必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.244.42.130 attack
1 Attack(s) Detected
[DoS Attack: ACK Scan] from source: 104.244.42.130, port 443, Tuesday, August 18, 2020 16:43:06
2020-08-20 18:43:22
104.244.42.129 attack
Thu 11 19:08:02 53932/tcp
Thu 11 19:08:02 53932/tcp
Thu 11 19:08:02 53932/tcp
Thu 11 19:08:03 53932/tcp
Thu 11 19:08:03 53932/tcp
Thu 11 19:08:04 53932/tcp
Thu 11 19:08:06 53932/tcp
Thu 11 19:08:10 53932/tcp
Thu 11 19:08:18 53932/tcp
Thu 11 19:08:32 53932/...
2019-07-12 09:11:52
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.244.42.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41657
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.244.42.143.			IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:22:09 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 143.42.244.104.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 104.244.42.143.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.31.166 attackbots
2020-09-07T15:35:38.770261lavrinenko.info sshd[18718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
2020-09-07T15:35:40.664965lavrinenko.info sshd[18718]: Failed password for root from 222.186.31.166 port 26779 ssh2
2020-09-07T15:35:38.770261lavrinenko.info sshd[18718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.166  user=root
2020-09-07T15:35:40.664965lavrinenko.info sshd[18718]: Failed password for root from 222.186.31.166 port 26779 ssh2
2020-09-07T15:35:42.835996lavrinenko.info sshd[18718]: Failed password for root from 222.186.31.166 port 26779 ssh2
...
2020-09-07 20:37:12
23.129.64.180 attack
SSH bruteforce
2020-09-07 20:13:20
160.16.101.57 attack
2020-09-07T07:03:54.022395morrigan.ad5gb.com sshd[2012407]: Failed password for root from 160.16.101.57 port 49550 ssh2
2020-09-07T07:03:54.304674morrigan.ad5gb.com sshd[2012407]: Disconnected from authenticating user root 160.16.101.57 port 49550 [preauth]
2020-09-07 20:12:05
36.99.180.242 attackspambots
(sshd) Failed SSH login from 36.99.180.242 (CN/China/-): 5 in the last 3600 secs
2020-09-07 20:33:53
187.60.146.18 attack
Icarus honeypot on github
2020-09-07 20:50:06
123.22.212.99 attack
Sep  7 10:52:00 ns382633 sshd\[19205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.22.212.99  user=root
Sep  7 10:52:02 ns382633 sshd\[19205\]: Failed password for root from 123.22.212.99 port 64323 ssh2
Sep  7 11:02:07 ns382633 sshd\[21020\]: Invalid user kosmos from 123.22.212.99 port 58254
Sep  7 11:02:07 ns382633 sshd\[21020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.22.212.99
Sep  7 11:02:10 ns382633 sshd\[21020\]: Failed password for invalid user kosmos from 123.22.212.99 port 58254 ssh2
2020-09-07 20:51:26
140.143.207.57 attackspam
(sshd) Failed SSH login from 140.143.207.57 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  7 01:09:06 server sshd[19526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.207.57  user=root
Sep  7 01:09:08 server sshd[19526]: Failed password for root from 140.143.207.57 port 41294 ssh2
Sep  7 01:28:02 server sshd[24811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.207.57  user=root
Sep  7 01:28:04 server sshd[24811]: Failed password for root from 140.143.207.57 port 47390 ssh2
Sep  7 01:33:32 server sshd[26289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.207.57  user=root
2020-09-07 20:34:22
118.70.117.156 attackspam
Sep  7 10:33:50 root sshd[10559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.117.156 
...
2020-09-07 20:32:41
206.189.206.194 attackbotsspam
Time:     Sun Sep  6 22:43:01 2020 +0200
IP:       206.189.206.194 (US/United States/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep  6 22:39:57 mail-03 sshd[11954]: Did not receive identification string from 206.189.206.194 port 39802
Sep  6 22:42:55 mail-03 sshd[11992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.206.194  user=root
Sep  6 22:42:55 mail-03 sshd[11994]: Invalid user oracle from 206.189.206.194 port 55750
Sep  6 22:42:57 mail-03 sshd[11992]: Failed password for root from 206.189.206.194 port 52634 ssh2
Sep  6 22:42:57 mail-03 sshd[11997]: Invalid user admin from 206.189.206.194 port 58866
2020-09-07 20:35:07
14.231.117.71 attackbotsspam
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-09-07 20:41:51
112.85.42.238 attackbotsspam
Sep  7 12:10:40 plex-server sshd[2850120]: Failed password for root from 112.85.42.238 port 20400 ssh2
Sep  7 12:10:43 plex-server sshd[2850120]: Failed password for root from 112.85.42.238 port 20400 ssh2
Sep  7 12:10:48 plex-server sshd[2850120]: Failed password for root from 112.85.42.238 port 20400 ssh2
Sep  7 12:11:47 plex-server sshd[2850734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
Sep  7 12:11:49 plex-server sshd[2850734]: Failed password for root from 112.85.42.238 port 41289 ssh2
...
2020-09-07 20:33:15
211.159.218.251 attackbotsspam
2020-09-07T14:18:44.948573hostname sshd[10228]: Failed password for invalid user deploy from 211.159.218.251 port 49904 ssh2
2020-09-07T14:22:59.724160hostname sshd[10576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.218.251  user=root
2020-09-07T14:23:01.671972hostname sshd[10576]: Failed password for root from 211.159.218.251 port 41466 ssh2
...
2020-09-07 20:40:23
193.35.51.21 attackspam
Sep  7 14:03:15 galaxy event: galaxy/lswi: smtp: kaja@wirtschaftsinformatik-potsdam.de [193.35.51.21] authentication failure using internet password
Sep  7 14:03:15 galaxy event: galaxy/lswi: smtp: sandy@wirtschaftsinformatik-potsdam.de [193.35.51.21] authentication failure using internet password
Sep  7 14:03:17 galaxy event: galaxy/lswi: smtp: kaja [193.35.51.21] authentication failure using internet password
Sep  7 14:03:17 galaxy event: galaxy/lswi: smtp: sandy [193.35.51.21] authentication failure using internet password
Sep  7 14:03:23 galaxy event: galaxy/lswi: smtp: norbert@wirtschaftsinformatik-potsdam.de [193.35.51.21] authentication failure using internet password
...
2020-09-07 20:11:15
115.133.152.149 attackspam
Scanned 3 times in the last 24 hours on port 22
2020-09-07 20:32:06
89.248.172.237 attackbots
Port scan - 18 hits (greater than 5)
2020-09-07 20:27:52

最近上报的IP列表

104.244.42.136 101.109.58.249 101.109.58.252 101.109.58.34
101.109.58.35 101.109.58.40 101.109.58.46 101.109.58.51
104.245.14.39 104.245.14.65 104.245.229.65 104.245.228.65
104.245.41.6 104.245.14.40 104.245.36.237 104.245.14.24
104.245.36.153 101.109.58.54 104.245.14.35 104.245.14.91