必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): myLoc managed IT AG

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbots
Automated report - ssh fail2ban:
Jul 18 21:48:23 Disconnected from authenticating user root 5.104.108.4 port=34383 [preauth]
Jul 18 21:49:39 Connection closed by 5.104.108.4 port=35692 [preauth]
Jul 18 21:50:41 Connection closed by 5.104.108.4 port=37001 [preauth]
Jul 18 21:51:52 Connection closed by 5.104.108.4 port=38309 [preauth]
2020-07-19 04:21:35
attackbots
2019-12-10T17:59:38.447234abusebot-2.cloudsearch.cf sshd\[13813\]: Invalid user vagner from 5.104.108.4 port 45375
2019-12-11 02:08:17
相同子网IP讨论:
IP 类型 评论内容 时间
5.104.108.151 attackspambots
Invalid user suresh from 5.104.108.151 port 36344
2020-05-01 16:38:56
5.104.108.18 attack
Unauthorized connection attempt detected from IP address 5.104.108.18 to port 2220 [J]
2020-02-01 15:27:43
5.104.108.132 attackbotsspam
abuse-sasl
2019-07-17 02:05:38
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.104.108.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 687
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.104.108.4.			IN	A

;; AUTHORITY SECTION:
.			405	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121001 1800 900 604800 86400

;; Query time: 101 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 02:08:14 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
4.108.104.5.in-addr.arpa domain name pointer ve1039.venus.fastwebserver.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.108.104.5.in-addr.arpa	name = ve1039.venus.fastwebserver.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
141.98.9.137 attackspam
2020-05-15T22:25:48.509785shield sshd\[25397\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.137  user=operator
2020-05-15T22:25:50.498645shield sshd\[25397\]: Failed password for operator from 141.98.9.137 port 49032 ssh2
2020-05-15T22:26:11.589168shield sshd\[25507\]: Invalid user support from 141.98.9.137 port 59790
2020-05-15T22:26:11.609766shield sshd\[25507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.137
2020-05-15T22:26:13.422951shield sshd\[25507\]: Failed password for invalid user support from 141.98.9.137 port 59790 ssh2
2020-05-16 06:40:59
194.61.54.95 attackbots
RDP Brute-Force (Grieskirchen RZ2)
2020-05-16 07:00:10
190.72.56.229 attackspam
Brute forcing RDP port 3389
2020-05-16 07:05:23
114.34.215.57 attack
Port probing on unauthorized port 82
2020-05-16 06:48:10
51.254.114.105 attackspam
Invalid user developer from 51.254.114.105 port 33080
2020-05-16 07:06:04
152.32.164.39 attack
Invalid user ubuntu from 152.32.164.39 port 57946
2020-05-16 07:04:58
89.176.9.98 attack
May 15 23:44:08 legacy sshd[27574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.176.9.98
May 15 23:44:10 legacy sshd[27574]: Failed password for invalid user tomcat from 89.176.9.98 port 57928 ssh2
May 15 23:51:55 legacy sshd[27687]: Failed password for root from 89.176.9.98 port 37350 ssh2
...
2020-05-16 07:09:07
203.177.71.254 attackspam
Invalid user atomic from 203.177.71.254 port 45770
2020-05-16 06:39:58
89.216.206.156 attack
Invalid user mcneal from 89.216.206.156 port 60458
2020-05-16 06:34:40
45.142.195.14 attackbots
2020-05-15T16:21:30.151152linuxbox-skyline auth[31325]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=aeaean rhost=45.142.195.14
...
2020-05-16 06:44:27
119.28.215.26 attack
Invalid user onar from 119.28.215.26 port 50474
2020-05-16 06:36:13
152.32.240.76 attackbots
SSH Invalid Login
2020-05-16 06:58:27
101.108.133.104 attackbots
Hits on port : 445
2020-05-16 06:38:17
162.248.52.82 attack
May 15 22:46:21 inter-technics sshd[1969]: Invalid user vincent from 162.248.52.82 port 34944
May 15 22:46:21 inter-technics sshd[1969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.52.82
May 15 22:46:21 inter-technics sshd[1969]: Invalid user vincent from 162.248.52.82 port 34944
May 15 22:46:23 inter-technics sshd[1969]: Failed password for invalid user vincent from 162.248.52.82 port 34944 ssh2
May 15 22:49:03 inter-technics sshd[2075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.52.82  user=postgres
May 15 22:49:05 inter-technics sshd[2075]: Failed password for postgres from 162.248.52.82 port 56320 ssh2
...
2020-05-16 06:34:03
151.69.170.146 attackspambots
Invalid user hamish from 151.69.170.146 port 50575
2020-05-16 06:49:37

最近上报的IP列表

65.111.78.232 162.58.23.126 130.84.31.249 160.166.7.133
19.106.211.37 179.66.13.48 39.75.47.56 107.199.124.207
31.69.186.48 41.55.187.65 230.17.153.135 171.109.120.211
116.239.106.193 89.97.0.61 177.214.1.40 106.75.76.139
223.111.150.115 61.118.238.68 111.68.98.152 126.9.86.143