必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.23.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36822
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.23.50.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 06:58:58 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 50.23.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.23.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
154.70.135.72 attackspambots
Unauthorized connection attempt from IP address 154.70.135.72 on Port 445(SMB)
2020-06-21 04:34:59
186.226.190.117 attack
Automatic report - Banned IP Access
2020-06-21 04:11:45
85.239.35.199 attackbotsspam
2020-06-20T23:16:08.699471lavrinenko.info sshd[16724]: Failed none for invalid user  from 85.239.35.199 port 51862 ssh2
2020-06-20T23:16:08.027233lavrinenko.info sshd[16725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.239.35.199
2020-06-20T23:16:07.488258lavrinenko.info sshd[16725]: Invalid user admin from 85.239.35.199 port 52284
2020-06-20T23:16:10.037539lavrinenko.info sshd[16725]: Failed password for invalid user admin from 85.239.35.199 port 52284 ssh2
2020-06-20T23:16:12.859768lavrinenko.info sshd[16732]: Invalid user user from 85.239.35.199 port 19556
...
2020-06-21 04:23:27
92.222.216.222 attackbotsspam
$f2bV_matches
2020-06-21 04:31:40
195.54.161.125 attackbotsspam
06/20/2020-16:46:03.831129 195.54.161.125 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-21 04:47:09
64.62.153.249 attackbotsspam
[SatJun2022:15:57.3313422020][:error][pid3674:tid47316362364672][client64.62.153.249:57786][client64.62.153.249]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:\(\?:select\|grant\|delete\|insert\|drop\|alter\|replace\|truncate\|update\|create\|rename\|describe\)[[:space:]] [a-z\|0-9\|\\\\\\\\\*\|\|\\\\\\\\\,] [[:space:]] \(\?:from\|into\|table\|database\|index\|view\)[[:space:]] [a-z\|0-9\|\\\\\\\\\*\|\|\\\\\\\\\,]\|\\\\\\\\'\|union.\*select.\*from\)"atARGS:id.[file"/etc/apache2/conf.d/modsec_rules/99_asl_jitp.conf"][line"2691"][id"390025"][rev"1"][msg"Atomicorp.comWAFRules-VirtualJustInTimePatch:X-ChangerSQLInjectionVulnerability"][severity"CRITICAL"][hostname"www.biby-chihuahua.ch"][uri"/index.php"][unique_id"Xu5ufX0KQvsUr1gig93mjwAAAEg"][SatJun2022:15:59.2382402020][:error][pid22709:tid47316351858432][client64.62.153.249:57847][client64.62.153.249]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(\?:/index\\\\\\\\.php/admin/catalog_category/save\|\(\?:/admin/st
2020-06-21 04:33:45
40.88.0.239 attackbotsspam
Web app attack using SQL injection and other hacking technics
2020-06-21 04:14:49
110.43.42.91 attack
2020-06-20T20:14:50.825240shield sshd\[5490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.42.91  user=root
2020-06-20T20:14:52.459252shield sshd\[5490\]: Failed password for root from 110.43.42.91 port 5634 ssh2
2020-06-20T20:16:09.091461shield sshd\[5896\]: Invalid user by from 110.43.42.91 port 16350
2020-06-20T20:16:09.095361shield sshd\[5896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.42.91
2020-06-20T20:16:11.577073shield sshd\[5896\]: Failed password for invalid user by from 110.43.42.91 port 16350 ssh2
2020-06-21 04:25:40
85.43.248.122 attack
Unauthorized connection attempt from IP address 85.43.248.122 on Port 445(SMB)
2020-06-21 04:32:10
119.202.208.51 attackbots
$f2bV_matches
2020-06-21 04:34:16
138.118.101.34 attackspam
Automatic report - Port Scan Attack
2020-06-21 04:32:56
185.140.12.8 attackbotsspam
Jun 20 22:27:52 vps sshd[833914]: Failed password for invalid user sammy from 185.140.12.8 port 52402 ssh2
Jun 20 22:31:55 vps sshd[854459]: Invalid user xxx from 185.140.12.8 port 52540
Jun 20 22:31:55 vps sshd[854459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.linkpardakht.com
Jun 20 22:31:57 vps sshd[854459]: Failed password for invalid user xxx from 185.140.12.8 port 52540 ssh2
Jun 20 22:36:00 vps sshd[876318]: Invalid user web from 185.140.12.8 port 52680
...
2020-06-21 04:44:41
148.71.44.11 attack
Jun 20 23:09:37 ift sshd\[50056\]: Invalid user select from 148.71.44.11Jun 20 23:09:39 ift sshd\[50056\]: Failed password for invalid user select from 148.71.44.11 port 48309 ssh2Jun 20 23:12:49 ift sshd\[50658\]: Failed password for root from 148.71.44.11 port 48322 ssh2Jun 20 23:15:49 ift sshd\[51111\]: Invalid user hiperg from 148.71.44.11Jun 20 23:15:51 ift sshd\[51111\]: Failed password for invalid user hiperg from 148.71.44.11 port 48336 ssh2
...
2020-06-21 04:47:31
61.177.172.143 attackbotsspam
Jun 20 22:23:05 vps sshd[809307]: Failed password for root from 61.177.172.143 port 24103 ssh2
Jun 20 22:23:09 vps sshd[809307]: Failed password for root from 61.177.172.143 port 24103 ssh2
Jun 20 22:23:12 vps sshd[809307]: Failed password for root from 61.177.172.143 port 24103 ssh2
Jun 20 22:23:16 vps sshd[809307]: Failed password for root from 61.177.172.143 port 24103 ssh2
Jun 20 22:23:19 vps sshd[809307]: Failed password for root from 61.177.172.143 port 24103 ssh2
...
2020-06-21 04:34:40
145.255.46.160 attack
1592684212 - 06/20/2020 22:16:52 Host: 145.255.46.160/145.255.46.160 Port: 445 TCP Blocked
2020-06-21 04:43:22

最近上报的IP列表

3.157.237.215 104.20.234.17 104.20.235.17 104.20.24.161
104.20.243.107 104.20.244.10 104.20.244.107 104.20.245.10
197.253.122.8 35.7.63.5 104.20.245.116 253.85.206.74
104.20.246.116 104.20.248.27 104.20.249.27 104.20.25.106
30.238.230.243 104.20.252.69 104.20.252.9 172.120.0.75