必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.166.114.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18309
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.166.114.104.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 18:14:12 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 104.114.166.12.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.114.166.12.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
119.67.21.163 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-06-02 18:16:39
27.254.190.106 attack
SIP/5060 Probe, BF, Hack -
2020-06-02 17:54:20
41.67.137.243 attackbotsspam
Unauthorized connection attempt detected from IP address 41.67.137.243 to port 5015
2020-06-02 17:44:55
85.18.98.208 attackbots
5x Failed Password
2020-06-02 18:19:04
121.15.2.178 attackbots
2020-06-02T03:40:02.503671shield sshd\[5381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.2.178  user=root
2020-06-02T03:40:04.475986shield sshd\[5381\]: Failed password for root from 121.15.2.178 port 42066 ssh2
2020-06-02T03:43:43.723110shield sshd\[5742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.2.178  user=root
2020-06-02T03:43:46.036341shield sshd\[5742\]: Failed password for root from 121.15.2.178 port 60118 ssh2
2020-06-02T03:47:35.647752shield sshd\[6366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.15.2.178  user=root
2020-06-02 17:56:05
87.120.254.98 attack
RDP Brute-Force (Grieskirchen RZ2)
2020-06-02 18:03:15
51.158.108.186 attackbots
Jun  2 07:48:23 MainVPS sshd[12540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.108.186  user=root
Jun  2 07:48:25 MainVPS sshd[12540]: Failed password for root from 51.158.108.186 port 54036 ssh2
Jun  2 07:51:51 MainVPS sshd[15471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.108.186  user=root
Jun  2 07:51:54 MainVPS sshd[15471]: Failed password for root from 51.158.108.186 port 58460 ssh2
Jun  2 07:55:35 MainVPS sshd[18766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.108.186  user=root
Jun  2 07:55:37 MainVPS sshd[18766]: Failed password for root from 51.158.108.186 port 34424 ssh2
...
2020-06-02 17:56:22
68.162.160.2 attackspam
20/6/1@23:47:19: FAIL: Alarm-Telnet address from=68.162.160.2
20/6/1@23:47:19: FAIL: Alarm-Telnet address from=68.162.160.2
20/6/1@23:47:20: FAIL: Alarm-Telnet address from=68.162.160.2
20/6/1@23:47:20: FAIL: Alarm-Telnet address from=68.162.160.2
...
2020-06-02 18:06:18
61.7.147.29 attackspambots
2020-06-02T05:05:48.646688randservbullet-proofcloud-66.localdomain sshd[18831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.147.29  user=root
2020-06-02T05:05:51.075046randservbullet-proofcloud-66.localdomain sshd[18831]: Failed password for root from 61.7.147.29 port 49526 ssh2
2020-06-02T05:21:34.842121randservbullet-proofcloud-66.localdomain sshd[18958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.7.147.29  user=root
2020-06-02T05:21:36.808432randservbullet-proofcloud-66.localdomain sshd[18958]: Failed password for root from 61.7.147.29 port 59558 ssh2
...
2020-06-02 18:21:12
118.25.152.169 attack
Jun  2 05:44:45 nextcloud sshd\[28074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.152.169  user=root
Jun  2 05:44:47 nextcloud sshd\[28074\]: Failed password for root from 118.25.152.169 port 33974 ssh2
Jun  2 05:47:43 nextcloud sshd\[32197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.152.169  user=root
2020-06-02 17:51:59
36.232.101.226 attackspam
Honeypot attack, port: 5555, PTR: 36-232-101-226.dynamic-ip.hinet.net.
2020-06-02 17:51:47
200.116.47.247 attackbotsspam
Jun  2 05:35:54 ns382633 sshd\[16252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.47.247  user=root
Jun  2 05:35:56 ns382633 sshd\[16252\]: Failed password for root from 200.116.47.247 port 47630 ssh2
Jun  2 05:43:01 ns382633 sshd\[17309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.47.247  user=root
Jun  2 05:43:03 ns382633 sshd\[17309\]: Failed password for root from 200.116.47.247 port 31362 ssh2
Jun  2 05:47:46 ns382633 sshd\[18126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.47.247  user=root
2020-06-02 17:48:56
213.239.216.194 attackspam
20 attempts against mh-misbehave-ban on twig
2020-06-02 17:41:59
138.197.145.163 attackspam
May 31 22:46:06 cumulus sshd[17512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.163  user=r.r
May 31 22:46:08 cumulus sshd[17512]: Failed password for r.r from 138.197.145.163 port 43564 ssh2
May 31 22:46:08 cumulus sshd[17512]: Received disconnect from 138.197.145.163 port 43564:11: Bye Bye [preauth]
May 31 22:46:08 cumulus sshd[17512]: Disconnected from 138.197.145.163 port 43564 [preauth]
May 31 22:57:00 cumulus sshd[18577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.145.163  user=r.r
May 31 22:57:03 cumulus sshd[18577]: Failed password for r.r from 138.197.145.163 port 44404 ssh2
May 31 22:57:03 cumulus sshd[18577]: Received disconnect from 138.197.145.163 port 44404:11: Bye Bye [preauth]
May 31 22:57:03 cumulus sshd[18577]: Disconnected from 138.197.145.163 port 44404 [preauth]
May 31 23:00:33 cumulus sshd[18940]: pam_unix(sshd:auth): authentication failure........
-------------------------------
2020-06-02 18:14:26
5.23.52.237 attackspam
Automatic report - WordPress Brute Force
2020-06-02 18:08:24

最近上报的IP列表

195.18.92.57 81.178.221.201 93.135.109.8 165.74.37.116
86.129.153.133 43.237.188.201 127.171.234.24 62.174.42.134
147.209.101.199 87.57.98.246 152.222.253.115 228.230.106.167
19.86.133.253 76.28.49.16 178.205.126.58 83.73.104.43
130.5.154.244 109.206.188.228 171.219.137.235 33.254.211.133