必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.23.139.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50719
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.23.139.19.			IN	A

;; AUTHORITY SECTION:
.			308	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022201 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 04:15:32 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 19.139.23.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.139.23.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.51.74.199 attackbotsspam
Aug  6 05:08:19 www_kotimaassa_fi sshd[19242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.199
Aug  6 05:08:21 www_kotimaassa_fi sshd[19242]: Failed password for invalid user september from 202.51.74.199 port 38032 ssh2
...
2019-08-06 15:38:06
176.56.236.21 attackbotsspam
Aug  5 14:17:45 server6 sshd[12879]: Address 176.56.236.21 maps to alexjj.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Aug  5 14:17:45 server6 sshd[12879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.56.236.21  user=r.r
Aug  5 14:17:47 server6 sshd[12879]: Failed password for r.r from 176.56.236.21 port 34930 ssh2
Aug  5 14:17:47 server6 sshd[12879]: Received disconnect from 176.56.236.21: 11: Bye Bye [preauth]
Aug  5 14:28:03 server6 sshd[23463]: Address 176.56.236.21 maps to alexjj.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Aug  5 14:28:06 server6 sshd[23463]: Failed password for invalid user bronic from 176.56.236.21 port 56946 ssh2
Aug  5 14:28:06 server6 sshd[23463]: Received disconnect from 176.56.236.21: 11: Bye Bye [preauth]
Aug  5 14:32:42 server6 sshd[27760]: Address 176.56.236.21 maps to alexjj.com, but this does not map back to the address - POSSIB........
-------------------------------
2019-08-06 15:43:57
106.251.118.119 attackbotsspam
Aug  6 11:51:00 lcl-usvr-01 sshd[26273]: Invalid user joy from 106.251.118.119
Aug  6 11:51:00 lcl-usvr-01 sshd[26273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.251.118.119 
Aug  6 11:51:00 lcl-usvr-01 sshd[26273]: Invalid user joy from 106.251.118.119
Aug  6 11:51:02 lcl-usvr-01 sshd[26273]: Failed password for invalid user joy from 106.251.118.119 port 35294 ssh2
Aug  6 12:00:30 lcl-usvr-01 sshd[31306]: Invalid user testuser from 106.251.118.119
2019-08-06 15:52:55
139.59.119.99 attack
firewall-block, port(s): 7443/tcp
2019-08-06 16:14:24
47.28.217.40 attack
Aug  6 08:21:04 debian sshd\[14926\]: Invalid user testing from 47.28.217.40 port 60824
Aug  6 08:21:04 debian sshd\[14926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.28.217.40
...
2019-08-06 15:32:44
193.56.28.27 attackspam
2019-08-06T03:27:09.844015 X postfix/smtpd[40886]: NOQUEUE: reject: RCPT from unknown[193.56.28.27]: 554 5.7.1 Service unavailable; Client host [193.56.28.27] blocked using zen.spamhaus.org; from= to= proto=ESMTP helo=
2019-08-06 16:20:48
186.249.19.237 attackspambots
email spam
2019-08-06 15:50:39
119.123.61.122 attackspambots
Brute force SMTP login attempts.
2019-08-06 16:35:58
218.247.39.130 attackspam
Aug  6 07:06:48 www sshd\[52307\]: Invalid user admin2 from 218.247.39.130
Aug  6 07:06:48 www sshd\[52307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.247.39.130
Aug  6 07:06:50 www sshd\[52307\]: Failed password for invalid user admin2 from 218.247.39.130 port 34132 ssh2
...
2019-08-06 16:03:48
45.167.38.62 attack
SPAM Delivery Attempt
2019-08-06 16:03:16
222.170.63.27 attackbots
Aug  6 02:27:31 localhost sshd\[22257\]: Invalid user jon from 222.170.63.27 port 28395
Aug  6 02:27:31 localhost sshd\[22257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.170.63.27
...
2019-08-06 16:13:27
192.68.11.219 attackbots
20 attempts against mh-misbehave-ban on ice.magehost.pro
2019-08-06 15:39:07
167.99.224.168 attackspam
Aug  5 20:12:31 cac1d2 sshd\[13773\]: Invalid user winnie from 167.99.224.168 port 42574
Aug  5 20:12:31 cac1d2 sshd\[13773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.224.168
Aug  5 20:12:32 cac1d2 sshd\[13773\]: Failed password for invalid user winnie from 167.99.224.168 port 42574 ssh2
...
2019-08-06 16:04:07
180.76.15.162 attack
Fail2Ban Ban Triggered
2019-08-06 16:19:49
59.120.189.234 attackspambots
Aug  5 21:28:25 debian sshd\[16461\]: Invalid user sven from 59.120.189.234 port 56752
Aug  5 21:28:25 debian sshd\[16461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.189.234
Aug  5 21:28:27 debian sshd\[16461\]: Failed password for invalid user sven from 59.120.189.234 port 56752 ssh2
...
2019-08-06 15:41:18

最近上报的IP列表

104.23.138.6 104.23.139.29 104.23.139.3 104.23.140.19
104.23.140.29 104.23.141.24 104.23.142.24 104.23.143.24
104.232.105.89 104.232.43.18 104.232.43.35 104.232.76.196
104.233.128.172 104.233.129.108 104.233.129.52 104.233.151.54
104.233.156.117 104.233.252.10 104.236.106.87 104.236.109.252