必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
117.102.104.178 attackspam
unauthorized connection attempt
2020-01-17 19:46:04
117.102.104.178 attack
Unauthorized connection attempt detected from IP address 117.102.104.178 to port 445
2019-12-24 20:35:20
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.102.104.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17157
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.102.104.131.		IN	A

;; AUTHORITY SECTION:
.			342	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:46:19 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 131.104.102.117.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.104.102.117.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
75.161.131.217 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/75.161.131.217/ 
 
 US - 1H : (275)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN209 
 
 IP : 75.161.131.217 
 
 CIDR : 75.161.0.0/16 
 
 PREFIX COUNT : 4669 
 
 UNIQUE IP COUNT : 16127488 
 
 
 ATTACKS DETECTED ASN209 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 3 
 24H - 7 
 
 DateTime : 2019-10-24 22:14:33 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-25 06:30:41
221.143.48.143 attackspam
Oct 24 12:10:19 sachi sshd\[16334\]: Invalid user Antibes@123 from 221.143.48.143
Oct 24 12:10:19 sachi sshd\[16334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143
Oct 24 12:10:20 sachi sshd\[16334\]: Failed password for invalid user Antibes@123 from 221.143.48.143 port 57878 ssh2
Oct 24 12:14:30 sachi sshd\[16672\]: Invalid user rothroyce royce from 221.143.48.143
Oct 24 12:14:30 sachi sshd\[16672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.143.48.143
2019-10-25 06:44:12
176.59.49.170 attackspambots
Port scan detected on ports: 57923[UDP], 57923[UDP], 57923[UDP]
2019-10-25 06:55:19
45.136.109.82 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 30 - port: 9160 proto: TCP cat: Misc Attack
2019-10-25 07:01:34
210.92.91.223 attack
Sep 11 18:34:40 vtv3 sshd\[24281\]: Invalid user ftpusr from 210.92.91.223 port 41744
Sep 11 18:34:40 vtv3 sshd\[24281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.92.91.223
Sep 11 18:34:42 vtv3 sshd\[24281\]: Failed password for invalid user ftpusr from 210.92.91.223 port 41744 ssh2
Sep 11 18:41:21 vtv3 sshd\[28175\]: Invalid user test from 210.92.91.223 port 46846
Sep 11 18:41:21 vtv3 sshd\[28175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.92.91.223
Sep 11 18:54:34 vtv3 sshd\[2525\]: Invalid user debian from 210.92.91.223 port 57274
Sep 11 18:54:34 vtv3 sshd\[2525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.92.91.223
Sep 11 18:54:36 vtv3 sshd\[2525\]: Failed password for invalid user debian from 210.92.91.223 port 57274 ssh2
Sep 11 19:01:13 vtv3 sshd\[6454\]: Invalid user admin from 210.92.91.223 port 34230
Sep 11 19:01:13 vtv3 sshd\[6454\]: pam_uni
2019-10-25 06:27:32
138.68.53.163 attackbots
2019-10-25T00:14:15.994142scmdmz1 sshd\[26420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.53.163  user=admin
2019-10-25T00:14:17.277932scmdmz1 sshd\[26420\]: Failed password for admin from 138.68.53.163 port 55034 ssh2
2019-10-25T00:17:40.822839scmdmz1 sshd\[26678\]: Invalid user art from 138.68.53.163 port 37124
...
2019-10-25 06:35:12
212.64.57.24 attackbotsspam
Oct 24 11:09:36 auw2 sshd\[26845\]: Invalid user erica from 212.64.57.24
Oct 24 11:09:36 auw2 sshd\[26845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.24
Oct 24 11:09:38 auw2 sshd\[26845\]: Failed password for invalid user erica from 212.64.57.24 port 33265 ssh2
Oct 24 11:14:10 auw2 sshd\[27229\]: Invalid user buerocomputer from 212.64.57.24
Oct 24 11:14:10 auw2 sshd\[27229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.24
2019-10-25 06:26:32
95.170.203.226 attackspambots
Oct 24 20:40:48 venus sshd\[25440\]: Invalid user Africa@123 from 95.170.203.226 port 53654
Oct 24 20:40:48 venus sshd\[25440\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.170.203.226
Oct 24 20:40:49 venus sshd\[25440\]: Failed password for invalid user Africa@123 from 95.170.203.226 port 53654 ssh2
...
2019-10-25 06:57:20
5.189.181.29 attackbotsspam
Oct 24 10:25:43 web1 sshd\[17070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.181.29  user=root
Oct 24 10:25:45 web1 sshd\[17070\]: Failed password for root from 5.189.181.29 port 47680 ssh2
Oct 24 10:29:34 web1 sshd\[17389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.181.29  user=root
Oct 24 10:29:37 web1 sshd\[17389\]: Failed password for root from 5.189.181.29 port 57980 ssh2
Oct 24 10:33:38 web1 sshd\[17713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.189.181.29  user=root
2019-10-25 06:39:38
123.206.22.145 attackbotsspam
Oct 24 19:24:07 firewall sshd[17109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.22.145  user=root
Oct 24 19:24:10 firewall sshd[17109]: Failed password for root from 123.206.22.145 port 53374 ssh2
Oct 24 19:28:08 firewall sshd[17247]: Invalid user its from 123.206.22.145
...
2019-10-25 06:29:53
191.23.131.214 attackspambots
Oct 24 17:13:27 ws12vmsma01 sshd[48081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.23.131.214  user=root
Oct 24 17:13:28 ws12vmsma01 sshd[48081]: Failed password for root from 191.23.131.214 port 23475 ssh2
Oct 24 17:13:29 ws12vmsma01 sshd[48089]: Invalid user ubnt from 191.23.131.214
...
2019-10-25 06:56:05
106.12.202.181 attackspambots
Oct 24 16:59:30 server sshd\[3648\]: Failed password for invalid user apacheds from 106.12.202.181 port 40606 ssh2
Oct 25 01:05:08 server sshd\[7195\]: Invalid user ftpuser from 106.12.202.181
Oct 25 01:05:08 server sshd\[7195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.181 
Oct 25 01:05:10 server sshd\[7195\]: Failed password for invalid user ftpuser from 106.12.202.181 port 13728 ssh2
Oct 25 01:27:24 server sshd\[12572\]: Invalid user dougg from 106.12.202.181
Oct 25 01:27:24 server sshd\[12572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.181 
...
2019-10-25 06:29:25
187.167.67.187 attackbotsspam
Automatic report - Port Scan Attack
2019-10-25 06:54:00
70.32.0.76 attack
Attacks Facebook user with video which gives them access to user and friends
2019-10-25 06:31:45
203.125.145.58 attackspam
Invalid user gopi from 203.125.145.58 port 53230
2019-10-25 06:44:25

最近上报的IP列表

117.102.104.10 117.102.104.234 117.102.104.12 117.102.105.58
117.102.104.58 117.102.104.44 117.102.105.114 117.102.106.118
117.102.106.234 117.102.106.178 114.108.131.11 117.102.107.123
117.102.107.124 117.102.108.125 117.102.106.115 117.102.108.27
117.102.109.26 117.102.105.91 117.102.107.154 117.102.112.130