必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Jakarta

省份(region): Jakarta Raya

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.78.119.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3105
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.78.119.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 11:57:58 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
104.119.78.16.in-addr.arpa domain name pointer ec2-16-78-119-104.ap-southeast-3.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.119.78.16.in-addr.arpa	name = ec2-16-78-119-104.ap-southeast-3.compute.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.150.38.34 attackbotsspam
2019-10-19T11:30:38.690159abusebot.cloudsearch.cf sshd\[7367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.150.38.34  user=root
2019-10-19 19:35:18
106.12.89.118 attackbots
Lines containing failures of 106.12.89.118
Oct 17 01:34:59 mellenthin sshd[2278]: User r.r from 106.12.89.118 not allowed because not listed in AllowUsers
Oct 17 01:34:59 mellenthin sshd[2278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.118  user=r.r
Oct 17 01:35:01 mellenthin sshd[2278]: Failed password for invalid user r.r from 106.12.89.118 port 33844 ssh2
Oct 17 01:35:02 mellenthin sshd[2278]: Received disconnect from 106.12.89.118 port 33844:11: Bye Bye [preauth]
Oct 17 01:35:02 mellenthin sshd[2278]: Disconnected from invalid user r.r 106.12.89.118 port 33844 [preauth]
Oct 17 01:58:59 mellenthin sshd[3410]: Invalid user vali from 106.12.89.118 port 57318
Oct 17 01:58:59 mellenthin sshd[3410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.118
Oct 17 01:59:01 mellenthin sshd[3410]: Failed password for invalid user vali from 106.12.89.118 port 57318 ssh2
Oct 17 0........
------------------------------
2019-10-19 19:13:23
103.254.57.46 attackspam
Cluster member 192.168.0.31 (-) said, DENY 103.254.57.46, Reason:[(imapd) Failed IMAP login from 103.254.57.46 (IN/India/-): 1 in the last 3600 secs]
2019-10-19 19:38:28
111.231.119.188 attackbotsspam
Oct 15 11:43:13 mail1 sshd[19798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.119.188  user=r.r
Oct 15 11:43:15 mail1 sshd[19798]: Failed password for r.r from 111.231.119.188 port 50182 ssh2
Oct 15 11:43:16 mail1 sshd[19798]: Received disconnect from 111.231.119.188 port 50182:11: Bye Bye [preauth]
Oct 15 11:43:16 mail1 sshd[19798]: Disconnected from 111.231.119.188 port 50182 [preauth]
Oct 15 11:59:18 mail1 sshd[22073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.119.188  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=111.231.119.188
2019-10-19 19:19:19
207.81.189.168 attack
" "
2019-10-19 19:03:53
212.64.57.24 attackbotsspam
Oct 18 22:26:48 tdfoods sshd\[1226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.24  user=root
Oct 18 22:26:50 tdfoods sshd\[1226\]: Failed password for root from 212.64.57.24 port 55825 ssh2
Oct 18 22:31:36 tdfoods sshd\[1670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.24  user=root
Oct 18 22:31:38 tdfoods sshd\[1670\]: Failed password for root from 212.64.57.24 port 46741 ssh2
Oct 18 22:36:26 tdfoods sshd\[2068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.24  user=root
2019-10-19 18:58:33
112.13.91.29 attack
Oct 19 13:12:07 xeon sshd[47422]: Failed password for root from 112.13.91.29 port 2799 ssh2
2019-10-19 19:40:32
104.248.227.130 attackbots
Oct 19 11:28:55 ip-172-31-62-245 sshd\[28607\]: Failed password for root from 104.248.227.130 port 35930 ssh2\
Oct 19 11:32:24 ip-172-31-62-245 sshd\[28616\]: Invalid user tuser from 104.248.227.130\
Oct 19 11:32:26 ip-172-31-62-245 sshd\[28616\]: Failed password for invalid user tuser from 104.248.227.130 port 46554 ssh2\
Oct 19 11:36:02 ip-172-31-62-245 sshd\[28640\]: Invalid user vsftpd from 104.248.227.130\
Oct 19 11:36:04 ip-172-31-62-245 sshd\[28640\]: Failed password for invalid user vsftpd from 104.248.227.130 port 57186 ssh2\
2019-10-19 19:41:00
92.119.160.10 attack
Oct 19 13:12:04 h2177944 kernel: \[4359440.922308\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.10 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=7947 PROTO=TCP SPT=59151 DPT=8361 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 19 13:14:36 h2177944 kernel: \[4359592.913714\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.10 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=11104 PROTO=TCP SPT=59151 DPT=8956 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 19 13:29:25 h2177944 kernel: \[4360481.768103\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.10 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=39534 PROTO=TCP SPT=59151 DPT=9660 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 19 13:31:46 h2177944 kernel: \[4360623.240675\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.10 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=33775 PROTO=TCP SPT=59151 DPT=9943 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 19 13:32:59 h2177944 kernel: \[4360696.309353\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.10 DST=85.214.117.9
2019-10-19 19:36:06
79.118.196.33 attackbotsspam
(Oct 19)  LEN=44 TTL=55 ID=49614 TCP DPT=8080 WINDOW=34166 SYN 
 (Oct 19)  LEN=44 TTL=55 ID=28313 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 18)  LEN=44 TTL=55 ID=60765 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 17)  LEN=44 TTL=55 ID=23720 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 17)  LEN=44 TTL=55 ID=3509 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 17)  LEN=44 TTL=55 ID=57678 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 17)  LEN=44 TTL=55 ID=697 TCP DPT=8080 WINDOW=34166 SYN 
 (Oct 17)  LEN=44 TTL=55 ID=7905 TCP DPT=8080 WINDOW=34166 SYN 
 (Oct 15)  LEN=44 TTL=55 ID=41356 TCP DPT=8080 WINDOW=44126 SYN 
 (Oct 15)  LEN=44 TTL=55 ID=32152 TCP DPT=8080 WINDOW=34166 SYN 
 (Oct 15)  LEN=44 TTL=55 ID=31730 TCP DPT=8080 WINDOW=34166 SYN
2019-10-19 19:16:50
180.243.234.213 attackspambots
Unauthorised access (Oct 19) SRC=180.243.234.213 LEN=52 TTL=247 ID=12093 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-19 19:26:07
128.199.224.73 attack
Automatic report - Banned IP Access
2019-10-19 19:14:33
212.83.138.75 attack
k+ssh-bruteforce
2019-10-19 19:18:44
167.99.119.113 attack
$f2bV_matches
2019-10-19 19:15:35
222.186.173.201 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
Failed password for root from 222.186.173.201 port 53882 ssh2
Failed password for root from 222.186.173.201 port 53882 ssh2
Failed password for root from 222.186.173.201 port 53882 ssh2
Failed password for root from 222.186.173.201 port 53882 ssh2
2019-10-19 19:32:17

最近上报的IP列表

178.32.166.11 127.77.224.206 30.14.55.186 64.13.15.117
122.190.229.158 212.166.23.47 245.229.1.209 152.189.27.208
92.182.120.67 25.2.19.228 253.183.83.194 243.102.60.128
198.123.76.202 8.172.248.123 87.26.58.120 192.161.103.149
95.103.28.70 62.37.127.23 67.2.180.244 230.139.30.154