必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.91.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.91.49.			IN	A

;; AUTHORITY SECTION:
.			552	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:06:49 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 49.91.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.91.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
66.249.66.65 attack
Unauthorized connection attempt detected from IP address 66.249.66.65 to port 80
2020-02-11 18:46:11
47.208.5.106 attackspam
(sshd) Failed SSH login from 47.208.5.106 (US/United States/47-208-5-106.erkacmtk04.res.dyn.suddenlink.net): 5 in the last 3600 secs
2020-02-11 18:17:37
49.233.176.124 attackspam
Feb 11 05:45:20 amida sshd[135982]: Invalid user ida from 49.233.176.124
Feb 11 05:45:20 amida sshd[135982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.176.124 
Feb 11 05:45:21 amida sshd[135982]: Failed password for invalid user ida from 49.233.176.124 port 34580 ssh2
Feb 11 05:45:23 amida sshd[135982]: Received disconnect from 49.233.176.124: 11: Bye Bye [preauth]
Feb 11 05:51:59 amida sshd[137395]: Invalid user cyd from 49.233.176.124
Feb 11 05:51:59 amida sshd[137395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.176.124 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.233.176.124
2020-02-11 18:40:43
188.163.96.59 attackbots
Feb 11 05:50:40 mail sshd\[27743\]: Invalid user admin2 from 188.163.96.59
Feb 11 05:50:40 mail sshd\[27743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.163.96.59
Feb 11 05:50:42 mail sshd\[27743\]: Failed password for invalid user admin2 from 188.163.96.59 port 30053 ssh2
...
2020-02-11 18:55:30
101.228.208.196 attackbotsspam
Automatic report - Port Scan Attack
2020-02-11 18:30:30
123.231.86.189 attack
1581396666 - 02/11/2020 05:51:06 Host: 123.231.86.189/123.231.86.189 Port: 445 TCP Blocked
2020-02-11 18:39:12
124.41.211.86 attackspam
DATE:2020-02-11 05:50:03, IP:124.41.211.86, PORT:5900 VNC brute force auth on honeypot server (epe-honey1-hq)
2020-02-11 18:24:16
62.111.172.35 attackspam
$f2bV_matches
2020-02-11 18:47:40
151.80.41.205 attack
Feb 10 19:45:50 hpm sshd\[32684\]: Invalid user cxd from 151.80.41.205
Feb 10 19:45:51 hpm sshd\[32684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns398011.ip-151-80-41.eu
Feb 10 19:45:52 hpm sshd\[32684\]: Failed password for invalid user cxd from 151.80.41.205 port 40166 ssh2
Feb 10 19:48:47 hpm sshd\[614\]: Invalid user xaz from 151.80.41.205
Feb 10 19:48:47 hpm sshd\[614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns398011.ip-151-80-41.eu
2020-02-11 18:25:45
115.84.91.242 attackbots
2020-02-1105:50:281j1NVD-0007eU-Ou\<=verena@rs-solution.chH=\(localhost\)[180.183.128.222]:42615P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:verena@rs-solution.chS=2560id=5055E3B0BB6F41F22E2B62DA2E462FD0@rs-solution.chT="\;\)beveryhappytoreceiveyouranswer\
2020-02-11 18:20:27
71.6.233.125 attack
scan z
2020-02-11 18:22:15
14.32.5.113 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-11 18:51:49
183.87.107.210 attackspambots
Feb 11 00:09:12 web9 sshd\[22111\]: Invalid user cbh from 183.87.107.210
Feb 11 00:09:12 web9 sshd\[22111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.107.210
Feb 11 00:09:14 web9 sshd\[22111\]: Failed password for invalid user cbh from 183.87.107.210 port 46284 ssh2
Feb 11 00:11:10 web9 sshd\[22413\]: Invalid user eqt from 183.87.107.210
Feb 11 00:11:10 web9 sshd\[22413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.87.107.210
2020-02-11 18:34:38
45.227.254.30 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 36 - port: 1945 proto: TCP cat: Misc Attack
2020-02-11 18:45:19
14.47.14.44 attack
Distributed brute force attack
2020-02-11 18:30:58

最近上报的IP列表

104.20.91.117 104.20.91.237 104.21.67.117 104.20.90.21
104.20.91.24 104.20.90.49 104.20.91.37 104.20.91.5
104.20.92.115 104.20.92.150 104.20.92.24 104.20.92.237
104.20.92.37 104.20.93.150 104.20.94.201 104.20.92.117
104.20.94.246 104.21.67.118 104.20.95.246 104.20.94.67