必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Frankfurt am Main

省份(region): Hessen

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.248.130.10 attackspambots
Oct 13 13:54:01 ajax sshd[30630]: Failed password for root from 104.248.130.10 port 51490 ssh2
Oct 13 13:57:38 ajax sshd[31719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10
2020-10-13 21:22:10
104.248.130.10 attackspam
$f2bV_matches
2020-10-13 12:48:46
104.248.130.10 attack
Oct 12 23:29:47 mout sshd[11709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10  user=root
Oct 12 23:29:49 mout sshd[11709]: Failed password for root from 104.248.130.10 port 33700 ssh2
2020-10-13 05:36:45
104.248.130.10 attackbots
(sshd) Failed SSH login from 104.248.130.10 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 12 17:45:45 server2 sshd[5588]: Invalid user urbaldo from 104.248.130.10 port 43142
Oct 12 17:45:47 server2 sshd[5588]: Failed password for invalid user urbaldo from 104.248.130.10 port 43142 ssh2
Oct 12 17:53:34 server2 sshd[7075]: Invalid user todd from 104.248.130.10 port 39720
Oct 12 17:53:35 server2 sshd[7075]: Failed password for invalid user todd from 104.248.130.10 port 39720 ssh2
Oct 12 17:58:00 server2 sshd[7914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10  user=root
2020-10-13 03:28:41
104.248.130.10 attack
2020-10-12T10:06:45.308138server.espacesoutien.com sshd[4478]: Failed password for invalid user nesus from 104.248.130.10 port 59156 ssh2
2020-10-12T10:09:48.884519server.espacesoutien.com sshd[4706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10  user=root
2020-10-12T10:09:51.087322server.espacesoutien.com sshd[4706]: Failed password for root from 104.248.130.10 port 34288 ssh2
2020-10-12T10:13:03.737922server.espacesoutien.com sshd[5348]: Invalid user yosshimu from 104.248.130.10 port 37650
...
2020-10-12 19:00:17
104.248.130.10 attack
Oct  2 21:07:17 icinga sshd[17414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10 
Oct  2 21:07:19 icinga sshd[17414]: Failed password for invalid user temp from 104.248.130.10 port 42444 ssh2
Oct  2 21:18:18 icinga sshd[34166]: Failed password for root from 104.248.130.10 port 44596 ssh2
...
2020-10-03 06:05:11
104.248.130.10 attackspambots
2020-10-02T16:36:47.063896Z 268056658fdc New connection: 104.248.130.10:34632 (172.17.0.5:2222) [session: 268056658fdc]
2020-10-02T16:50:24.829396Z 05779c6ab74b New connection: 104.248.130.10:33808 (172.17.0.5:2222) [session: 05779c6ab74b]
2020-10-03 01:31:46
104.248.130.10 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-10-02 22:01:09
104.248.130.10 attack
Brute-force attempt banned
2020-10-02 18:32:43
104.248.130.10 attackspam
Brute-force attempt banned
2020-10-02 15:05:41
104.248.130.17 attackspambots
Invalid user nginx from 104.248.130.17 port 58826
2020-09-29 03:58:53
104.248.130.17 attack
5x Failed Password
2020-09-28 20:12:46
104.248.130.17 attack
2020-09-28T04:02:34.453296centos sshd[25036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.17
2020-09-28T04:02:34.443257centos sshd[25036]: Invalid user admin from 104.248.130.17 port 44490
2020-09-28T04:02:36.658509centos sshd[25036]: Failed password for invalid user admin from 104.248.130.17 port 44490 ssh2
...
2020-09-28 12:16:49
104.248.130.10 attackbotsspam
104.248.130.10 (DE/Germany/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 22 13:12:42 server4 sshd[13764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.181.119  user=root
Sep 22 13:10:19 server4 sshd[12210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.83.16.140  user=root
Sep 22 13:10:22 server4 sshd[12210]: Failed password for root from 154.83.16.140 port 52542 ssh2
Sep 22 13:06:45 server4 sshd[10103]: Failed password for root from 91.121.173.98 port 60074 ssh2
Sep 22 13:12:24 server4 sshd[13688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.130.10  user=root
Sep 22 13:12:25 server4 sshd[13688]: Failed password for root from 104.248.130.10 port 47334 ssh2

IP Addresses Blocked:

106.75.181.119 (CN/China/-)
154.83.16.140 (US/United States/-)
91.121.173.98 (FR/France/-)
2020-09-23 02:15:19
104.248.130.17 attackspam
Sep 22 16:45:31 IngegnereFirenze sshd[13794]: Failed password for invalid user josh from 104.248.130.17 port 44478 ssh2
...
2020-09-23 02:03:46
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       104.248.0.0 - 104.248.255.255
CIDR:           104.248.0.0/16
NetName:        DIGITALOCEAN-104-248-0-0
NetHandle:      NET-104-248-0-0-1
Parent:         NET104 (NET-104-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DigitalOcean, LLC (DO-13)
RegDate:        2018-08-06
Updated:        2020-04-03
Comment:        Routing and Peering Policy can be found at https://www.as14061.net
Comment:        
Comment:        Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref:            https://rdap.arin.net/registry/ip/104.248.0.0



OrgName:        DigitalOcean, LLC
OrgId:          DO-13
Address:        105 Edgeview Drive, Suite 425
City:           Broomfield
StateProv:      CO
PostalCode:     80021
Country:        US
RegDate:        2012-05-14
Updated:        2025-04-11
Ref:            https://rdap.arin.net/registry/entity/DO-13


OrgNOCHandle: NOC32014-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-646-827-4366 
OrgNOCEmail:  noc@digitalocean.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN

OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName:   DigitalOcean Abuse
OrgAbusePhone:  +1-646-827-4366 
OrgAbuseEmail:  abuse@digitalocean.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DIGIT19-ARIN

OrgTechHandle: NOC32014-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-646-827-4366 
OrgTechEmail:  noc@digitalocean.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.130.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56908
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.130.58.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026013101 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 01 02:30:23 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 58.130.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 58.130.248.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.245.109.234 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 06:25:15.
2019-12-20 20:05:14
117.193.96.85 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 06:25:11.
2019-12-20 20:10:54
106.51.3.214 attackspam
Dec 20 01:57:46 ny01 sshd[18687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.3.214
Dec 20 01:57:48 ny01 sshd[18687]: Failed password for invalid user pass from 106.51.3.214 port 48286 ssh2
Dec 20 02:04:36 ny01 sshd[19529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.3.214
2019-12-20 19:35:33
40.92.40.90 attackspambots
Dec 20 09:25:39 debian-2gb-vpn-nbg1-1 kernel: [1201499.006458] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.40.90 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=106 ID=1547 DF PROTO=TCP SPT=36033 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-20 19:43:12
185.142.236.34 attackbotsspam
Brute force attempt
2019-12-20 19:50:05
122.51.167.241 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-12-20 20:10:38
14.254.109.221 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 06:25:12.
2019-12-20 20:09:27
217.112.142.161 attackspam
Dec 20 07:25:41 h2421860 postfix/postscreen[2946]: CONNECT from [217.112.142.161]:58922 to [85.214.119.52]:25
Dec 20 07:25:41 h2421860 postfix/dnsblog[2991]: addr 217.112.142.161 listed by domain b.barracudacentral.org as 127.0.0.2
Dec 20 07:25:41 h2421860 postfix/dnsblog[2989]: addr 217.112.142.161 listed by domain bl.mailspike.net as 127.0.0.10
Dec 20 07:25:41 h2421860 postfix/dnsblog[2989]: addr 217.112.142.161 listed by domain Unknown.trblspam.com as 185.53.179.7
Dec 20 07:25:47 h2421860 postfix/postscreen[2946]: DNSBL rank 6 for [217.112.142.161]:58922
Dec x@x
Dec 20 07:25:47 h2421860 postfix/postscreen[2946]: DISCONNECT [217.112.142.161]:58922


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=217.112.142.161
2019-12-20 19:46:36
159.89.112.183 attackspambots
SIP/5060 Probe, BF, Hack -
2019-12-20 19:37:35
175.126.38.47 attack
Dec 20 11:44:30 MK-Soft-VM7 sshd[12610]: Failed password for root from 175.126.38.47 port 36184 ssh2
...
2019-12-20 19:43:38
223.171.32.66 attackspambots
SSH bruteforce
2019-12-20 19:49:31
54.38.214.191 attack
2019-12-20T10:08:56.025341homeassistant sshd[4846]: Invalid user squid from 54.38.214.191 port 51524
2019-12-20T10:08:56.031755homeassistant sshd[4846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
...
2019-12-20 19:58:50
77.201.199.59 attackspambots
Dec 20 07:25:35 amit sshd\[9150\]: Invalid user http from 77.201.199.59
Dec 20 07:25:35 amit sshd\[9150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.201.199.59
Dec 20 07:25:37 amit sshd\[9150\]: Failed password for invalid user http from 77.201.199.59 port 58496 ssh2
...
2019-12-20 19:44:31
167.99.105.223 attack
Automatic report - XMLRPC Attack
2019-12-20 19:57:34
36.79.26.201 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 06:25:16.
2019-12-20 20:04:55

最近上报的IP列表

80.94.92.111 27.9.178.164 102.69.167.14 135.237.123.246
162.216.149.201 64.82.206.195 235.148.2.192 68.183.219.141
165.232.113.71 164.92.161.240 218.3.40.210 176.65.139.16
100.27.169.19 165.232.100.219 180.153.236.160 151.235.33.146
117.72.204.78 93.158.91.33 93.158.90.53 34.205.74.42