必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Machakos

省份(region): Machakos District

国家(country): Kenya

运营商(isp): Safaricom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.104.132.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49459
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.104.132.166.		IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020901 1800 900 604800 86400

;; Query time: 80 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:51:33 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
Host 166.132.104.196.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 166.132.104.196.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.30.92.74 attackbots
2019-08-12T16:41:17.348617abusebot-4.cloudsearch.cf sshd\[25948\]: Invalid user install from 60.30.92.74 port 25221
2019-08-13 01:18:17
202.134.160.54 attack
Aug 12 15:20:18 srv-4 sshd\[28444\]: Invalid user hein from 202.134.160.54
Aug 12 15:20:18 srv-4 sshd\[28444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.134.160.54
Aug 12 15:20:19 srv-4 sshd\[28444\]: Failed password for invalid user hein from 202.134.160.54 port 58954 ssh2
...
2019-08-13 00:59:15
187.86.200.126 attack
firewall-block, port(s): 445/tcp
2019-08-13 00:55:39
108.63.27.100 attackspam
Automatic report - Banned IP Access
2019-08-13 01:16:12
51.38.36.15 attackbotsspam
fail2ban honeypot
2019-08-13 01:31:21
89.248.174.201 attackbots
08/12/2019-13:24:05.157244 89.248.174.201 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-13 01:48:38
23.129.64.203 attackbots
Aug 12 18:23:00 ns3367391 sshd\[9795\]: Failed password for root from 23.129.64.203 port 17358 ssh2
Aug 12 18:23:02 ns3367391 sshd\[9795\]: Failed password for root from 23.129.64.203 port 17358 ssh2
...
2019-08-13 01:17:33
71.6.233.57 attackbotsspam
firewall-block, port(s): 443/tcp
2019-08-13 01:13:25
1.209.171.64 attackspam
$f2bV_matches_ltvn
2019-08-13 01:14:58
114.34.109.184 attackspambots
Brute force SMTP login attempted.
...
2019-08-13 01:47:42
54.36.148.166 attackspam
Automatic report - Banned IP Access
2019-08-13 01:51:37
184.105.247.196 attackbots
Port scan and direct access per IP instead of hostname
2019-08-13 00:56:35
171.111.153.194 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-14/08-12]9pkt,1pt.(tcp)
2019-08-13 01:03:11
120.52.152.16 attack
08/12/2019-13:33:37.760214 120.52.152.16 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-13 01:36:48
113.59.224.89 attackspambots
Unauthorised access (Aug 12) SRC=113.59.224.89 LEN=40 TTL=240 ID=58428 TCP DPT=445 WINDOW=1024 SYN
2019-08-13 01:22:42

最近上报的IP列表

46.89.4.37 61.140.228.227 100.201.222.165 126.75.24.187
120.159.71.153 2.175.29.132 120.80.143.156 193.112.98.81
108.205.247.124 62.161.49.52 188.188.61.224 72.89.66.141
47.19.65.182 32.144.154.240 109.49.41.189 32.193.250.44
95.89.179.155 98.144.27.194 179.226.216.64 55.23.132.105