必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.104.234.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17526
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.104.234.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 23:59:55 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 3.234.104.49.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.234.104.49.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.130.207.97 attackspambots
Unauthorized connection attempt from IP address 203.130.207.97 on Port 445(SMB)
2019-11-26 08:42:12
201.202.105.229 attackbotsspam
Automatic report - Port Scan Attack
2019-11-26 08:25:22
62.210.89.222 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: 62-210-89-222.rev.poneytelecom.eu.
2019-11-26 08:32:08
93.183.87.85 attack
Unauthorized connection attempt from IP address 93.183.87.85 on Port 445(SMB)
2019-11-26 08:16:45
63.88.23.157 attackspambots
63.88.23.157 was recorded 11 times by 6 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 11, 68, 659
2019-11-26 08:24:34
62.234.148.159 attackspam
Nov 25 19:24:38 linuxvps sshd\[26153\]: Invalid user koyah from 62.234.148.159
Nov 25 19:24:38 linuxvps sshd\[26153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.148.159
Nov 25 19:24:40 linuxvps sshd\[26153\]: Failed password for invalid user koyah from 62.234.148.159 port 46218 ssh2
Nov 25 19:31:56 linuxvps sshd\[30595\]: Invalid user zhigang from 62.234.148.159
Nov 25 19:31:56 linuxvps sshd\[30595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.148.159
2019-11-26 08:43:39
124.107.103.78 attack
Unauthorized connection attempt from IP address 124.107.103.78 on Port 445(SMB)
2019-11-26 08:25:49
180.159.206.229 attackbots
Unauthorized connection attempt from IP address 180.159.206.229 on Port 445(SMB)
2019-11-26 08:26:38
81.22.45.29 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 78 - port: 2903 proto: TCP cat: Misc Attack
2019-11-26 08:37:47
113.62.176.98 attackspam
Nov 26 00:45:42 minden010 sshd[7427]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.62.176.98
Nov 26 00:45:44 minden010 sshd[7427]: Failed password for invalid user orm from 113.62.176.98 port 32066 ssh2
Nov 26 00:48:51 minden010 sshd[8432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.62.176.98
...
2019-11-26 08:51:07
130.162.64.72 attackspambots
Nov 26 05:39:56 vibhu-HP-Z238-Microtower-Workstation sshd\[26343\]: Invalid user barling from 130.162.64.72
Nov 26 05:39:56 vibhu-HP-Z238-Microtower-Workstation sshd\[26343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.64.72
Nov 26 05:39:57 vibhu-HP-Z238-Microtower-Workstation sshd\[26343\]: Failed password for invalid user barling from 130.162.64.72 port 15162 ssh2
Nov 26 05:46:02 vibhu-HP-Z238-Microtower-Workstation sshd\[26592\]: Invalid user mznxbcv from 130.162.64.72
Nov 26 05:46:02 vibhu-HP-Z238-Microtower-Workstation sshd\[26592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.162.64.72
...
2019-11-26 08:41:27
112.53.236.57 attack
port scan/probe/communication attempt; port 23
2019-11-26 08:36:28
159.65.187.159 attackspam
Attempted to connect 3 times to port 80 TCP
2019-11-26 08:22:02
51.83.76.36 attack
5x Failed Password
2019-11-26 08:46:27
49.70.207.187 attackbotsspam
Lines containing failures of 49.70.207.187
Nov 25 23:06:46 *** sshd[85687]: Invalid user tshostnamesior from 49.70.207.187 port 39902
Nov 25 23:06:46 *** sshd[85687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.70.207.187
Nov 25 23:06:49 *** sshd[85687]: Failed password for invalid user tshostnamesior from 49.70.207.187 port 39902 ssh2
Nov 25 23:06:49 *** sshd[85687]: Received disconnect from 49.70.207.187 port 39902:11: Bye Bye [preauth]
Nov 25 23:06:49 *** sshd[85687]: Disconnected from invalid user tshostnamesior 49.70.207.187 port 39902 [preauth]
Nov 25 23:31:29 *** sshd[87274]: Invalid user vara from 49.70.207.187 port 40227
Nov 25 23:31:29 *** sshd[87274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.70.207.187
Nov 25 23:31:31 *** sshd[87274]: Failed password for invalid user vara from 49.70.207.187 port 40227 ssh2
Nov 25 23:31:31 *** sshd[87274]: Received disconnect from 4........
------------------------------
2019-11-26 08:41:49

最近上报的IP列表

116.13.9.124 210.210.75.255 204.133.205.78 168.243.216.154
129.217.12.2 31.151.181.186 129.9.37.203 160.6.206.169
173.128.175.140 222.211.236.203 44.84.92.194 239.42.239.85
84.218.131.59 24.245.205.194 128.70.47.161 189.169.21.199
15.177.174.199 28.248.247.131 41.140.38.198 118.174.103.18