必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.104.75.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.104.75.130.			IN	A

;; AUTHORITY SECTION:
.			552	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 73 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 16:21:26 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
130.75.104.116.in-addr.arpa domain name pointer dynamic-ip-adsl.viettel.vn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.75.104.116.in-addr.arpa	name = dynamic-ip-adsl.viettel.vn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.204.204.72 attackbots
Invalid user noc from 111.204.204.72 port 35769
2020-08-26 14:22:24
122.114.207.34 attackspambots
Invalid user guest from 122.114.207.34 port 2647
2020-08-26 14:17:59
88.99.77.52 attackspam
Aug 26 04:52:56 shivevps sshd[4198]: Bad protocol version identification '\024' from 88.99.77.52 port 51965
Aug 26 04:53:00 shivevps sshd[4552]: Bad protocol version identification '\024' from 88.99.77.52 port 38931
Aug 26 04:53:01 shivevps sshd[4638]: Bad protocol version identification '\024' from 88.99.77.52 port 38806
...
2020-08-26 14:09:30
129.211.85.214 attackbotsspam
(sshd) Failed SSH login from 129.211.85.214 (CN/China/-): 5 in the last 3600 secs
2020-08-26 14:17:36
189.112.42.197 attackspambots
Aug 26 07:42:50 cho sshd[1646980]: Failed password for root from 189.112.42.197 port 47580 ssh2
Aug 26 07:47:25 cho sshd[1647099]: Invalid user mz from 189.112.42.197 port 53490
Aug 26 07:47:25 cho sshd[1647099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.112.42.197 
Aug 26 07:47:25 cho sshd[1647099]: Invalid user mz from 189.112.42.197 port 53490
Aug 26 07:47:27 cho sshd[1647099]: Failed password for invalid user mz from 189.112.42.197 port 53490 ssh2
...
2020-08-26 14:15:18
58.218.239.164 attackspam
Aug 26 04:52:53 shivevps sshd[3844]: Bad protocol version identification '\024' from 58.218.239.164 port 48988
Aug 26 04:52:53 shivevps sshd[3918]: Bad protocol version identification '\024' from 58.218.239.164 port 28606
Aug 26 04:53:01 shivevps sshd[4625]: Bad protocol version identification '\024' from 58.218.239.164 port 15157
...
2020-08-26 14:04:02
59.149.170.6 attack
Aug 26 04:52:53 shivevps sshd[3852]: Bad protocol version identification '\024' from 59.149.170.6 port 46978
Aug 26 04:52:54 shivevps sshd[3937]: Bad protocol version identification '\024' from 59.149.170.6 port 47000
Aug 26 04:52:57 shivevps sshd[4289]: Bad protocol version identification '\024' from 59.149.170.6 port 47225
...
2020-08-26 14:28:49
79.111.247.108 attackspam
Automatic report - Port Scan Attack
2020-08-26 14:00:21
137.59.120.58 attackspam
Aug 26 04:52:52 shivevps sshd[3833]: Bad protocol version identification '\024' from 137.59.120.58 port 33691
Aug 26 04:52:54 shivevps sshd[3957]: Bad protocol version identification '\024' from 137.59.120.58 port 33694
Aug 26 04:53:00 shivevps sshd[4542]: Bad protocol version identification '\024' from 137.59.120.58 port 33727
...
2020-08-26 14:17:12
110.74.221.18 attackbotsspam
Aug 26 04:43:54 shivevps sshd[30164]: Bad protocol version identification '\024' from 110.74.221.18 port 54862
Aug 26 04:45:32 shivevps sshd[32255]: Bad protocol version identification '\024' from 110.74.221.18 port 57678
Aug 26 04:53:05 shivevps sshd[4895]: Bad protocol version identification '\024' from 110.74.221.18 port 42145
...
2020-08-26 13:59:42
158.69.210.168 attackspam
2020-08-26T04:57:06.764584vps773228.ovh.net sshd[28703]: Failed password for root from 158.69.210.168 port 50634 ssh2
2020-08-26T08:07:15.231112vps773228.ovh.net sshd[31340]: Invalid user mongouser from 158.69.210.168 port 49395
2020-08-26T08:07:15.242235vps773228.ovh.net sshd[31340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.ip-158-69-210.net
2020-08-26T08:07:15.231112vps773228.ovh.net sshd[31340]: Invalid user mongouser from 158.69.210.168 port 49395
2020-08-26T08:07:16.800269vps773228.ovh.net sshd[31340]: Failed password for invalid user mongouser from 158.69.210.168 port 49395 ssh2
...
2020-08-26 14:08:37
203.189.142.34 attack
Aug 26 05:41:14 instance-2 sshd[3950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.189.142.34 
Aug 26 05:41:16 instance-2 sshd[3950]: Failed password for invalid user user1 from 203.189.142.34 port 39604 ssh2
Aug 26 05:45:06 instance-2 sshd[4065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.189.142.34
2020-08-26 13:51:22
51.15.76.207 attackbotsspam
Aug 26 04:52:52 shivevps sshd[3819]: Bad protocol version identification '\024' from 51.15.76.207 port 38930
Aug 26 04:52:57 shivevps sshd[4365]: Bad protocol version identification '\024' from 51.15.76.207 port 42280
Aug 26 04:53:00 shivevps sshd[4540]: Bad protocol version identification '\024' from 51.15.76.207 port 44464
...
2020-08-26 14:20:58
103.47.172.41 attackspambots
Aug 26 04:52:56 shivevps sshd[4207]: Bad protocol version identification '\024' from 103.47.172.41 port 33512
Aug 26 04:52:59 shivevps sshd[4381]: Bad protocol version identification '\024' from 103.47.172.41 port 33523
Aug 26 04:53:00 shivevps sshd[4558]: Bad protocol version identification '\024' from 103.47.172.41 port 33576
...
2020-08-26 14:14:05
218.92.0.168 attack
Aug 26 07:17:15 piServer sshd[5640]: Failed password for root from 218.92.0.168 port 29767 ssh2
Aug 26 07:17:20 piServer sshd[5640]: Failed password for root from 218.92.0.168 port 29767 ssh2
Aug 26 07:17:24 piServer sshd[5640]: Failed password for root from 218.92.0.168 port 29767 ssh2
Aug 26 07:17:29 piServer sshd[5640]: Failed password for root from 218.92.0.168 port 29767 ssh2
...
2020-08-26 14:07:37

最近上报的IP列表

116.104.74.67 116.104.91.67 116.105.17.37 116.105.174.26
116.105.162.156 116.104.89.244 116.105.200.128 116.105.200.198
116.105.209.214 116.105.197.52 116.105.210.21 116.106.161.205
116.106.182.19 116.106.197.158 116.105.78.98 116.106.116.130
116.179.37.106 116.179.37.103 116.179.37.111 116.179.37.113