必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.248.57.44 attack
123
2023-03-21 07:11:39
104.248.52.139 attackspam
" "
2020-10-06 07:58:35
104.248.52.139 attackspambots
 TCP (SYN) 104.248.52.139:52595 -> port 22, len 40
2020-10-06 00:19:49
104.248.52.139 attackbots
 TCP (SYN) 104.248.52.139:54796 -> port 22, len 44
2020-10-05 16:19:36
104.248.57.44 attack
$f2bV_matches
2020-10-04 03:25:15
104.248.57.44 attackbotsspam
(sshd) Failed SSH login from 104.248.57.44 (US/United States/-): 5 in the last 3600 secs
2020-10-03 19:19:48
104.248.57.44 attack
Sep 26 17:17:10 ns392434 sshd[31440]: Invalid user teacher from 104.248.57.44 port 45812
Sep 26 17:17:10 ns392434 sshd[31440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.44
Sep 26 17:17:10 ns392434 sshd[31440]: Invalid user teacher from 104.248.57.44 port 45812
Sep 26 17:17:12 ns392434 sshd[31440]: Failed password for invalid user teacher from 104.248.57.44 port 45812 ssh2
Sep 26 17:24:42 ns392434 sshd[31569]: Invalid user cloud from 104.248.57.44 port 58364
Sep 26 17:24:42 ns392434 sshd[31569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.44
Sep 26 17:24:42 ns392434 sshd[31569]: Invalid user cloud from 104.248.57.44 port 58364
Sep 26 17:24:44 ns392434 sshd[31569]: Failed password for invalid user cloud from 104.248.57.44 port 58364 ssh2
Sep 26 17:27:22 ns392434 sshd[31652]: Invalid user test1 from 104.248.57.44 port 45422
2020-09-27 01:36:49
104.248.57.44 attackspambots
k+ssh-bruteforce
2020-09-26 17:29:46
104.248.57.44 attack
SSH invalid-user multiple login try
2020-09-16 01:59:00
104.248.57.44 attackbots
$f2bV_matches
2020-09-15 17:52:21
104.248.57.44 attackspam
Invalid user elias from 104.248.57.44 port 44796
2020-09-14 21:16:02
104.248.57.44 attackspam
Invalid user elias from 104.248.57.44 port 44796
2020-09-14 13:09:14
104.248.57.44 attackbotsspam
B: Abusive ssh attack
2020-09-14 05:10:11
104.248.57.44 attackspam
Sep  9 08:48:05 root sshd[24202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.44 
Sep  9 08:48:07 root sshd[24202]: Failed password for invalid user confluence1 from 104.248.57.44 port 57582 ssh2
...
2020-09-09 22:17:48
104.248.57.44 attack
Sep  9 08:48:05 root sshd[24202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.57.44 
Sep  9 08:48:07 root sshd[24202]: Failed password for invalid user confluence1 from 104.248.57.44 port 57582 ssh2
...
2020-09-09 16:02:50
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.5.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.5.81.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:12:27 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 81.5.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.5.248.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
159.65.149.139 attack
invalid user kai from 159.65.149.139 port 35422 ssh2
2020-09-28 07:54:15
188.19.180.254 attackbots
 TCP (SYN) 188.19.180.254:20592 -> port 23, len 40
2020-09-28 07:39:17
138.68.238.242 attackbotsspam
Sep 28 01:35:39 server sshd[43762]: Failed password for invalid user lucia from 138.68.238.242 port 53172 ssh2
Sep 28 01:40:59 server sshd[45102]: Failed password for invalid user roman from 138.68.238.242 port 33556 ssh2
Sep 28 01:46:30 server sshd[46307]: Failed password for invalid user rio from 138.68.238.242 port 42176 ssh2
2020-09-28 07:57:54
218.92.0.185 attackbots
Failed password for root from 218.92.0.185 port 59939 ssh2
2020-09-28 07:56:32
52.188.65.136 attack
invalid user 252 from 52.188.65.136 port 13297 ssh2
2020-09-28 07:36:33
138.197.214.200 attackbots
[MK-VM5] Blocked by UFW
2020-09-28 07:37:51
93.168.56.237 spambotsattackproxynormal
‏SA-STC-20080319
2020-09-28 09:51:11
20.55.2.33 attack
Failed password for root from 20.55.2.33 port 22127 ssh2
2020-09-28 07:53:09
185.74.5.156 attack
Sep 28 00:58:21 ns392434 sshd[16082]: Invalid user ts3 from 185.74.5.156 port 52620
Sep 28 00:58:21 ns392434 sshd[16082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.156
Sep 28 00:58:21 ns392434 sshd[16082]: Invalid user ts3 from 185.74.5.156 port 52620
Sep 28 00:58:22 ns392434 sshd[16082]: Failed password for invalid user ts3 from 185.74.5.156 port 52620 ssh2
Sep 28 01:10:24 ns392434 sshd[16520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.156  user=root
Sep 28 01:10:26 ns392434 sshd[16520]: Failed password for root from 185.74.5.156 port 54540 ssh2
Sep 28 01:15:05 ns392434 sshd[16663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.5.156  user=root
Sep 28 01:15:07 ns392434 sshd[16663]: Failed password for root from 185.74.5.156 port 34210 ssh2
Sep 28 01:19:36 ns392434 sshd[16889]: Invalid user james from 185.74.5.156 port 42114
2020-09-28 07:40:41
51.91.56.133 attack
Sep 27 06:13:41 *hidden* sshd[31896]: Failed password for invalid user node from 51.91.56.133 port 41322 ssh2 Sep 27 06:18:57 *hidden* sshd[548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.56.133 user=root Sep 27 06:18:58 *hidden* sshd[548]: Failed password for *hidden* from 51.91.56.133 port 56650 ssh2
2020-09-28 12:07:24
157.92.49.151 attackbots
Failed password for root from 157.92.49.151 port 42728 ssh2
2020-09-28 07:39:34
106.52.12.21 attack
Sep 27 02:13:02 *hidden* sshd[21341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.12.21 Sep 27 02:13:04 *hidden* sshd[21341]: Failed password for invalid user upgrade from 106.52.12.21 port 33434 ssh2 Sep 27 02:18:14 *hidden* sshd[22474]: Invalid user student5 from 106.52.12.21 port 59164
2020-09-28 07:50:05
104.198.16.231 attackspam
2020-09-27T20:36:46.485534afi-git.jinr.ru sshd[25259]: Invalid user deploy from 104.198.16.231 port 49934
2020-09-27T20:36:46.489087afi-git.jinr.ru sshd[25259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=231.16.198.104.bc.googleusercontent.com
2020-09-27T20:36:46.485534afi-git.jinr.ru sshd[25259]: Invalid user deploy from 104.198.16.231 port 49934
2020-09-27T20:36:48.776977afi-git.jinr.ru sshd[25259]: Failed password for invalid user deploy from 104.198.16.231 port 49934 ssh2
2020-09-27T20:41:25.515431afi-git.jinr.ru sshd[26676]: Invalid user oracle from 104.198.16.231 port 58344
...
2020-09-28 07:43:28
51.38.187.226 attackbotsspam
51.38.187.226 - - [27/Sep/2020:22:27:54 +0100] "POST /wp-login.php HTTP/1.1" 200 2660 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.38.187.226 - - [27/Sep/2020:22:27:55 +0100] "POST /wp-login.php HTTP/1.1" 200 2630 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.38.187.226 - - [27/Sep/2020:22:27:56 +0100] "POST /wp-login.php HTTP/1.1" 200 2632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-28 07:56:11
193.112.23.7 attackbotsspam
Brute-force attempt banned
2020-09-28 12:04:54

最近上报的IP列表

104.248.51.125 104.248.51.244 104.248.5.68 104.248.51.254
104.248.51.47 104.248.51.138 104.248.52.189 104.248.51.90
104.248.53.109 104.248.53.13 104.248.53.72 104.248.53.255
104.248.54.115 104.248.52.141 104.248.53.46 104.248.55.108
104.248.56.1 104.248.56.219 104.248.53.96 104.248.57.206