必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.82.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.82.204.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052502 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 26 06:16:41 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 204.82.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 204.82.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
129.204.203.218 attack
scans 2 times in preceeding hours on the ports (in chronological order) 19236 14266
2020-07-12 22:33:54
46.38.150.132 attackspambots
Jul 12 16:58:21 relay postfix/smtpd\[15582\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 16:58:57 relay postfix/smtpd\[14915\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 16:59:30 relay postfix/smtpd\[16042\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 17:00:06 relay postfix/smtpd\[11562\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 17:00:42 relay postfix/smtpd\[11059\]: warning: unknown\[46.38.150.132\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-12 23:00:53
165.22.216.238 attackspambots
Jul 12 13:20:39 *** sshd[5577]: Invalid user danny from 165.22.216.238
2020-07-12 22:57:13
1.179.185.50 attack
Jul 12 15:38:00 [host] sshd[4422]: Invalid user de
Jul 12 15:38:00 [host] sshd[4422]: pam_unix(sshd:a
Jul 12 15:38:02 [host] sshd[4422]: Failed password
2020-07-12 23:08:00
111.231.133.146 attackspam
Jul 12 07:59:47 server1 sshd\[27879\]: Failed password for invalid user anvisma from 111.231.133.146 port 34658 ssh2
Jul 12 08:02:27 server1 sshd\[28768\]: Invalid user class from 111.231.133.146
Jul 12 08:02:27 server1 sshd\[28768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.133.146 
Jul 12 08:02:29 server1 sshd\[28768\]: Failed password for invalid user class from 111.231.133.146 port 33634 ssh2
Jul 12 08:05:15 server1 sshd\[29546\]: Invalid user orgiast from 111.231.133.146
...
2020-07-12 22:58:59
46.38.150.72 attack
Jul 12 16:51:51 srv01 postfix/smtpd\[8326\]: warning: unknown\[46.38.150.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 16:52:27 srv01 postfix/smtpd\[545\]: warning: unknown\[46.38.150.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 16:53:02 srv01 postfix/smtpd\[8469\]: warning: unknown\[46.38.150.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 16:53:38 srv01 postfix/smtpd\[8469\]: warning: unknown\[46.38.150.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 12 16:54:13 srv01 postfix/smtpd\[10315\]: warning: unknown\[46.38.150.72\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-12 22:55:16
111.95.141.34 attackspam
Jul 12 15:47:16 vps639187 sshd\[20666\]: Invalid user jimmy from 111.95.141.34 port 57021
Jul 12 15:47:16 vps639187 sshd\[20666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.95.141.34
Jul 12 15:47:18 vps639187 sshd\[20666\]: Failed password for invalid user jimmy from 111.95.141.34 port 57021 ssh2
...
2020-07-12 22:41:30
190.104.149.194 attackbotsspam
Jul 12 13:58:34 ns3164893 sshd[25508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.149.194
Jul 12 13:58:35 ns3164893 sshd[25508]: Failed password for invalid user jiale from 190.104.149.194 port 42986 ssh2
...
2020-07-12 22:48:19
220.248.95.178 attackspam
Jul 12 14:04:59 onepixel sshd[3677989]: Invalid user ssingh from 220.248.95.178 port 53362
Jul 12 14:04:59 onepixel sshd[3677989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.95.178 
Jul 12 14:04:59 onepixel sshd[3677989]: Invalid user ssingh from 220.248.95.178 port 53362
Jul 12 14:05:00 onepixel sshd[3677989]: Failed password for invalid user ssingh from 220.248.95.178 port 53362 ssh2
Jul 12 14:08:15 onepixel sshd[3679720]: Invalid user jinpc from 220.248.95.178 port 40452
2020-07-12 22:38:37
101.89.110.204 attack
Jul 12 07:58:13 mx sshd[835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.110.204
Jul 12 07:58:15 mx sshd[835]: Failed password for invalid user picture from 101.89.110.204 port 55970 ssh2
2020-07-12 23:01:30
103.217.243.157 attack
Jul  8 17:20:49 h1946882 sshd[22411]: reveeclipse mapping checking getaddri=
nfo for node-103-217-243-157.alliancebroadband.in [103.217.243.157] fai=
led - POSSIBLE BREAK-IN ATTEMPT!
Jul  8 17:20:49 h1946882 sshd[22411]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D103.=
217.243.157=20
Jul  8 17:20:51 h1946882 sshd[22411]: Failed password for invalid user =
roberts from 103.217.243.157 port 42742 ssh2
Jul  8 17:20:51 h1946882 sshd[22411]: Received disconnect from 103.217.=
243.157: 11: Bye Bye [preauth]
Jul  8 17:40:02 h1946882 sshd[23036]: reveeclipse mapping checking getaddri=
nfo for node-103-217-243-157.alliancebroadband.in [103.217.243.157] fai=
led - POSSIBLE BREAK-IN ATTEMPT!
Jul  8 17:40:02 h1946882 sshd[23036]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D103.=
217.243.157=20


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.217.243.15
2020-07-12 23:00:01
212.129.152.148 attackspambots
Jul 12 13:22:28 rush sshd[18097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.152.148
Jul 12 13:22:31 rush sshd[18097]: Failed password for invalid user kryssianie from 212.129.152.148 port 32822 ssh2
Jul 12 13:31:17 rush sshd[18409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.152.148
...
2020-07-12 22:29:54
157.55.87.45 attack
Jul 12 13:58:51 debian-2gb-nbg1-2 kernel: \[16813710.362359\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=157.55.87.45 DST=195.201.40.59 LEN=431 TOS=0x00 PREC=0x00 TTL=39 ID=57170 DF PROTO=UDP SPT=5192 DPT=5060 LEN=411
2020-07-12 22:32:59
144.217.94.188 attack
2020-07-12T16:48:34.629002mail.standpoint.com.ua sshd[17851]: Invalid user physics from 144.217.94.188 port 47518
2020-07-12T16:48:34.631762mail.standpoint.com.ua sshd[17851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.ip-144-217-94.net
2020-07-12T16:48:34.629002mail.standpoint.com.ua sshd[17851]: Invalid user physics from 144.217.94.188 port 47518
2020-07-12T16:48:36.370545mail.standpoint.com.ua sshd[17851]: Failed password for invalid user physics from 144.217.94.188 port 47518 ssh2
2020-07-12T16:51:41.346398mail.standpoint.com.ua sshd[18257]: Invalid user cs from 144.217.94.188 port 44540
...
2020-07-12 22:43:38
5.63.162.11 attackbots
Jul 12 15:56:51 [host] sshd[5156]: Invalid user ad
Jul 12 15:56:51 [host] sshd[5156]: pam_unix(sshd:a
Jul 12 15:56:53 [host] sshd[5156]: Failed password
2020-07-12 22:34:50

最近上报的IP列表

104.20.76.111 104.20.83.204 104.200.17.190 104.201.11.214
104.206.69.31 104.206.89.164 104.207.128.105 104.207.138.32
104.207.235.47 104.207.236.174 104.207.238.69 104.207.251.155
104.207.254.127 104.208.100.207 104.208.110.246 104.208.112.161
104.208.114.29 104.208.79.228 104.209.182.25 104.21.108.16