必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Amsterdam

省份(region): Noord Holland

国家(country): The Netherlands

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.248.94.159 attack
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-23 14:19:28
104.248.94.159 attack
May 22 17:22:45 xeon sshd[25949]: Failed password for invalid user wit from 104.248.94.159 port 46482 ssh2
2020-05-23 01:12:29
104.248.94.159 attackbots
5x Failed Password
2020-05-15 22:27:33
104.248.94.159 attackspam
" "
2020-05-06 14:04:24
104.248.94.159 attackspam
Apr 24 07:57:07 debian-2gb-nbg1-2 kernel: \[9966772.924980\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=104.248.94.159 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=37616 PROTO=TCP SPT=52994 DPT=23654 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-24 14:49:55
104.248.94.159 attack
Apr 15 15:14:57 srv206 sshd[12053]: Invalid user york from 104.248.94.159
Apr 15 15:14:57 srv206 sshd[12053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.94.159
Apr 15 15:14:57 srv206 sshd[12053]: Invalid user york from 104.248.94.159
Apr 15 15:14:58 srv206 sshd[12053]: Failed password for invalid user york from 104.248.94.159 port 43826 ssh2
...
2020-04-15 21:55:15
104.248.94.159 attack
Invalid user bike from 104.248.94.159 port 54104
2020-04-15 07:05:11
104.248.94.159 attack
Invalid user bike from 104.248.94.159 port 54104
2020-04-14 16:16:46
104.248.94.159 attack
Apr 13 09:19:38 server sshd[17894]: Failed password for root from 104.248.94.159 port 53698 ssh2
Apr 13 10:00:18 server sshd[28994]: Failed password for invalid user st1lesha from 104.248.94.159 port 46312 ssh2
Apr 13 10:03:40 server sshd[30054]: Failed password for root from 104.248.94.159 port 54064 ssh2
2020-04-13 16:11:30
104.248.94.159 attackbots
Apr  9 22:45:29 cvbnet sshd[15739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.94.159 
Apr  9 22:45:31 cvbnet sshd[15739]: Failed password for invalid user odoo from 104.248.94.159 port 38072 ssh2
...
2020-04-10 05:43:50
104.248.94.159 attackbots
Apr  7 15:27:53 legacy sshd[30365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.94.159
Apr  7 15:27:55 legacy sshd[30365]: Failed password for invalid user confa from 104.248.94.159 port 38782 ssh2
Apr  7 15:31:38 legacy sshd[30490]: Failed password for root from 104.248.94.159 port 49110 ssh2
...
2020-04-07 21:38:49
104.248.94.159 attackbots
k+ssh-bruteforce
2020-04-07 09:59:29
104.248.94.159 attackspambots
Mar 26 00:26:53 ks10 sshd[670657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.94.159 
Mar 26 00:26:55 ks10 sshd[670657]: Failed password for invalid user sysbackup from 104.248.94.159 port 35330 ssh2
...
2020-03-26 07:33:46
104.248.94.159 attack
Mar 22 17:14:50 plex sshd[25493]: Invalid user btf from 104.248.94.159 port 59384
2020-03-23 01:14:21
104.248.94.159 attack
Feb 13 14:50:11 v22018076622670303 sshd\[32333\]: Invalid user gustavo from 104.248.94.159 port 33806
Feb 13 14:50:11 v22018076622670303 sshd\[32333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.94.159
Feb 13 14:50:13 v22018076622670303 sshd\[32333\]: Failed password for invalid user gustavo from 104.248.94.159 port 33806 ssh2
...
2020-02-13 22:18:02
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.248.94.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3798
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.248.94.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025102601 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 27 04:34:28 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.94.248.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.94.248.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.243.132.36 attack
suspicious action Mon, 24 Feb 2020 01:46:19 -0300
2020-02-24 18:59:04
186.74.18.178 attackbotsspam
Unauthorized connection attempt from IP address 186.74.18.178 on Port 445(SMB)
2020-02-24 19:17:39
200.98.136.23 attackbots
suspicious action Mon, 24 Feb 2020 01:46:37 -0300
2020-02-24 18:46:47
112.85.42.186 attack
Feb 24 10:48:04 ns381471 sshd[1357]: Failed password for root from 112.85.42.186 port 14811 ssh2
2020-02-24 19:28:22
61.183.52.42 attackbots
suspicious action Mon, 24 Feb 2020 01:45:48 -0300
2020-02-24 19:23:02
86.108.41.151 attack
Port probing on unauthorized port 5555
2020-02-24 18:46:21
85.223.215.53 attackbots
Unauthorized connection attempt from IP address 85.223.215.53 on Port 445(SMB)
2020-02-24 19:06:53
72.4.25.205 attackspambots
Unauthorized connection attempt from IP address 72.4.25.205 on Port 445(SMB)
2020-02-24 19:20:39
51.15.177.65 attack
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.177.65 
Failed password for invalid user weblogic from 51.15.177.65 port 47812 ssh2
Failed password for invalid user weblogic from 51.15.177.65 port 47812 ssh2
Failed password for invalid user weblogic from 51.15.177.65 port 47812 ssh2
2020-02-24 18:58:18
113.53.93.79 attack
1582519564 - 02/24/2020 05:46:04 Host: 113.53.93.79/113.53.93.79 Port: 445 TCP Blocked
2020-02-24 19:10:52
124.106.113.157 attack
Unauthorized connection attempt from IP address 124.106.113.157 on Port 445(SMB)
2020-02-24 18:52:01
117.6.11.253 attackspambots
Unauthorized connection attempt from IP address 117.6.11.253 on Port 445(SMB)
2020-02-24 19:12:08
113.179.86.53 attackbots
Unauthorized connection attempt from IP address 113.179.86.53 on Port 445(SMB)
2020-02-24 18:53:41
122.52.167.11 attackbotsspam
Unauthorized connection attempt from IP address 122.52.167.11 on Port 445(SMB)
2020-02-24 19:02:03
12.187.215.82 attackbotsspam
unauthorized connection attempt
2020-02-24 18:45:43

最近上报的IP列表

59.82.135.199 47.237.98.230 47.237.97.33 47.237.94.155
47.237.88.233 47.237.100.84 59.82.83.55 59.82.83.235
59.82.83.164 59.82.135.95 59.82.135.30 59.82.135.139
59.82.135.137 59.82.135.1 47.237.8.210 47.237.18.216
47.236.38.103 8.222.145.184 8.219.149.156 8.219.11.100