必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.28.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.28.130.			IN	A

;; AUTHORITY SECTION:
.			500	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 16:52:56 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 130.28.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 130.28.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.92.109.191 attack
2020-07-23T11:54:08.094322abusebot-2.cloudsearch.cf sshd[17837]: Invalid user str from 120.92.109.191 port 57032
2020-07-23T11:54:08.102795abusebot-2.cloudsearch.cf sshd[17837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.109.191
2020-07-23T11:54:08.094322abusebot-2.cloudsearch.cf sshd[17837]: Invalid user str from 120.92.109.191 port 57032
2020-07-23T11:54:10.931323abusebot-2.cloudsearch.cf sshd[17837]: Failed password for invalid user str from 120.92.109.191 port 57032 ssh2
2020-07-23T12:00:04.026238abusebot-2.cloudsearch.cf sshd[17953]: Invalid user zkj from 120.92.109.191 port 56316
2020-07-23T12:00:04.033279abusebot-2.cloudsearch.cf sshd[17953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.109.191
2020-07-23T12:00:04.026238abusebot-2.cloudsearch.cf sshd[17953]: Invalid user zkj from 120.92.109.191 port 56316
2020-07-23T12:00:05.732840abusebot-2.cloudsearch.cf sshd[17953]: Failed pa
...
2020-07-24 01:14:56
201.62.73.92 attackbots
2020-07-23T14:03:41.497587abusebot-2.cloudsearch.cf sshd[19368]: Invalid user se from 201.62.73.92 port 54600
2020-07-23T14:03:41.503288abusebot-2.cloudsearch.cf sshd[19368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201-62-73-92.life.com.br
2020-07-23T14:03:41.497587abusebot-2.cloudsearch.cf sshd[19368]: Invalid user se from 201.62.73.92 port 54600
2020-07-23T14:03:43.917056abusebot-2.cloudsearch.cf sshd[19368]: Failed password for invalid user se from 201.62.73.92 port 54600 ssh2
2020-07-23T14:11:51.479025abusebot-2.cloudsearch.cf sshd[19475]: Invalid user zzj from 201.62.73.92 port 43788
2020-07-23T14:11:51.487949abusebot-2.cloudsearch.cf sshd[19475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201-62-73-92.life.com.br
2020-07-23T14:11:51.479025abusebot-2.cloudsearch.cf sshd[19475]: Invalid user zzj from 201.62.73.92 port 43788
2020-07-23T14:11:53.955917abusebot-2.cloudsearch.cf sshd[19475]: Fa
...
2020-07-24 01:05:31
168.232.198.246 attackspam
2020-07-23T16:06:12.634774abusebot-7.cloudsearch.cf sshd[30694]: Invalid user cdk from 168.232.198.246 port 59554
2020-07-23T16:06:12.638768abusebot-7.cloudsearch.cf sshd[30694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-232-198-246.static.konectivatelecomunicacoes.com.br
2020-07-23T16:06:12.634774abusebot-7.cloudsearch.cf sshd[30694]: Invalid user cdk from 168.232.198.246 port 59554
2020-07-23T16:06:14.545739abusebot-7.cloudsearch.cf sshd[30694]: Failed password for invalid user cdk from 168.232.198.246 port 59554 ssh2
2020-07-23T16:10:23.344541abusebot-7.cloudsearch.cf sshd[30792]: Invalid user lianwei from 168.232.198.246 port 56762
2020-07-23T16:10:23.350564abusebot-7.cloudsearch.cf sshd[30792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-232-198-246.static.konectivatelecomunicacoes.com.br
2020-07-23T16:10:23.344541abusebot-7.cloudsearch.cf sshd[30792]: Invalid user lianwei from 168.23
...
2020-07-24 01:08:21
163.172.24.40 attackspambots
Jul 23 18:42:47 sip sshd[1052440]: Invalid user juan from 163.172.24.40 port 54162
Jul 23 18:42:49 sip sshd[1052440]: Failed password for invalid user juan from 163.172.24.40 port 54162 ssh2
Jul 23 18:48:45 sip sshd[1052472]: Invalid user ubuntu from 163.172.24.40 port 33074
...
2020-07-24 01:08:33
94.102.49.190 attack
 TCP (SYN) 94.102.49.190:20041 -> port 22, len 44
2020-07-24 00:57:45
139.59.254.93 attackspam
2020-07-23T18:09:35.869779sd-86998 sshd[24209]: Invalid user admin from 139.59.254.93 port 44669
2020-07-23T18:09:35.872143sd-86998 sshd[24209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.254.93
2020-07-23T18:09:35.869779sd-86998 sshd[24209]: Invalid user admin from 139.59.254.93 port 44669
2020-07-23T18:09:37.829171sd-86998 sshd[24209]: Failed password for invalid user admin from 139.59.254.93 port 44669 ssh2
2020-07-23T18:14:05.587757sd-86998 sshd[24805]: Invalid user frontdesk from 139.59.254.93 port 55963
...
2020-07-24 01:00:25
218.93.114.155 attackbots
Invalid user jie from 218.93.114.155 port 62784
2020-07-24 01:20:56
172.197.47.163 attackspam
Attempts against non-existent wp-login
2020-07-24 00:51:31
120.31.138.79 attack
Invalid user work1 from 120.31.138.79 port 54858
2020-07-24 01:15:45
148.70.18.216 attack
Jul 23 10:09:54 mx sshd[24885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.18.216
Jul 23 10:09:56 mx sshd[24885]: Failed password for invalid user moodle from 148.70.18.216 port 34540 ssh2
2020-07-24 01:10:54
96.44.162.82 attackbots
Time:     Thu Jul 23 08:50:55 2020 -0300
IP:       96.44.162.82 (US/United States/unassigned.quadranet.com)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-07-24 01:02:03
54.37.75.210 attack
Jul 23 18:54:30 srv-ubuntu-dev3 sshd[100083]: Invalid user cnz from 54.37.75.210
Jul 23 18:54:30 srv-ubuntu-dev3 sshd[100083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.75.210
Jul 23 18:54:30 srv-ubuntu-dev3 sshd[100083]: Invalid user cnz from 54.37.75.210
Jul 23 18:54:31 srv-ubuntu-dev3 sshd[100083]: Failed password for invalid user cnz from 54.37.75.210 port 56774 ssh2
Jul 23 18:58:03 srv-ubuntu-dev3 sshd[100446]: Invalid user ralph from 54.37.75.210
Jul 23 18:58:03 srv-ubuntu-dev3 sshd[100446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.75.210
Jul 23 18:58:03 srv-ubuntu-dev3 sshd[100446]: Invalid user ralph from 54.37.75.210
Jul 23 18:58:05 srv-ubuntu-dev3 sshd[100446]: Failed password for invalid user ralph from 54.37.75.210 port 33142 ssh2
Jul 23 19:01:31 srv-ubuntu-dev3 sshd[100896]: Invalid user dayat from 54.37.75.210
...
2020-07-24 01:17:46
116.85.15.85 attackbots
Jul 23 15:31:08 h2779839 sshd[12011]: Invalid user zhu from 116.85.15.85 port 46736
Jul 23 15:31:08 h2779839 sshd[12011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.15.85
Jul 23 15:31:08 h2779839 sshd[12011]: Invalid user zhu from 116.85.15.85 port 46736
Jul 23 15:31:10 h2779839 sshd[12011]: Failed password for invalid user zhu from 116.85.15.85 port 46736 ssh2
Jul 23 15:35:14 h2779839 sshd[12050]: Invalid user ly from 116.85.15.85 port 36370
Jul 23 15:35:14 h2779839 sshd[12050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.15.85
Jul 23 15:35:14 h2779839 sshd[12050]: Invalid user ly from 116.85.15.85 port 36370
Jul 23 15:35:16 h2779839 sshd[12050]: Failed password for invalid user ly from 116.85.15.85 port 36370 ssh2
Jul 23 15:39:11 h2779839 sshd[12117]: Invalid user admin from 116.85.15.85 port 54220
...
2020-07-24 01:00:43
114.67.77.148 attackbotsspam
Invalid user dino from 114.67.77.148 port 45804
2020-07-24 01:01:13
221.194.137.28 attackspambots
Invalid user test1234 from 221.194.137.28 port 44910
2020-07-24 01:05:06

最近上报的IP列表

104.20.28.102 104.20.28.24 104.20.28.44 104.20.28.47
202.65.46.243 192.228.219.235 104.20.28.68 104.20.29.102
18.98.240.131 104.20.29.130 104.20.29.24 104.20.29.253
104.20.29.44 104.20.29.47 104.20.29.68 104.20.3.207
104.20.3.29 104.20.3.31 104.20.30.253 104.20.30.59