必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.248.148.34 attack
Nov 25 19:16:03 h2177944 sshd\[29503\]: Invalid user jasmin from 104.248.148.34 port 36974
Nov 25 19:16:03 h2177944 sshd\[29503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.34
Nov 25 19:16:05 h2177944 sshd\[29503\]: Failed password for invalid user jasmin from 104.248.148.34 port 36974 ssh2
Nov 25 19:23:18 h2177944 sshd\[29702\]: Invalid user dyrlie from 104.248.148.34 port 46472
Nov 25 19:23:18 h2177944 sshd\[29702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.34
...
2019-11-26 04:28:58
104.248.148.98 attackbots
2019-09-22T07:35:38.446967enmeeting.mahidol.ac.th sshd\[11482\]: Invalid user ftpuser from 104.248.148.98 port 49728
2019-09-22T07:35:38.462169enmeeting.mahidol.ac.th sshd\[11482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.98
2019-09-22T07:35:40.546752enmeeting.mahidol.ac.th sshd\[11482\]: Failed password for invalid user ftpuser from 104.248.148.98 port 49728 ssh2
...
2019-09-22 09:47:15
104.248.148.34 attackspam
Sep  8 18:39:32 vpxxxxxxx22308 sshd[14182]: Invalid user rtest from 104.248.148.34
Sep  8 18:39:32 vpxxxxxxx22308 sshd[14182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.34
Sep  8 18:39:34 vpxxxxxxx22308 sshd[14182]: Failed password for invalid user rtest from 104.248.148.34 port 54336 ssh2
Sep  8 18:49:04 vpxxxxxxx22308 sshd[15625]: Invalid user ts3server from 104.248.148.34
Sep  8 18:49:04 vpxxxxxxx22308 sshd[15625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.34

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.248.148.34
2019-09-16 17:22:56
104.248.148.34 attack
2019-09-10T08:55:33.402275abusebot-8.cloudsearch.cf sshd\[23044\]: Invalid user developer from 104.248.148.34 port 37844
2019-09-10 17:18:16
104.248.148.34 attack
2019-09-04T17:02:38.486164abusebot-8.cloudsearch.cf sshd\[20946\]: Invalid user pawel from 104.248.148.34 port 42314
2019-09-05 01:41:10
104.248.148.98 attackbots
$f2bV_matches
2019-09-02 14:11:39
104.248.148.98 attackbotsspam
Aug 27 11:16:46 pkdns2 sshd\[57154\]: Invalid user mono from 104.248.148.98Aug 27 11:16:47 pkdns2 sshd\[57154\]: Failed password for invalid user mono from 104.248.148.98 port 51520 ssh2Aug 27 11:21:39 pkdns2 sshd\[57387\]: Invalid user vtcbikes from 104.248.148.98Aug 27 11:21:41 pkdns2 sshd\[57387\]: Failed password for invalid user vtcbikes from 104.248.148.98 port 40366 ssh2Aug 27 11:26:30 pkdns2 sshd\[57616\]: Invalid user archuser from 104.248.148.98Aug 27 11:26:32 pkdns2 sshd\[57616\]: Failed password for invalid user archuser from 104.248.148.98 port 57660 ssh2
...
2019-08-27 16:36:34
104.248.148.98 attack
Aug 26 22:46:06 SilenceServices sshd[13571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.98
Aug 26 22:46:08 SilenceServices sshd[13571]: Failed password for invalid user gpu from 104.248.148.98 port 56196 ssh2
Aug 26 22:50:37 SilenceServices sshd[15320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.98
2019-08-27 05:04:36
104.248.148.98 attack
Invalid user jana from 104.248.148.98 port 49152
2019-08-25 00:20:33
104.248.148.98 attackspam
$f2bV_matches
2019-08-13 05:59:54
104.248.148.98 attackbotsspam
Aug 10 22:25:15 unicornsoft sshd\[14958\]: Invalid user ultra from 104.248.148.98
Aug 10 22:25:15 unicornsoft sshd\[14958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.98
Aug 10 22:25:16 unicornsoft sshd\[14958\]: Failed password for invalid user ultra from 104.248.148.98 port 38864 ssh2
2019-08-11 12:11:57
104.248.148.98 attack
Aug  6 12:00:40 MK-Soft-VM4 sshd\[21025\]: Invalid user ts2 from 104.248.148.98 port 47282
Aug  6 12:00:40 MK-Soft-VM4 sshd\[21025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.98
Aug  6 12:00:41 MK-Soft-VM4 sshd\[21025\]: Failed password for invalid user ts2 from 104.248.148.98 port 47282 ssh2
...
2019-08-07 03:08:17
104.248.148.52 attackbots
Apr 13 17:05:07 ubuntu sshd[20205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.52
Apr 13 17:05:09 ubuntu sshd[20205]: Failed password for invalid user bsd from 104.248.148.52 port 33326 ssh2
Apr 13 17:07:50 ubuntu sshd[20266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.52
Apr 13 17:07:52 ubuntu sshd[20266]: Failed password for invalid user weixin from 104.248.148.52 port 34762 ssh2
2019-07-31 21:11:59
104.248.148.98 attackspambots
Apr 20 08:20:34 ubuntu sshd[9755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.98
Apr 20 08:20:35 ubuntu sshd[9755]: Failed password for invalid user delete from 104.248.148.98 port 38690 ssh2
Apr 20 08:23:14 ubuntu sshd[9836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.148.98
Apr 20 08:23:17 ubuntu sshd[9836]: Failed password for invalid user correo from 104.248.148.98 port 36342 ssh2
2019-07-31 21:07:40
104.248.148.98 attackspambots
SSH invalid-user multiple login try
2019-07-11 11:37:11
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.148.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43318
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.148.54.			IN	A

;; AUTHORITY SECTION:
.			572	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022202 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 04:20:11 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 54.148.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.148.248.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.33.65.196 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:31:21,735 INFO [amun_request_handler] PortScan Detected on Port: 445 (41.33.65.196)
2019-08-04 10:25:24
54.38.185.87 attackspambots
Aug  4 03:08:04 xeon sshd[59641]: Failed password for invalid user martin from 54.38.185.87 port 53254 ssh2
2019-08-04 10:36:06
117.158.73.58 attack
Aug  4 02:50:22 xeon cyrus/imaps[55088]: badlogin: [117.158.73.58] plain [SASL(-13): authentication failure: Password verification failed]
2019-08-04 10:08:58
211.106.110.49 attackspam
Aug  4 02:47:11 debian sshd\[23703\]: Invalid user ftpuser from 211.106.110.49 port 41044
Aug  4 02:47:11 debian sshd\[23703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.106.110.49
...
2019-08-04 09:54:06
177.92.16.186 attack
Aug  4 04:27:22 vps691689 sshd[11537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.16.186
Aug  4 04:27:24 vps691689 sshd[11537]: Failed password for invalid user tomas from 177.92.16.186 port 8348 ssh2
...
2019-08-04 10:42:17
91.217.4.74 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:29:35,906 INFO [amun_request_handler] PortScan Detected on Port: 445 (91.217.4.74)
2019-08-04 10:37:04
129.205.208.22 attack
Jan 23 15:20:48 motanud sshd\[21879\]: Invalid user test1 from 129.205.208.22 port 10659
Jan 23 15:20:48 motanud sshd\[21879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.208.22
Jan 23 15:20:49 motanud sshd\[21879\]: Failed password for invalid user test1 from 129.205.208.22 port 10659 ssh2
Mar  4 07:28:17 motanud sshd\[8624\]: Invalid user td from 129.205.208.22 port 26699
Mar  4 07:28:17 motanud sshd\[8624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.208.22
Mar  4 07:28:19 motanud sshd\[8624\]: Failed password for invalid user td from 129.205.208.22 port 26699 ssh2
2019-08-04 10:40:01
196.252.95.233 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:33:10,142 INFO [amun_request_handler] PortScan Detected on Port: 445 (196.252.95.233)
2019-08-04 10:22:53
189.109.203.222 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:36:50,551 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.109.203.222)
2019-08-04 10:11:12
188.213.118.168 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:38:45,691 INFO [amun_request_handler] PortScan Detected on Port: 445 (188.213.118.168)
2019-08-04 10:06:54
180.151.225.195 attackbotsspam
Aug  3 22:23:04 TORMINT sshd\[13737\]: Invalid user leon from 180.151.225.195
Aug  3 22:23:04 TORMINT sshd\[13737\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.151.225.195
Aug  3 22:23:07 TORMINT sshd\[13737\]: Failed password for invalid user leon from 180.151.225.195 port 51302 ssh2
...
2019-08-04 10:40:27
101.89.216.223 attack
Aug  3 22:36:24 web1 postfix/smtpd[4573]: warning: unknown[101.89.216.223]: SASL LOGIN authentication failed: authentication failure
...
2019-08-04 10:47:39
129.205.208.21 attackspam
Jan 23 15:25:03 motanud sshd\[22063\]: Invalid user wmaina from 129.205.208.21 port 31267
Jan 23 15:25:03 motanud sshd\[22063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.208.21
Jan 23 15:25:05 motanud sshd\[22063\]: Failed password for invalid user wmaina from 129.205.208.21 port 31267 ssh2
Mar  4 07:20:56 motanud sshd\[8200\]: Invalid user ftpadmin from 129.205.208.21 port 9310
Mar  4 07:20:56 motanud sshd\[8200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.205.208.21
Mar  4 07:20:58 motanud sshd\[8200\]: Failed password for invalid user ftpadmin from 129.205.208.21 port 9310 ssh2
2019-08-04 10:43:31
96.23.98.149 attackspambots
Aug  4 04:31:45 tux-35-217 sshd\[28004\]: Invalid user gtekautomation from 96.23.98.149 port 40146
Aug  4 04:31:45 tux-35-217 sshd\[28004\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.23.98.149
Aug  4 04:31:46 tux-35-217 sshd\[28004\]: Failed password for invalid user gtekautomation from 96.23.98.149 port 40146 ssh2
Aug  4 04:36:21 tux-35-217 sshd\[28029\]: Invalid user violet from 96.23.98.149 port 36172
Aug  4 04:36:21 tux-35-217 sshd\[28029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.23.98.149
...
2019-08-04 10:36:41
115.231.163.85 attackbotsspam
Aug  3 22:03:38 xtremcommunity sshd\[23334\]: Invalid user ts1 from 115.231.163.85 port 34486
Aug  3 22:03:38 xtremcommunity sshd\[23334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.163.85
Aug  3 22:03:39 xtremcommunity sshd\[23334\]: Failed password for invalid user ts1 from 115.231.163.85 port 34486 ssh2
Aug  3 22:09:01 xtremcommunity sshd\[23477\]: Invalid user jenniferm from 115.231.163.85 port 56212
Aug  3 22:09:01 xtremcommunity sshd\[23477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.163.85
...
2019-08-04 10:15:04

最近上报的IP列表

104.248.148.175 104.248.157.15 104.248.160.202 104.248.166.237
104.248.170.248 104.248.171.182 104.248.179.163 104.248.184.156
104.248.194.202 104.248.196.242 104.248.20.20 104.248.20.213
104.248.202.246 104.248.202.6 104.248.203.128 104.248.207.206
104.248.21.168 98.97.249.243 104.248.21.80 104.248.217.2