必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.213.156.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23685
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.213.156.141.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 10:21:32 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 141.156.213.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.156.213.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.68.201.114 attack
xmlrpc attack
2020-05-11 00:01:27
192.241.131.72 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-10 23:36:08
62.234.167.126 attackbotsspam
2020-05-10T12:03:36.085282abusebot-2.cloudsearch.cf sshd[21181]: Invalid user postgres from 62.234.167.126 port 2688
2020-05-10T12:03:36.092619abusebot-2.cloudsearch.cf sshd[21181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.167.126
2020-05-10T12:03:36.085282abusebot-2.cloudsearch.cf sshd[21181]: Invalid user postgres from 62.234.167.126 port 2688
2020-05-10T12:03:38.304697abusebot-2.cloudsearch.cf sshd[21181]: Failed password for invalid user postgres from 62.234.167.126 port 2688 ssh2
2020-05-10T12:12:28.173567abusebot-2.cloudsearch.cf sshd[21378]: Invalid user adeline from 62.234.167.126 port 63210
2020-05-10T12:12:28.179853abusebot-2.cloudsearch.cf sshd[21378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.167.126
2020-05-10T12:12:28.173567abusebot-2.cloudsearch.cf sshd[21378]: Invalid user adeline from 62.234.167.126 port 63210
2020-05-10T12:12:30.426504abusebot-2.cloudsearch.cf ss
...
2020-05-10 23:44:18
175.207.13.22 attack
prod11
...
2020-05-11 00:04:15
217.138.76.66 attackbotsspam
May 10 12:12:39 *** sshd[24307]: Invalid user pg from 217.138.76.66
2020-05-10 23:32:21
80.211.22.40 attack
May 10 17:29:35 jane sshd[30475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.22.40 
May 10 17:29:37 jane sshd[30475]: Failed password for invalid user postgres from 80.211.22.40 port 50568 ssh2
...
2020-05-10 23:51:06
194.26.29.213 attack
Port scan on 15 port(s): 56 81 93 210 245 316 1019 1046 2467 2590 2629 2875 2955 2991 3013
2020-05-11 00:01:44
45.172.108.89 attack
May 10 08:34:26 ny01 sshd[11097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.108.89
May 10 08:34:28 ny01 sshd[11097]: Failed password for invalid user git from 45.172.108.89 port 37402 ssh2
May 10 08:35:45 ny01 sshd[11249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.172.108.89
2020-05-10 23:58:57
51.15.118.15 attackbotsspam
May 10 13:15:09 scw-6657dc sshd[14998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.118.15
May 10 13:15:09 scw-6657dc sshd[14998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.118.15
May 10 13:15:11 scw-6657dc sshd[14998]: Failed password for invalid user shiny from 51.15.118.15 port 47902 ssh2
...
2020-05-11 00:00:19
50.67.178.164 attack
May 10 14:16:06 vps687878 sshd\[17514\]: Invalid user teamspeak3 from 50.67.178.164 port 50764
May 10 14:16:06 vps687878 sshd\[17514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.67.178.164
May 10 14:16:08 vps687878 sshd\[17514\]: Failed password for invalid user teamspeak3 from 50.67.178.164 port 50764 ssh2
May 10 14:23:22 vps687878 sshd\[18081\]: Invalid user fms from 50.67.178.164 port 54126
May 10 14:23:22 vps687878 sshd\[18081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.67.178.164
...
2020-05-10 23:52:49
45.33.32.135 attackbotsspam
$f2bV_matches
2020-05-10 23:48:27
45.4.5.221 attackspambots
May 10 16:12:10 ns382633 sshd\[15492\]: Invalid user ftpuser from 45.4.5.221 port 41256
May 10 16:12:10 ns382633 sshd\[15492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.4.5.221
May 10 16:12:12 ns382633 sshd\[15492\]: Failed password for invalid user ftpuser from 45.4.5.221 port 41256 ssh2
May 10 16:14:01 ns382633 sshd\[15575\]: Invalid user ubuntu from 45.4.5.221 port 35088
May 10 16:14:01 ns382633 sshd\[15575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.4.5.221
2020-05-10 23:35:32
144.217.242.247 attackspam
May 10 14:12:36 host sshd[9031]: Invalid user die from 144.217.242.247 port 44696
...
2020-05-10 23:37:38
162.243.137.247 attackspam
1589112744 - 05/10/2020 14:12:24 Host: zg-0428c-210.stretchoid.com/162.243.137.247 Port: 161 UDP Blocked
2020-05-10 23:51:34
111.230.140.177 attackspambots
May 10 14:47:16 mout sshd[3720]: Invalid user tom from 111.230.140.177 port 57308
2020-05-10 23:26:00

最近上报的IP列表

141.224.84.16 98.235.221.134 206.177.166.33 217.218.137.49
215.101.107.90 41.196.112.13 109.180.48.10 175.188.55.67
171.76.136.158 152.105.210.129 207.130.191.12 65.235.177.242
198.239.145.232 101.141.58.213 40.217.251.124 137.82.225.19
74.14.55.9 3.122.2.128 178.115.88.50 69.101.27.88