 36270
2020-05-04T12:26:29.998690shield sshd\[9213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.5.180
2020-05-04T12:26:32.077965shield sshd\[9213\]: Failed password for invalid user woody from 106.75.5.180 port 36270 ssh2
2020-05-04T12:31:55.465455shield sshd\[9891\]: Invalid user hb from 106.75.5.180 port 34446
2020-05-04T12:31:55.468851shield sshd\[9891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.5.180
2020-05-04 20:41:50
118.70.151.18 attack
Unauthorized connection attempt from IP address 118.70.151.18 on Port 445(SMB)
2020-05-04 20:20:14
14.247.217.149 attackspambots
Unauthorized connection attempt from IP address 14.247.217.149 on Port 445(SMB)
2020-05-04 20:28:44
123.56.71.182 attackspam
Port scan on 3 port(s): 2377 4243 4244
2020-05-04 20:13:53
117.240.155.178 attackbots
Unauthorized connection attempt from IP address 117.240.155.178 on Port 445(SMB)
2020-05-04 20:49:24
192.67.159.27 attack
Unauthorized connection attempt from IP address 192.67.159.27 on Port 445(SMB)
2020-05-04 20:39:41
162.243.42.225 attack
May  4 14:07:54 roki sshd[15426]: Invalid user caesar from 162.243.42.225
May  4 14:07:54 roki sshd[15426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.42.225
May  4 14:07:56 roki sshd[15426]: Failed password for invalid user caesar from 162.243.42.225 port 37640 ssh2
May  4 14:15:29 roki sshd[16036]: Invalid user marcos from 162.243.42.225
May  4 14:15:29 roki sshd[16036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.42.225
...
2020-05-04 20:48:38
106.75.52.43 attack
May  4 14:15:55 ArkNodeAT sshd\[32388\]: Invalid user hammad from 106.75.52.43
May  4 14:15:55 ArkNodeAT sshd\[32388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.52.43
May  4 14:15:57 ArkNodeAT sshd\[32388\]: Failed password for invalid user hammad from 106.75.52.43 port 55762 ssh2
2020-05-04 20:18:57
51.158.111.223 attackbots
(sshd) Failed SSH login from 51.158.111.223 (FR/France/223-111-158-51.rev.cloud.scaleway.com): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  4 14:15:31 ubnt-55d23 sshd[17251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.111.223  user=root
May  4 14:15:34 ubnt-55d23 sshd[17251]: Failed password for root from 51.158.111.223 port 38022 ssh2
2020-05-04 20:43:41
77.235.22.197 attack
Unauthorized connection attempt from IP address 77.235.22.197 on Port 445(SMB)
2020-05-04 20:32:40
14.102.126.154 attackspam
Unauthorized connection attempt from IP address 14.102.126.154 on Port 445(SMB)
2020-05-04 20:18:44
186.195.18.202 attackbotsspam
" "
2020-05-04 20:10:39

最近上报的IP列表

104.20.226.61 104.20.238.36 104.20.239.36 104.20.24.19
104.20.246.85 104.20.247.85 104.20.248.17 104.20.249.17
104.20.28.88 104.20.29.88 104.20.32.71 104.20.37.241
104.20.38.241 104.20.7.23 104.20.73.60 104.20.74.60
104.20.86.186 104.20.87.186 104.20.88.224 104.20.89.224