必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.109.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.109.194.		IN	A

;; AUTHORITY SECTION:
.			201	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030302 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 11:53:46 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 194.109.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.109.248.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.242.34.166 attackbotsspam
$f2bV_matches
2020-08-08 22:30:59
129.211.36.4 attackspam
2020-08-08T14:15:43.256840ks3355764 sshd[5376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.36.4  user=root
2020-08-08T14:15:45.308879ks3355764 sshd[5376]: Failed password for root from 129.211.36.4 port 54940 ssh2
...
2020-08-08 22:39:29
49.232.51.60 attackspam
Aug  8 14:10:49 sso sshd[22241]: Failed password for root from 49.232.51.60 port 50648 ssh2
...
2020-08-08 22:55:49
106.13.166.38 attackbots
Aug  8 08:15:15 mail sshd\[39784\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.166.38  user=root
...
2020-08-08 23:08:49
123.207.153.52 attackspam
Aug  8 16:38:12 serwer sshd\[26879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.153.52  user=root
Aug  8 16:38:14 serwer sshd\[26879\]: Failed password for root from 123.207.153.52 port 42068 ssh2
Aug  8 16:44:43 serwer sshd\[27564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.153.52  user=root
...
2020-08-08 22:54:38
222.186.175.167 attack
Aug  8 14:27:10 scw-6657dc sshd[26547]: Failed password for root from 222.186.175.167 port 58346 ssh2
Aug  8 14:27:10 scw-6657dc sshd[26547]: Failed password for root from 222.186.175.167 port 58346 ssh2
Aug  8 14:27:13 scw-6657dc sshd[26547]: Failed password for root from 222.186.175.167 port 58346 ssh2
...
2020-08-08 22:29:47
49.89.250.23 attackspam
49.89.250.23 - - [08/Aug/2020:15:45:14 +0200] "POST /inc/md5.asp HTTP/1.1" 404 17548 "https://nfsec.pl/inc/md5.asp" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
49.89.250.23 - - [08/Aug/2020:15:45:16 +0200] "POST /inc/md5.asp HTTP/1.1" 404 11780 "https://nfsec.pl/inc/md5.asp" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
49.89.250.23 - - [08/Aug/2020:15:45:25 +0200] "POST /inc/md5.asp HTTP/1.1" 404 17341 "https://nfsec.pl/inc/md5.asp" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
49.89.250.23 - - [08/Aug/2020:15:45:27 +0200] "POST /inc/md5.asp HTTP/1.1" 404 11923 "https://nfsec.pl/inc/md5.asp" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
49.89.250.23 - - [08/Aug/2020:15:45:28 +0200] "POST /inc/md5.asp HTTP/1.1" 404 11926 "https://nfsec.pl/inc/md5.asp" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
...
2020-08-08 22:59:22
177.36.248.186 attackbotsspam
Unauthorized connection attempt from IP address 177.36.248.186 on Port 445(SMB)
2020-08-08 22:49:35
103.89.89.60 attack
Aug  8 15:28:25 debian-2gb-nbg1-2 kernel: \[19151751.924734\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.89.89.60 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=40678 PROTO=TCP SPT=51602 DPT=3392 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-08 22:33:37
220.76.205.178 attackspambots
Aug  8 08:15:20 mail sshd\[40119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.178  user=root
...
2020-08-08 22:57:51
122.178.88.240 attackspam
Unauthorized connection attempt from IP address 122.178.88.240 on Port 445(SMB)
2020-08-08 22:37:12
101.68.78.194 attackspam
Aug  8 12:10:32 plex-server sshd[1392982]: Failed password for root from 101.68.78.194 port 37438 ssh2
Aug  8 12:12:56 plex-server sshd[1393909]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.78.194  user=root
Aug  8 12:12:58 plex-server sshd[1393909]: Failed password for root from 101.68.78.194 port 44278 ssh2
Aug  8 12:15:37 plex-server sshd[1394928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.78.194  user=root
Aug  8 12:15:39 plex-server sshd[1394928]: Failed password for root from 101.68.78.194 port 51110 ssh2
...
2020-08-08 22:45:48
144.160.112.15 attackspambots
AT&T says my account 262863093 has been created and they will be out to setup my DirectTV.  Funny I never signed up with AT&T.  I guess they are so hard up for business they are just randomly choosing people to give DirectTV to.  Lord knows no one in their right mind would purchase it.  Whoever the idiot is who is getting DirectTV is paying $180.31 promo a month for it.  Hasn't he heard of Sling?
2020-08-08 22:54:22
36.78.168.94 attack
Automatic report - Port Scan Attack
2020-08-08 22:48:24
182.61.40.214 attackspam
Aug  8 15:16:01 nextcloud sshd\[23550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.40.214  user=root
Aug  8 15:16:04 nextcloud sshd\[23550\]: Failed password for root from 182.61.40.214 port 36412 ssh2
Aug  8 15:17:24 nextcloud sshd\[24982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.40.214  user=root
2020-08-08 22:53:14

最近上报的IP列表

104.248.115.30 104.248.105.149 112.78.149.180 104.248.115.2
112.78.149.235 112.78.149.50 104.248.234.151 104.248.41.127
104.248.27.22 104.248.57.159 104.248.83.178 104.248.25.95
104.25.100.53 104.248.42.181 104.25.110.28 112.78.149.52
104.25.111.28 104.25.113.34 104.25.117.22 104.25.116.22