必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.5.51.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.5.51.93.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012802 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 11:49:39 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
93.51.5.104.in-addr.arpa domain name pointer 104-5-51-93.lightspeed.ltrkar.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
93.51.5.104.in-addr.arpa	name = 104-5-51-93.lightspeed.ltrkar.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.14.228.229 attack
detected by Fail2Ban
2019-12-06 20:13:13
202.152.44.250 attackbots
Unauthorised access (Dec  6) SRC=202.152.44.250 LEN=52 TOS=0x08 PREC=0x20 TTL=111 ID=8135 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-06 19:59:15
61.222.56.80 attack
Triggered by Fail2Ban at Vostok web server
2019-12-06 20:12:27
207.46.13.190 attack
Automatic report - Banned IP Access
2019-12-06 20:08:54
78.192.6.4 attack
Fail2Ban - SSH Bruteforce Attempt
2019-12-06 20:24:10
201.145.180.172 attack
Port 1433 Scan
2019-12-06 20:17:14
45.119.212.14 attackspam
fail2ban honeypot
2019-12-06 20:07:32
222.186.175.163 attackbotsspam
Dec  6 12:45:29 sso sshd[18934]: Failed password for root from 222.186.175.163 port 35026 ssh2
Dec  6 12:45:33 sso sshd[18934]: Failed password for root from 222.186.175.163 port 35026 ssh2
...
2019-12-06 19:51:50
51.91.19.92 attack
Automatic report - XMLRPC Attack
2019-12-06 20:20:24
210.212.194.113 attack
Dec  6 11:48:46 MK-Soft-VM5 sshd[28331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.194.113 
Dec  6 11:48:48 MK-Soft-VM5 sshd[28331]: Failed password for invalid user lashonn from 210.212.194.113 port 49450 ssh2
...
2019-12-06 19:47:51
115.231.231.3 attackspam
Dec  6 02:06:18 php1 sshd\[32513\]: Invalid user dar from 115.231.231.3
Dec  6 02:06:18 php1 sshd\[32513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.231.3
Dec  6 02:06:20 php1 sshd\[32513\]: Failed password for invalid user dar from 115.231.231.3 port 57288 ssh2
Dec  6 02:14:17 php1 sshd\[1043\]: Invalid user patterson\&19840830 from 115.231.231.3
Dec  6 02:14:17 php1 sshd\[1043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.231.3
2019-12-06 20:26:47
54.38.184.208 attackbotsspam
2019-12-06T08:34:08.551170abusebot-6.cloudsearch.cf sshd\[3585\]: Invalid user bosseloo from 54.38.184.208 port 35251
2019-12-06 19:49:30
181.41.216.136 attackbotsspam
SMTP blocked logins: 147. Dates: 26-11-2019 / 6-12-2019Logins on unknown users: 198. Dates: 26-11-2019 / 6-12-2019
2019-12-06 19:53:50
45.82.153.81 attackbotsspam
Dec  6 13:18:42 relay postfix/smtpd\[23734\]: warning: unknown\[45.82.153.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  6 13:19:07 relay postfix/smtpd\[21571\]: warning: unknown\[45.82.153.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  6 13:19:53 relay postfix/smtpd\[23650\]: warning: unknown\[45.82.153.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  6 13:20:16 relay postfix/smtpd\[23734\]: warning: unknown\[45.82.153.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  6 13:28:17 relay postfix/smtpd\[15856\]: warning: unknown\[45.82.153.81\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-06 20:30:09
123.207.126.39 attackspambots
Dec  6 07:55:03 firewall sshd[2861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.126.39
Dec  6 07:55:03 firewall sshd[2861]: Invalid user build from 123.207.126.39
Dec  6 07:55:05 firewall sshd[2861]: Failed password for invalid user build from 123.207.126.39 port 60036 ssh2
...
2019-12-06 20:01:55

最近上报的IP列表

170.154.219.232 21.159.30.22 253.71.137.54 13.158.233.41
78.136.69.3 217.135.174.43 199.180.51.76 83.129.70.65
74.44.117.35 18.18.192.88 254.80.180.210 237.249.11.189
155.177.183.203 162.70.16.233 136.149.9.155 207.250.33.172
99.220.250.131 230.228.49.72 208.160.253.12 133.55.233.10