必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.61.134.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51836
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.61.134.33.			IN	A

;; AUTHORITY SECTION:
.			193	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:15:31 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
33.134.61.104.in-addr.arpa domain name pointer 104-61-134-33.lightspeed.sndgca.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
33.134.61.104.in-addr.arpa	name = 104-61-134-33.lightspeed.sndgca.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.70.65.229 attackbotsspam
Invalid user lby from 202.70.65.229 port 35562
2020-07-31 17:38:23
118.71.239.30 attack
port scan and connect, tcp 23 (telnet)
2020-07-31 18:03:46
217.61.125.97 attack
Invalid user kigwasshoi from 217.61.125.97 port 58688
2020-07-31 17:49:53
172.104.44.238 attackspambots
Jul 31 02:08:33 pixelmemory sshd[3599449]: Failed password for root from 172.104.44.238 port 53664 ssh2
Jul 31 02:12:51 pixelmemory sshd[3604399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.104.44.238  user=root
Jul 31 02:12:54 pixelmemory sshd[3604399]: Failed password for root from 172.104.44.238 port 38328 ssh2
Jul 31 02:17:06 pixelmemory sshd[3608816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.104.44.238  user=root
Jul 31 02:17:08 pixelmemory sshd[3608816]: Failed password for root from 172.104.44.238 port 51216 ssh2
...
2020-07-31 17:46:05
45.40.199.82 attackspam
Jul 31 05:45:52 sip sshd[1140884]: Failed password for root from 45.40.199.82 port 48820 ssh2
Jul 31 05:49:23 sip sshd[1140925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.82  user=root
Jul 31 05:49:25 sip sshd[1140925]: Failed password for root from 45.40.199.82 port 58802 ssh2
...
2020-07-31 18:02:06
222.168.18.227 attack
SSH Brute Force
2020-07-31 17:58:15
185.148.38.26 attackbots
Jul 31 06:19:37 firewall sshd[8486]: Failed password for root from 185.148.38.26 port 54800 ssh2
Jul 31 06:23:42 firewall sshd[8608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.148.38.26  user=root
Jul 31 06:23:44 firewall sshd[8608]: Failed password for root from 185.148.38.26 port 36894 ssh2
...
2020-07-31 17:49:15
118.24.123.34 attackbots
Jul 31 08:39:41 ip-172-31-61-156 sshd[13840]: Failed password for root from 118.24.123.34 port 45480 ssh2
Jul 31 08:39:39 ip-172-31-61-156 sshd[13840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.123.34  user=root
Jul 31 08:39:41 ip-172-31-61-156 sshd[13840]: Failed password for root from 118.24.123.34 port 45480 ssh2
Jul 31 08:44:58 ip-172-31-61-156 sshd[14055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.123.34  user=root
Jul 31 08:45:00 ip-172-31-61-156 sshd[14055]: Failed password for root from 118.24.123.34 port 44130 ssh2
...
2020-07-31 17:59:16
125.33.29.134 attackbots
Brute force attempt
2020-07-31 17:41:27
35.204.152.99 attackbotsspam
35.204.152.99 - - [31/Jul/2020:08:11:05 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.204.152.99 - - [31/Jul/2020:08:25:49 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-31 18:02:33
49.234.131.75 attack
Failed password for root from 49.234.131.75 port 59564 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.131.75  user=root
Failed password for root from 49.234.131.75 port 35720 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.131.75  user=root
Failed password for root from 49.234.131.75 port 40096 ssh2
2020-07-31 18:06:07
190.83.84.210 attackspambots
Invalid user rhino from 190.83.84.210 port 41124
2020-07-31 18:03:26
66.249.66.70 attackspambots
Automatic report - Banned IP Access
2020-07-31 18:07:41
213.61.158.172 attackspam
Jul 31 11:22:35 *hidden* sshd[62625]: Failed password for *hidden* from 213.61.158.172 port 45976 ssh2 Jul 31 11:26:28 *hidden* sshd[7174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.61.158.172 user=root Jul 31 11:26:30 *hidden* sshd[7174]: Failed password for *hidden* from 213.61.158.172 port 60050 ssh2 Jul 31 11:30:23 *hidden* sshd[16949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.61.158.172 user=root Jul 31 11:30:25 *hidden* sshd[16949]: Failed password for *hidden* from 213.61.158.172 port 45912 ssh2
2020-07-31 17:57:15
157.55.39.161 attackbotsspam
Automatic report - Banned IP Access
2020-07-31 17:50:05

最近上报的IP列表

104.61.187.232 104.61.18.142 104.61.185.58 104.61.151.61
104.61.12.29 104.61.175.255 104.61.118.31 104.61.157.89
104.60.81.192 104.61.111.192 104.61.236.30 104.60.92.135
104.61.172.205 104.61.137.184 104.61.251.191 104.61.223.233
104.61.192.170 104.60.82.239 104.61.253.189 104.60.89.78