必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): Linode

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbotsspam
Unauthorized connection attempt detected from IP address 172.104.112.26 to port 7001 [J]
2020-02-04 05:40:48
attackbots
Unauthorized connection attempt detected from IP address 172.104.112.26 to port 7001 [J]
2020-01-16 02:27:51
相同子网IP讨论:
IP 类型 评论内容 时间
172.104.112.118 attackspambots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-30 15:16:10
172.104.112.244 attackbots
scans once in preceeding hours on the ports (in chronological order) 1080 resulting in total of 8 scans from 172.104.0.0/15 block.
2020-08-23 02:28:46
172.104.112.244 attackbots
 TCP (SYN) 172.104.112.244:51430 -> port 1080, len 40
2020-08-13 02:18:11
172.104.112.228 attackbots
Jul  6 15:06:14 debian-2gb-nbg1-2 kernel: \[16299382.552893\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=172.104.112.228 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=35194 PROTO=TCP SPT=44423 DPT=815 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-06 23:53:54
172.104.112.228 attack
25589/tcp 19535/tcp 23835/tcp...
[2020-06-22/07-06]48pkt,16pt.(tcp)
2020-07-06 20:04:37
172.104.112.228 attack
" "
2020-06-22 16:20:43
172.104.112.244 attackbotsspam
" "
2020-06-10 16:18:07
172.104.112.244 attack
scans once in preceeding hours on the ports (in chronological order) 1080 resulting in total of 4 scans from 172.104.0.0/15 block.
2020-04-25 22:32:14
172.104.112.244 attack
trying to access non-authorized port
2020-04-25 18:15:37
172.104.112.244 attack
unauthorized connection attempt
2020-01-20 14:20:10
172.104.112.244 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 05:00:40
172.104.112.244 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 21:05:44
172.104.112.244 attackspambots
" "
2019-10-14 17:24:31
172.104.112.244 attackspam
" "
2019-10-09 20:57:39
172.104.112.244 attack
Splunk® : port scan detected:
Aug 25 14:44:17 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=172.104.112.244 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=51041 DPT=1080 WINDOW=65535 RES=0x00 SYN URGP=0
2019-08-26 08:59:21
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 172.104.112.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16456
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;172.104.112.26.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon May 06 12:33:43 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
26.112.104.172.in-addr.arpa domain name pointer scan-113.security.ipip.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
26.112.104.172.in-addr.arpa	name = scan-113.security.ipip.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
162.243.144.247 attackspam
" "
2019-06-22 07:04:47
37.20.155.43 attackbotsspam
Jun 21 21:23:34 mxgate1 postfix/postscreen[20865]: CONNECT from [37.20.155.43]:54460 to [176.31.12.44]:25
Jun 21 21:23:34 mxgate1 postfix/dnsblog[21676]: addr 37.20.155.43 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 21 21:23:34 mxgate1 postfix/dnsblog[21676]: addr 37.20.155.43 listed by domain zen.spamhaus.org as 127.0.0.11
Jun 21 21:23:34 mxgate1 postfix/dnsblog[21674]: addr 37.20.155.43 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 21 21:23:34 mxgate1 postfix/dnsblog[21675]: addr 37.20.155.43 listed by domain bl.spamcop.net as 127.0.0.2
Jun 21 21:23:35 mxgate1 postfix/postscreen[20865]: PREGREET 20 after 0.84 from [37.20.155.43]:54460: HELO ahceouqyp.com

Jun 21 21:23:35 mxgate1 postfix/postscreen[20865]: DNSBL rank 4 for [37.20.155.43]:54460
Jun x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.20.155.43
2019-06-22 07:12:39
78.166.224.3 attack
23/tcp
[2019-06-21]1pkt
2019-06-22 06:48:13
112.243.217.148 attackspam
23/tcp
[2019-06-21]1pkt
2019-06-22 06:59:45
5.77.215.146 attackbots
445/tcp 445/tcp
[2019-06-21]2pkt
2019-06-22 06:43:57
150.109.115.156 attackspambots
4899/tcp
[2019-06-21]1pkt
2019-06-22 06:42:59
43.228.180.60 attackspam
445/tcp
[2019-06-21]1pkt
2019-06-22 06:39:32
113.88.13.142 attack
Jun 21 15:43:31 localhost kernel: [12390404.412657] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=113.88.13.142 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=110 ID=18921 DF PROTO=TCP SPT=56277 DPT=139 WINDOW=8192 RES=0x00 SYN URGP=0 
Jun 21 15:43:31 localhost kernel: [12390404.412688] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=113.88.13.142 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=110 ID=18921 DF PROTO=TCP SPT=56277 DPT=139 SEQ=4100298020 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020404000103030201010402) 
Jun 21 15:43:34 localhost kernel: [12390407.469032] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=113.88.13.142 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=110 ID=20217 DF PROTO=TCP SPT=56277 DPT=139 WINDOW=8192 RES=0x00 SYN URGP=0 
Jun 21 15:43:34 localhost kernel: [12390407.469062] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=113.88.13
2019-06-22 06:41:32
125.72.228.30 attack
23/tcp 23/tcp 23/tcp
[2019-06-21]3pkt
2019-06-22 07:07:10
46.101.114.255 attackbots
Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x"
2019-06-22 07:00:08
185.156.177.44 attackbotsspam
19/6/21@15:42:45: FAIL: Alarm-Intrusion address from=185.156.177.44
...
2019-06-22 07:17:34
186.64.160.127 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 07:16:54
117.54.221.10 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 07:16:19
65.255.208.99 attackbotsspam
23/tcp
[2019-06-21]1pkt
2019-06-22 06:56:10
177.9.183.48 attackbotsspam
8080/tcp
[2019-06-21]1pkt
2019-06-22 07:18:01

最近上报的IP列表

94.255.247.18 171.221.241.97 117.6.3.175 202.5.54.70
170.79.89.154 36.89.128.55 199.195.254.13 34.92.60.20
103.114.107.249 144.217.85.183 91.215.22.145 103.81.114.182
35.227.84.214 77.109.85.114 82.146.94.207 91.238.248.251
180.151.225.195 190.192.16.0 183.91.4.26 89.207.95.37