必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.29.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.29.219.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 07:06:41 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 219.29.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.29.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
213.235.213.117 attackbots
ssh intrusion attempt
2020-07-19 07:05:02
167.114.113.141 attackbots
2020-07-18T23:01:22.205336shield sshd\[13784\]: Invalid user len from 167.114.113.141 port 38880
2020-07-18T23:01:22.210133shield sshd\[13784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.ip-167-114-113.net
2020-07-18T23:01:23.959796shield sshd\[13784\]: Failed password for invalid user len from 167.114.113.141 port 38880 ssh2
2020-07-18T23:05:15.035487shield sshd\[15255\]: Invalid user caiwch from 167.114.113.141 port 45586
2020-07-18T23:05:15.044245shield sshd\[15255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.ip-167-114-113.net
2020-07-19 07:15:40
45.227.255.4 attack
Jul 19 00:42:23 server sshd[23803]: Failed password for root from 45.227.255.4 port 13820 ssh2
Jul 19 00:42:27 server sshd[23912]: Failed password for root from 45.227.255.4 port 32973 ssh2
Jul 19 00:42:31 server sshd[23970]: Failed password for invalid user hacker from 45.227.255.4 port 54157 ssh2
2020-07-19 06:58:32
183.11.235.24 attackbots
Invalid user arthur from 183.11.235.24 port 50728
2020-07-19 07:06:43
106.241.210.208 attackbots
SSH/22 MH Probe, BF, Hack -
2020-07-19 07:09:21
125.74.27.185 attack
[ssh] SSH attack
2020-07-19 07:16:52
54.249.221.80 attackbotsspam
$f2bV_matches
2020-07-19 06:51:40
201.94.236.220 attack
Jul 19 00:29:19 ncomp sshd[8341]: Invalid user hn from 201.94.236.220
Jul 19 00:29:19 ncomp sshd[8341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.94.236.220
Jul 19 00:29:19 ncomp sshd[8341]: Invalid user hn from 201.94.236.220
Jul 19 00:29:21 ncomp sshd[8341]: Failed password for invalid user hn from 201.94.236.220 port 44376 ssh2
2020-07-19 07:10:49
218.92.0.200 attackspambots
Jul 19 00:48:59 pve1 sshd[20339]: Failed password for root from 218.92.0.200 port 40085 ssh2
Jul 19 00:49:03 pve1 sshd[20339]: Failed password for root from 218.92.0.200 port 40085 ssh2
...
2020-07-19 06:52:31
183.251.172.87 attackbots
[portscan] Port scan
2020-07-19 07:12:14
185.200.34.42 attack
B: Abusive ssh attack
2020-07-19 06:45:57
181.40.73.86 attack
Invalid user r00t from 181.40.73.86 port 17779
2020-07-19 07:12:42
218.18.101.84 attackbots
Jul 19 04:10:04 gw1 sshd[16905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.18.101.84
Jul 19 04:10:07 gw1 sshd[16905]: Failed password for invalid user software from 218.18.101.84 port 55530 ssh2
...
2020-07-19 07:14:02
77.247.181.165 attackspam
" "
2020-07-19 07:18:40
138.68.40.92 attackspam
firewall-block, port(s): 8138/tcp
2020-07-19 06:43:56

最近上报的IP列表

91.186.217.144 104.20.29.46 197.166.45.50 104.20.29.84
197.210.52.243 104.20.3.171 104.20.3.22 104.20.3.27
21.191.38.204 104.20.3.40 44.238.0.222 104.20.3.51
123.156.147.200 104.20.30.106 7.204.226.89 104.20.30.155
104.20.30.219 104.20.30.25 104.20.30.84 104.20.31.155