必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.104.137.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42709
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.104.137.142.			IN	A

;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:42:20 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
Host 142.137.104.11.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.137.104.11.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.25.15.139 attackbotsspam
Nov 21 13:43:56 sachi sshd\[22036\]: Invalid user administrator from 118.25.15.139
Nov 21 13:43:56 sachi sshd\[22036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.15.139
Nov 21 13:43:58 sachi sshd\[22036\]: Failed password for invalid user administrator from 118.25.15.139 port 60138 ssh2
Nov 21 13:48:14 sachi sshd\[22402\]: Invalid user noreply from 118.25.15.139
Nov 21 13:48:14 sachi sshd\[22402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.15.139
2019-11-22 08:31:42
103.225.99.36 attackbotsspam
Nov 22 01:00:47 MK-Soft-VM4 sshd[7663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.225.99.36 
Nov 22 01:00:49 MK-Soft-VM4 sshd[7663]: Failed password for invalid user hsuan from 103.225.99.36 port 13563 ssh2
...
2019-11-22 08:17:03
106.12.93.12 attackspambots
Nov 21 14:01:32 kapalua sshd\[27925\]: Invalid user le from 106.12.93.12
Nov 21 14:01:32 kapalua sshd\[27925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.12
Nov 21 14:01:35 kapalua sshd\[27925\]: Failed password for invalid user le from 106.12.93.12 port 45576 ssh2
Nov 21 14:05:58 kapalua sshd\[28288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.12  user=root
Nov 21 14:06:00 kapalua sshd\[28288\]: Failed password for root from 106.12.93.12 port 52736 ssh2
2019-11-22 08:32:59
59.120.189.234 attack
2019-11-22T00:01:20.360590abusebot-8.cloudsearch.cf sshd\[9403\]: Invalid user backup from 59.120.189.234 port 48666
2019-11-22 08:18:11
177.132.242.30 attack
Nov 22 00:02:07 localhost sshd\[51532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.132.242.30  user=www-data
Nov 22 00:02:09 localhost sshd\[51532\]: Failed password for www-data from 177.132.242.30 port 52814 ssh2
Nov 22 00:06:49 localhost sshd\[51643\]: Invalid user kurisaki from 177.132.242.30 port 60952
Nov 22 00:06:49 localhost sshd\[51643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.132.242.30
Nov 22 00:06:51 localhost sshd\[51643\]: Failed password for invalid user kurisaki from 177.132.242.30 port 60952 ssh2
...
2019-11-22 08:25:37
106.12.16.234 attack
Failed password for root from 106.12.16.234 port 43686 ssh2
Invalid user comg from 106.12.16.234 port 49806
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.16.234
Failed password for invalid user comg from 106.12.16.234 port 49806 ssh2
Invalid user champ from 106.12.16.234 port 55924
2019-11-22 08:11:08
5.39.82.176 attack
Nov 22 00:51:23 SilenceServices sshd[1569]: Failed password for root from 5.39.82.176 port 34531 ssh2
Nov 22 00:55:09 SilenceServices sshd[4051]: Failed password for root from 5.39.82.176 port 52822 ssh2
Nov 22 00:58:54 SilenceServices sshd[6732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.82.176
2019-11-22 08:06:31
118.121.204.10 attackspambots
Nov 22 01:37:26 docs sshd\[30694\]: Invalid user meadleys from 118.121.204.10Nov 22 01:37:29 docs sshd\[30694\]: Failed password for invalid user meadleys from 118.121.204.10 port 34828 ssh2Nov 22 01:42:21 docs sshd\[30772\]: Invalid user klipple from 118.121.204.10Nov 22 01:42:23 docs sshd\[30772\]: Failed password for invalid user klipple from 118.121.204.10 port 41994 ssh2Nov 22 01:47:23 docs sshd\[30856\]: Invalid user pOCVavVWLuvp from 118.121.204.10Nov 22 01:47:25 docs sshd\[30856\]: Failed password for invalid user pOCVavVWLuvp from 118.121.204.10 port 49170 ssh2
...
2019-11-22 08:22:46
175.211.116.226 attack
2019-11-21T23:32:44.423744abusebot-5.cloudsearch.cf sshd\[25838\]: Invalid user bjorn from 175.211.116.226 port 35400
2019-11-22 08:15:52
107.172.181.2 attack
8,30-03/02 [bc03/m128] PostRequest-Spammer scoring: Durban02
2019-11-22 08:29:36
184.66.225.102 attackspam
Nov 20 16:44:35 : SSH login attempts with invalid user
2019-11-22 08:18:49
180.168.156.211 attack
Nov 22 01:44:40 server sshd\[10072\]: Invalid user mooi from 180.168.156.211
Nov 22 01:44:40 server sshd\[10072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.156.211 
Nov 22 01:44:42 server sshd\[10072\]: Failed password for invalid user mooi from 180.168.156.211 port 36004 ssh2
Nov 22 01:57:59 server sshd\[13772\]: Invalid user zachery from 180.168.156.211
Nov 22 01:57:59 server sshd\[13772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.168.156.211 
...
2019-11-22 08:05:31
118.89.191.145 attack
SSH-BruteForce
2019-11-22 08:12:30
196.52.43.52 attackbots
11/21/2019-18:00:35.305339 196.52.43.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-22 08:21:04
74.208.12.196 attackbotsspam
Nov 22 05:07:12 gw1 sshd[27838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.12.196
Nov 22 05:07:14 gw1 sshd[27838]: Failed password for invalid user Admin12 from 74.208.12.196 port 34414 ssh2
...
2019-11-22 08:17:15

最近上报的IP列表

11.103.182.97 11.103.152.68 11.103.108.19 11.103.2.117
11.102.125.250 11.103.246.125 11.103.121.64 11.102.161.202
11.101.51.15 11.104.121.100 11.101.52.92 11.101.237.89
11.101.31.89 11.101.50.70 11.102.80.28 11.101.211.144
11.105.35.106 11.104.218.249 11.104.74.131 11.103.165.181