必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): Afrihost (Pty) Ltd

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
Automatic report - Port Scan Attack
2019-11-24 13:58:00
相同子网IP讨论:
IP 类型 评论内容 时间
169.0.104.163 attackbotsspam
Automatic report - Port Scan Attack
2020-01-27 18:06:06
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.0.104.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;169.0.104.230.			IN	A

;; AUTHORITY SECTION:
.			536	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112301 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 24 13:57:53 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
230.104.0.169.in-addr.arpa domain name pointer 169-0-104-230.ip.afrihost.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
230.104.0.169.in-addr.arpa	name = 169-0-104-230.ip.afrihost.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.53.104.169 attackspambots
Jun  3 16:34:06 ift sshd\[33687\]: Failed password for root from 106.53.104.169 port 35534 ssh2Jun  3 16:36:07 ift sshd\[34113\]: Failed password for root from 106.53.104.169 port 60320 ssh2Jun  3 16:37:33 ift sshd\[34295\]: Failed password for root from 106.53.104.169 port 45620 ssh2Jun  3 16:38:54 ift sshd\[34396\]: Failed password for root from 106.53.104.169 port 54728 ssh2Jun  3 16:40:16 ift sshd\[34795\]: Failed password for root from 106.53.104.169 port 40120 ssh2
...
2020-06-03 22:46:14
180.76.134.43 attackbotsspam
Jun  3 08:34:18 Host-KEWR-E postfix/smtpd[19049]: lost connection after CONNECT from unknown[180.76.134.43]
...
2020-06-03 22:47:24
184.168.46.207 attackbots
LGS,WP GET /wordpress/wp-includes/wlwmanifest.xml
2020-06-03 22:33:15
222.186.42.137 attackbots
v+ssh-bruteforce
2020-06-03 22:44:01
80.211.68.185 attackbotsspam
Automatic report - XMLRPC Attack
2020-06-03 22:55:20
139.162.122.110 attack
SSH Brute Force
2020-06-03 22:42:31
51.75.124.215 attack
Jun  3 14:57:03 nextcloud sshd\[26858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.124.215  user=root
Jun  3 14:57:06 nextcloud sshd\[26858\]: Failed password for root from 51.75.124.215 port 45414 ssh2
Jun  3 15:00:46 nextcloud sshd\[506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.124.215  user=root
2020-06-03 23:06:16
37.187.181.182 attackbots
fail2ban -- 37.187.181.182
...
2020-06-03 22:58:06
82.254.10.37 attack
SSH brute-force attempt
2020-06-03 22:36:17
51.38.130.242 attack
Brute-force attempt banned
2020-06-03 22:55:48
147.47.200.22 attackspam
Unauthorized connection attempt detected from IP address 147.47.200.22 to port 22
2020-06-03 23:04:02
85.98.92.215 attackspam
Automatic report - Banned IP Access
2020-06-03 23:08:43
123.24.188.130 attackbotsspam
5x Failed Password
2020-06-03 22:47:42
222.186.173.238 attackbotsspam
Jun  3 17:11:11 santamaria sshd\[19809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Jun  3 17:11:13 santamaria sshd\[19809\]: Failed password for root from 222.186.173.238 port 43956 ssh2
Jun  3 17:11:32 santamaria sshd\[19816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
...
2020-06-03 23:12:05
106.52.19.71 attack
Jun  3 17:03:45 lukav-desktop sshd\[20259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.19.71  user=root
Jun  3 17:03:47 lukav-desktop sshd\[20259\]: Failed password for root from 106.52.19.71 port 56607 ssh2
Jun  3 17:06:58 lukav-desktop sshd\[965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.19.71  user=root
Jun  3 17:07:00 lukav-desktop sshd\[965\]: Failed password for root from 106.52.19.71 port 45306 ssh2
Jun  3 17:10:12 lukav-desktop sshd\[4313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.19.71  user=root
2020-06-03 23:19:25

最近上报的IP列表

149.84.222.179 180.165.158.228 45.179.88.249 85.105.133.168
178.170.54.191 153.162.67.55 52.219.4.197 190.51.203.203
45.183.94.153 120.74.158.158 41.202.170.84 216.158.229.90
62.148.143.182 238.183.31.47 174.146.171.245 96.23.195.210
245.88.149.30 129.74.50.183 98.215.54.164 7.134.50.9