必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hong Kong

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.189.11.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13656
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.189.11.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 20:58:47 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
104.11.189.137.in-addr.arpa domain name pointer secuags4.itsc.cuhk.edu.hk.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.11.189.137.in-addr.arpa	name = secuags4.itsc.cuhk.edu.hk.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.37.71.235 attack
Sep 20 02:30:49 vps01 sshd[19643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.235
Sep 20 02:30:51 vps01 sshd[19643]: Failed password for invalid user budget from 54.37.71.235 port 47538 ssh2
2019-09-20 09:05:27
117.99.94.72 attackbotsspam
Sep 20 01:13:33 game-panel sshd[17874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.99.94.72
Sep 20 01:13:34 game-panel sshd[17875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.99.94.72
Sep 20 01:13:35 game-panel sshd[17875]: Failed password for invalid user pi from 117.99.94.72 port 56734 ssh2
2019-09-20 09:24:45
183.253.20.159 attackbotsspam
Sep 20 00:38:43 taivassalofi sshd[209773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.253.20.159
Sep 20 00:38:45 taivassalofi sshd[209773]: Failed password for invalid user admin from 183.253.20.159 port 34826 ssh2
...
2019-09-20 09:01:14
177.37.129.243 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 20:29:14.
2019-09-20 08:57:51
36.82.96.32 attack
Unauthorised access (Sep 20) SRC=36.82.96.32 LEN=52 TTL=248 ID=11640 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-20 09:40:21
191.7.152.13 attack
Reported by AbuseIPDB proxy server.
2019-09-20 09:23:58
222.186.173.119 attackspambots
2019-09-20T01:24:47.868730abusebot-2.cloudsearch.cf sshd\[15961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.119  user=root
2019-09-20 09:26:10
127.0.0.4 attackbotsspam
asd
2019-09-20 09:38:06
107.180.68.110 attackspam
Sep 19 14:50:32 hpm sshd\[17371\]: Invalid user install from 107.180.68.110
Sep 19 14:50:32 hpm sshd\[17371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-107-180-68-110.ip.secureserver.net
Sep 19 14:50:34 hpm sshd\[17371\]: Failed password for invalid user install from 107.180.68.110 port 51369 ssh2
Sep 19 14:54:08 hpm sshd\[17693\]: Invalid user sinus from 107.180.68.110
Sep 19 14:54:08 hpm sshd\[17693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-107-180-68-110.ip.secureserver.net
2019-09-20 09:06:37
2607:5300:61:404:: attackbotsspam
xmlrpc attack
2019-09-20 09:07:58
149.154.65.180 attack
Sep 20 00:46:59 venus sshd\[7923\]: Invalid user jaziel from 149.154.65.180 port 52940
Sep 20 00:46:59 venus sshd\[7923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.154.65.180
Sep 20 00:47:01 venus sshd\[7923\]: Failed password for invalid user jaziel from 149.154.65.180 port 52940 ssh2
...
2019-09-20 09:01:39
210.96.71.209 attackbotsspam
Sep 20 03:08:29 eventyay sshd[3231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.96.71.209
Sep 20 03:08:31 eventyay sshd[3231]: Failed password for invalid user bn from 210.96.71.209 port 35900 ssh2
Sep 20 03:13:32 eventyay sshd[3359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.96.71.209
...
2019-09-20 09:27:59
51.36.79.141 attackspam
TCP Port: 25 _    invalid blocked  abuseat-org  zen-spamhaus _  _  _ _ (195)
2019-09-20 09:28:26
5.135.108.140 attack
Sep 20 03:24:12 MK-Soft-Root1 sshd\[5881\]: Invalid user wpyan from 5.135.108.140 port 45027
Sep 20 03:24:12 MK-Soft-Root1 sshd\[5881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.108.140
Sep 20 03:24:13 MK-Soft-Root1 sshd\[5881\]: Failed password for invalid user wpyan from 5.135.108.140 port 45027 ssh2
...
2019-09-20 09:39:16
159.203.36.154 attackspam
Sep 19 15:09:35 hcbb sshd\[22464\]: Invalid user info from 159.203.36.154
Sep 19 15:09:35 hcbb sshd\[22464\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.36.154
Sep 19 15:09:37 hcbb sshd\[22464\]: Failed password for invalid user info from 159.203.36.154 port 36289 ssh2
Sep 19 15:13:40 hcbb sshd\[22815\]: Invalid user adelman from 159.203.36.154
Sep 19 15:13:40 hcbb sshd\[22815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.36.154
2019-09-20 09:19:48

最近上报的IP列表

7.137.156.213 209.45.83.59 70.100.205.149 4.66.202.161
253.236.224.161 18.68.238.26 116.37.113.203 87.250.190.34
249.250.226.235 29.196.183.50 95.44.167.61 188.139.247.123
109.218.193.204 133.155.193.26 234.113.59.244 224.44.156.253
201.19.39.162 45.236.195.94 30.13.215.9 230.112.242.71