必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.216.105.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.216.105.134.		IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:07:09 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
134.105.216.104.in-addr.arpa domain name pointer unassigned.psychz.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.105.216.104.in-addr.arpa	name = unassigned.psychz.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.68.97.191 attackspambots
Nov 11 18:14:45 *** sshd[24364]: Invalid user mysql from 51.68.97.191
2019-11-12 02:39:55
132.145.167.107 attackspam
2019-11-11T18:32:04.923526abusebot-8.cloudsearch.cf sshd\[26904\]: Invalid user @WSX!QAZ from 132.145.167.107 port 55236
2019-11-12 02:40:25
201.148.31.113 attackbots
Unauthorised access (Nov 11) SRC=201.148.31.113 LEN=52 TTL=113 ID=28958 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-12 02:20:05
211.110.140.200 attackbots
Nov 11 19:14:44 sso sshd[6339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.110.140.200
Nov 11 19:14:46 sso sshd[6339]: Failed password for invalid user cron from 211.110.140.200 port 34968 ssh2
...
2019-11-12 02:35:01
82.214.118.6 attackspambots
fail2ban honeypot
2019-11-12 02:36:57
218.246.5.118 attack
Nov 11 15:42:06 zulu412 sshd\[13912\]: Invalid user jongwon from 218.246.5.118 port 51326
Nov 11 15:42:06 zulu412 sshd\[13912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.246.5.118
Nov 11 15:42:08 zulu412 sshd\[13912\]: Failed password for invalid user jongwon from 218.246.5.118 port 51326 ssh2
...
2019-11-12 02:21:22
198.199.73.177 attackbots
2019-11-11T18:15:36.800207shield sshd\[2045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.73.177  user=bin
2019-11-11T18:15:38.542488shield sshd\[2045\]: Failed password for bin from 198.199.73.177 port 44718 ssh2
2019-11-11T18:19:16.105028shield sshd\[2260\]: Invalid user nuntel from 198.199.73.177 port 54236
2019-11-11T18:19:16.109555shield sshd\[2260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.199.73.177
2019-11-11T18:19:18.388536shield sshd\[2260\]: Failed password for invalid user nuntel from 198.199.73.177 port 54236 ssh2
2019-11-12 02:29:57
113.88.164.95 attack
Nov 11 15:30:30 mxgate1 postfix/postscreen[21735]: CONNECT from [113.88.164.95]:57618 to [176.31.12.44]:25
Nov 11 15:30:30 mxgate1 postfix/dnsblog[22084]: addr 113.88.164.95 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 11 15:30:30 mxgate1 postfix/dnsblog[22093]: addr 113.88.164.95 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 11 15:30:30 mxgate1 postfix/dnsblog[22093]: addr 113.88.164.95 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 11 15:30:30 mxgate1 postfix/dnsblog[22093]: addr 113.88.164.95 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 11 15:30:30 mxgate1 postfix/dnsblog[22087]: addr 113.88.164.95 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 11 15:30:36 mxgate1 postfix/postscreen[21735]: DNSBL rank 4 for [113.88.164.95]:57618
Nov x@x
Nov 11 15:30:39 mxgate1 postfix/postscreen[21735]: DISCONNECT [113.88.164.95]:57618


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.88.164.95
2019-11-12 02:05:30
49.234.28.54 attack
Nov 11 16:07:01 vpn01 sshd[19962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.28.54
Nov 11 16:07:03 vpn01 sshd[19962]: Failed password for invalid user petrella from 49.234.28.54 port 45334 ssh2
...
2019-11-12 02:30:57
118.24.99.163 attackbotsspam
2019-11-11T14:41:35.402109abusebot-5.cloudsearch.cf sshd\[4083\]: Invalid user robert from 118.24.99.163 port 14131
2019-11-12 02:34:20
61.146.115.89 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/61.146.115.89/ 
 
 CN - 1H : (135)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 61.146.115.89 
 
 CIDR : 61.146.96.0/19 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 2 
  3H - 2 
  6H - 7 
 12H - 12 
 24H - 17 
 
 DateTime : 2019-11-11 15:42:09 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-11-12 02:18:36
81.192.53.131 attackbots
Unauthorised access (Nov 11) SRC=81.192.53.131 LEN=40 TOS=0x08 PREC=0x20 TTL=242 ID=50351 TCP DPT=1433 WINDOW=1024 SYN
2019-11-12 02:13:32
107.175.24.229 attackspam
Nov 11 20:45:51 server sshd\[31268\]: Invalid user www from 107.175.24.229
Nov 11 20:45:51 server sshd\[31268\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.24.229 
Nov 11 20:45:53 server sshd\[31268\]: Failed password for invalid user www from 107.175.24.229 port 44974 ssh2
Nov 11 21:06:21 server sshd\[4347\]: Invalid user haubold from 107.175.24.229
Nov 11 21:06:21 server sshd\[4347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.24.229 
...
2019-11-12 02:07:19
182.254.154.89 attackspambots
Nov 11 17:02:44 ns382633 sshd\[13580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.154.89  user=root
Nov 11 17:02:47 ns382633 sshd\[13580\]: Failed password for root from 182.254.154.89 port 33436 ssh2
Nov 11 17:16:30 ns382633 sshd\[16250\]: Invalid user muce from 182.254.154.89 port 54930
Nov 11 17:16:30 ns382633 sshd\[16250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.154.89
Nov 11 17:16:32 ns382633 sshd\[16250\]: Failed password for invalid user muce from 182.254.154.89 port 54930 ssh2
2019-11-12 02:26:42
192.99.66.39 attackbotsspam
Unpaid orders (more than 10 in the last year) from Barcelona, Alejandro Domingo. False address
2019-11-12 02:15:51

最近上报的IP列表

104.216.105.133 104.216.111.31 104.216.105.135 104.216.111.33
104.216.122.100 104.216.45.197 104.219.28.80 104.219.29.220
104.219.29.245 104.219.29.18 104.219.28.90 104.219.29.210
104.22.13.76 104.22.15.88 104.22.14.88 104.219.29.218
104.22.16.82 104.22.17.98 104.22.20.168 104.22.16.98