必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.248.139.121 attackspambots
May 14 08:55:32 NPSTNNYC01T sshd[14068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
May 14 08:55:34 NPSTNNYC01T sshd[14068]: Failed password for invalid user user from 104.248.139.121 port 49288 ssh2
May 14 08:59:01 NPSTNNYC01T sshd[14354]: Failed password for root from 104.248.139.121 port 56564 ssh2
...
2020-05-14 21:25:45
104.248.139.121 attackbotsspam
May  3 06:22:00 legacy sshd[5370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
May  3 06:22:02 legacy sshd[5370]: Failed password for invalid user mf from 104.248.139.121 port 40166 ssh2
May  3 06:25:38 legacy sshd[5637]: Failed password for root from 104.248.139.121 port 49638 ssh2
...
2020-05-03 12:34:29
104.248.139.121 attackspam
SSH auth scanning - multiple failed logins
2020-04-30 07:33:34
104.248.139.121 attack
2020-04-27T13:03:38.800886abusebot-3.cloudsearch.cf sshd[30948]: Invalid user hung from 104.248.139.121 port 41966
2020-04-27T13:03:38.810081abusebot-3.cloudsearch.cf sshd[30948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
2020-04-27T13:03:38.800886abusebot-3.cloudsearch.cf sshd[30948]: Invalid user hung from 104.248.139.121 port 41966
2020-04-27T13:03:40.381859abusebot-3.cloudsearch.cf sshd[30948]: Failed password for invalid user hung from 104.248.139.121 port 41966 ssh2
2020-04-27T13:07:22.168837abusebot-3.cloudsearch.cf sshd[31229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121  user=root
2020-04-27T13:07:24.161636abusebot-3.cloudsearch.cf sshd[31229]: Failed password for root from 104.248.139.121 port 53746 ssh2
2020-04-27T13:11:04.475551abusebot-3.cloudsearch.cf sshd[31503]: Invalid user znc from 104.248.139.121 port 37302
...
2020-04-27 22:58:33
104.248.139.121 attackbots
Apr 27 11:44:11 dev0-dcde-rnet sshd[22559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
Apr 27 11:44:14 dev0-dcde-rnet sshd[22559]: Failed password for invalid user udp from 104.248.139.121 port 52906 ssh2
Apr 27 11:50:16 dev0-dcde-rnet sshd[22729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
2020-04-27 18:07:05
104.248.139.121 attackspam
Unauthorised connection attempt detected at AUO NODE 1. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-04-24 23:09:01
104.248.139.121 attackbotsspam
Invalid user od from 104.248.139.121 port 53734
2020-04-23 04:11:27
104.248.139.121 attack
Wordpress malicious attack:[sshd]
2020-04-20 12:17:42
104.248.139.121 attackspam
Apr 20 00:12:29 debian-2gb-nbg1-2 kernel: \[9593314.391754\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.248.139.121 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=23968 PROTO=TCP SPT=59620 DPT=19842 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-20 08:07:04
104.248.139.121 attackbots
scans once in preceeding hours on the ports (in chronological order) 19153 resulting in total of 5 scans from 104.248.0.0/16 block.
2020-04-20 00:13:49
104.248.139.121 attack
Apr 17 13:56:38 sso sshd[29563]: Failed password for root from 104.248.139.121 port 42032 ssh2
Apr 17 14:00:28 sso sshd[30000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
...
2020-04-17 22:34:21
104.248.139.121 attackbotsspam
Apr 17 09:49:30 vpn01 sshd[24030]: Failed password for root from 104.248.139.121 port 47328 ssh2
...
2020-04-17 16:50:57
104.248.139.121 attackspambots
Apr  8 06:00:12 sso sshd[10238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
Apr  8 06:00:14 sso sshd[10238]: Failed password for invalid user aman from 104.248.139.121 port 60516 ssh2
...
2020-04-08 12:18:20
104.248.139.121 attackspam
(sshd) Failed SSH login from 104.248.139.121 (DE/Germany/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  4 09:34:42 ubnt-55d23 sshd[17241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121  user=root
Apr  4 09:34:44 ubnt-55d23 sshd[17241]: Failed password for root from 104.248.139.121 port 43664 ssh2
2020-04-04 16:11:55
104.248.139.121 attack
Mar 28 16:31:05 dev0-dcde-rnet sshd[3144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
Mar 28 16:31:06 dev0-dcde-rnet sshd[3144]: Failed password for invalid user oracle from 104.248.139.121 port 41678 ssh2
Mar 28 16:41:28 dev0-dcde-rnet sshd[3230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.121
2020-03-29 00:22:33
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.139.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53250
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.139.33.			IN	A

;; AUTHORITY SECTION:
.			229	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 10:22:42 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 33.139.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 33.139.248.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.144.140.20 attackspambots
Jul  9 15:27:42 vps687878 sshd\[8400\]: Failed password for invalid user lissette from 192.144.140.20 port 49342 ssh2
Jul  9 15:31:00 vps687878 sshd\[8581\]: Invalid user laurel from 192.144.140.20 port 56072
Jul  9 15:31:00 vps687878 sshd\[8581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.140.20
Jul  9 15:31:01 vps687878 sshd\[8581\]: Failed password for invalid user laurel from 192.144.140.20 port 56072 ssh2
Jul  9 15:37:32 vps687878 sshd\[9186\]: Invalid user eshop from 192.144.140.20 port 41280
Jul  9 15:37:32 vps687878 sshd\[9186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.140.20
...
2020-07-10 00:01:31
35.184.155.136 attackbotsspam
2020-07-09T17:49:03.274980ks3355764 sshd[27622]: Invalid user ernestine from 35.184.155.136 port 60312
2020-07-09T17:49:05.767491ks3355764 sshd[27622]: Failed password for invalid user ernestine from 35.184.155.136 port 60312 ssh2
...
2020-07-10 00:23:39
222.186.173.238 attack
Jul  9 21:13:35 gw1 sshd[14962]: Failed password for root from 222.186.173.238 port 31140 ssh2
...
2020-07-10 00:26:10
134.209.148.107 attackbotsspam
07/09/2020-12:11:35.797235 134.209.148.107 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-10 00:15:27
222.186.15.115 attack
Jul  9 21:17:25 gw1 sshd[15093]: Failed password for root from 222.186.15.115 port 21740 ssh2
...
2020-07-10 00:17:48
222.186.180.41 attackbots
Jul  9 21:28:38 gw1 sshd[15379]: Failed password for root from 222.186.180.41 port 55682 ssh2
Jul  9 21:28:51 gw1 sshd[15379]: error: maximum authentication attempts exceeded for root from 222.186.180.41 port 55682 ssh2 [preauth]
...
2020-07-10 00:32:20
46.38.150.188 attackspam
Attempted Brute Force (dovecot)
2020-07-10 00:13:51
129.211.50.239 attackbotsspam
Jul  9 19:40:29 webhost01 sshd[3709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.50.239
Jul  9 19:40:30 webhost01 sshd[3709]: Failed password for invalid user wei from 129.211.50.239 port 51838 ssh2
...
2020-07-09 23:57:17
141.98.81.6 attackspambots
Jul  9 13:14:24 firewall sshd[24282]: Invalid user 1234 from 141.98.81.6
Jul  9 13:14:26 firewall sshd[24282]: Failed password for invalid user 1234 from 141.98.81.6 port 59494 ssh2
Jul  9 13:14:49 firewall sshd[24347]: Invalid user user from 141.98.81.6
...
2020-07-10 00:19:16
91.241.19.173 attack
attempted to connect via remote desktop connection via brute force
2020-07-10 00:04:58
141.98.10.192 attackspambots
2020-07-09T09:51:44.955326linuxbox-skyline auth[776568]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=postgres rhost=141.98.10.192
...
2020-07-10 00:17:07
104.248.138.221 attackbots
Failed password for invalid user krfarms from 104.248.138.221 port 49908 ssh2
2020-07-10 00:03:41
45.95.168.234 attackspam
Here more information about 45.95.168.234 
info: [Croatia] 42864 Giganet Internet Szolgaltato Kft 
rDNS: slot0.etherinv.com 
Connected: 2 servere(s) 
Reason: ssh 
Ports: 23 
Services: telnet 
servere: Europe/Moscow (UTC+3) 
Found at blocklist: abuseat.org, spfbl.net, abuseIPDB.com
myIP:* 
 
[2020-07-09 04:18:47] (tcp) myIP:23 <- 45.95.168.234:48854
[2020-07-09 04:33:24] (tcp) myIP:23 <- 45.95.168.234:46863


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.95.168.234
2020-07-10 00:08:15
161.35.201.124 attackbots
SSH Login Bruteforce
2020-07-10 00:03:13
121.204.185.106 attackspambots
Jul  9 17:53:16 gw1 sshd[8348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.185.106
Jul  9 17:53:18 gw1 sshd[8348]: Failed password for invalid user dorothee from 121.204.185.106 port 42480 ssh2
...
2020-07-10 00:21:10

最近上报的IP列表

104.248.153.218 104.248.144.25 104.248.166.187 112.85.126.111
104.248.168.211 104.248.133.173 104.248.160.170 104.248.150.252
104.248.168.246 104.248.168.65 104.248.171.180 112.85.126.112
104.248.194.152 104.248.150.189 104.248.173.95 104.248.181.144
104.248.195.139 104.248.199.189 104.248.195.48 104.248.202.63