必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.216.104.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 660
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.216.104.138.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:40:08 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 138.104.216.104.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 104.216.104.138.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
144.217.187.3 attackbots
Brute force attempt
2020-04-24 03:11:15
85.204.246.240 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-04-24 03:05:47
181.126.83.125 attackspambots
Apr 24 00:14:40 webhost01 sshd[24291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.126.83.125
Apr 24 00:14:42 webhost01 sshd[24291]: Failed password for invalid user dv from 181.126.83.125 port 40070 ssh2
...
2020-04-24 03:23:01
51.255.41.110 attackbots
Address checking
2020-04-24 03:00:56
67.205.162.223 attackspambots
Invalid user admin from 67.205.162.223 port 42720
2020-04-24 03:17:20
52.183.128.224 attackspambots
RDP Bruteforce
2020-04-24 03:26:38
92.47.105.155 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-24 03:12:17
115.238.129.140 attack
24368/tcp 10556/tcp 13080/tcp...
[2020-04-21/23]19pkt,7pt.(tcp)
2020-04-24 02:50:17
52.233.234.60 attackspam
RDP Bruteforce
2020-04-24 03:10:06
163.172.90.145 attackbots
Apr 23 21:04:15 plex sshd[25687]: Invalid user 5.189.151.205 from 163.172.90.145 port 40362
2020-04-24 03:07:09
52.168.167.179 attackbots
2020-04-23T17:36:03Z - RDP login failed multiple times. (52.168.167.179)
2020-04-24 02:51:13
212.237.37.205 attackspambots
$f2bV_matches
2020-04-24 03:19:21
187.157.144.196 attack
Honeypot attack, port: 445, PTR: customer-187-157-144-196-sta.uninet-ide.com.mx.
2020-04-24 03:16:37
200.199.142.162 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-24 03:27:10
62.152.2.93 attackbotsspam
Honeypot attack, port: 5555, PTR: cpe-232189.ip.primehome.com.
2020-04-24 03:02:23

最近上报的IP列表

62.36.20.210 103.73.183.235 119.93.135.61 27.47.42.45
167.94.145.83 79.127.17.10 66.29.146.35 45.83.67.32
191.194.37.194 87.18.9.27 37.23.210.118 23.19.7.181
113.246.212.133 209.141.47.125 182.121.116.132 186.251.255.49
103.119.24.106 117.160.220.59 92.38.192.204 203.177.63.203