必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.241.135.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11344
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.241.135.49.			IN	A

;; AUTHORITY SECTION:
.			332	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 06:50:08 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 49.135.241.104.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 104.241.135.49.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.65.130.27 attackspambots
Chat Spam
2019-10-30 02:19:36
12.19.117.152 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-10-30 02:26:20
129.211.41.162 attackspambots
Automatic report - Banned IP Access
2019-10-30 02:08:30
109.93.59.82 attackspambots
TCP Port Scanning
2019-10-30 02:03:41
37.34.185.82 attackspambots
Automatic report - Port Scan Attack
2019-10-30 01:55:42
54.36.52.119 attackbots
54.36.52.119 has been banned for [WebApp Attack]
...
2019-10-30 02:11:26
131.100.104.149 attack
Port Scan
2019-10-30 01:59:19
222.186.175.212 attackbotsspam
Oct 29 17:45:42 sshgateway sshd\[2527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
Oct 29 17:45:44 sshgateway sshd\[2527\]: Failed password for root from 222.186.175.212 port 11574 ssh2
Oct 29 17:46:00 sshgateway sshd\[2527\]: error: maximum authentication attempts exceeded for root from 222.186.175.212 port 11574 ssh2 \[preauth\]
2019-10-30 01:50:21
60.30.77.19 attackbotsspam
Oct 29 13:10:37 ncomp sshd[19459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.30.77.19  user=root
Oct 29 13:10:39 ncomp sshd[19459]: Failed password for root from 60.30.77.19 port 37698 ssh2
Oct 29 13:33:15 ncomp sshd[19716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.30.77.19  user=root
Oct 29 13:33:18 ncomp sshd[19716]: Failed password for root from 60.30.77.19 port 42316 ssh2
2019-10-30 02:15:36
106.12.132.187 attackbotsspam
Oct 29 13:38:10 microserver sshd[16574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187
Oct 29 13:38:12 microserver sshd[16574]: Failed password for invalid user minecraft from 106.12.132.187 port 46264 ssh2
Oct 29 13:43:00 microserver sshd[17245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187  user=root
Oct 29 13:43:03 microserver sshd[17245]: Failed password for root from 106.12.132.187 port 55746 ssh2
Oct 29 14:08:12 microserver sshd[20583]: Invalid user upload from 106.12.132.187 port 46760
Oct 29 14:08:12 microserver sshd[20583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187
Oct 29 14:08:13 microserver sshd[20583]: Failed password for invalid user upload from 106.12.132.187 port 46760 ssh2
Oct 29 14:12:57 microserver sshd[21262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.187  user=
2019-10-30 02:06:10
111.231.239.143 attackspam
Oct 29 15:39:51 icinga sshd[6383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.239.143
Oct 29 15:39:54 icinga sshd[6383]: Failed password for invalid user adminnjig from 111.231.239.143 port 51234 ssh2
...
2019-10-30 02:08:53
106.12.13.138 attackspam
Oct 29 17:39:57 DAAP sshd[12054]: Invalid user brunol from 106.12.13.138 port 45960
Oct 29 17:39:57 DAAP sshd[12054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.138
Oct 29 17:39:57 DAAP sshd[12054]: Invalid user brunol from 106.12.13.138 port 45960
Oct 29 17:39:59 DAAP sshd[12054]: Failed password for invalid user brunol from 106.12.13.138 port 45960 ssh2
Oct 29 17:44:37 DAAP sshd[12120]: Invalid user admin from 106.12.13.138 port 54722
...
2019-10-30 02:18:14
103.81.84.140 attack
Website hacking attempt: Wordpress admin access [wp-login.php]
2019-10-30 02:21:45
125.213.233.211 attack
...
2019-10-30 01:49:47
91.121.7.155 attack
2019-10-29T16:17:24.333673scmdmz1 sshd\[18528\]: Invalid user squires from 91.121.7.155 port 6649
2019-10-29T16:17:24.336289scmdmz1 sshd\[18528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns37845.ip-91-121-7.eu
2019-10-29T16:17:25.832305scmdmz1 sshd\[18528\]: Failed password for invalid user squires from 91.121.7.155 port 6649 ssh2
...
2019-10-30 02:04:06

最近上报的IP列表

245.30.0.248 151.253.78.249 142.223.153.3 213.188.183.218
45.81.136.166 130.57.219.55 158.188.176.56 20.250.49.212
62.76.236.206 200.24.128.236 220.189.154.106 209.159.31.229
153.104.97.115 64.167.58.167 241.130.247.122 253.125.159.192
251.15.108.228 13.239.213.47 104.140.215.211 50.144.161.144