必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.247.143.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.247.143.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 10:56:39 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 104.143.247.56.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 56.247.143.104.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.162.61.207 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2019-09-07 08:21:10
125.130.110.20 attack
Sep  6 14:41:16 web1 sshd\[9415\]: Invalid user oracle from 125.130.110.20
Sep  6 14:41:16 web1 sshd\[9415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
Sep  6 14:41:18 web1 sshd\[9415\]: Failed password for invalid user oracle from 125.130.110.20 port 47268 ssh2
Sep  6 14:46:01 web1 sshd\[9832\]: Invalid user ut2k4server from 125.130.110.20
Sep  6 14:46:01 web1 sshd\[9832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
2019-09-07 08:48:30
116.196.115.156 attackbotsspam
Too many connections or unauthorized access detected from Oscar banned ip
2019-09-07 08:28:34
106.13.115.174 attackbots
(sshd) Failed SSH login from 106.13.115.174 (-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  6 09:58:42 chookity sshd[4766]: Did not receive identification string from 106.13.115.174 port 60920
Sep  6 09:58:45 chookity sshd[4767]: Invalid user openhabian from 106.13.115.174 port 60982
Sep  6 09:58:48 chookity sshd[4769]: Invalid user netscreen from 106.13.115.174 port 33576
Sep  6 09:58:50 chookity sshd[4771]: Invalid user nexthink from 106.13.115.174 port 34416
Sep  6 09:58:53 chookity sshd[4773]: Invalid user misp from 106.13.115.174 port 34906
2019-09-07 08:33:41
157.230.84.180 attackbotsspam
Sep  7 02:22:29 markkoudstaal sshd[23164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.84.180
Sep  7 02:22:32 markkoudstaal sshd[23164]: Failed password for invalid user 12345678 from 157.230.84.180 port 52486 ssh2
Sep  7 02:26:54 markkoudstaal sshd[23505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.84.180
2019-09-07 08:28:16
213.8.116.86 attackbotsspam
Automatic report - Port Scan Attack
2019-09-07 08:38:36
157.230.146.19 attackspambots
Sep  6 14:20:16 lcprod sshd\[14316\]: Invalid user testtest from 157.230.146.19
Sep  6 14:20:16 lcprod sshd\[14316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.146.19
Sep  6 14:20:18 lcprod sshd\[14316\]: Failed password for invalid user testtest from 157.230.146.19 port 49110 ssh2
Sep  6 14:24:30 lcprod sshd\[14694\]: Invalid user sinusbot from 157.230.146.19
Sep  6 14:24:30 lcprod sshd\[14694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.146.19
2019-09-07 08:38:55
121.142.111.230 attackbotsspam
2019-09-03T07:58:16.983461ns557175 sshd\[9688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.111.230  user=root
2019-09-03T07:58:19.466375ns557175 sshd\[9688\]: Failed password for root from 121.142.111.230 port 56090 ssh2
2019-09-03T09:03:44.153809ns557175 sshd\[12180\]: Invalid user liang from 121.142.111.230 port 44820
2019-09-03T09:03:44.159599ns557175 sshd\[12180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.142.111.230
2019-09-03T09:03:45.887236ns557175 sshd\[12180\]: Failed password for invalid user liang from 121.142.111.230 port 44820 ssh2
...
2019-09-07 08:42:29
60.113.85.41 attackbotsspam
Sep  6 04:45:56 lcdev sshd\[31260\]: Invalid user factorio from 60.113.85.41
Sep  6 04:45:56 lcdev sshd\[31260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=softbank060113085041.bbtec.net
Sep  6 04:45:58 lcdev sshd\[31260\]: Failed password for invalid user factorio from 60.113.85.41 port 51362 ssh2
Sep  6 04:50:20 lcdev sshd\[31615\]: Invalid user ftpuser from 60.113.85.41
Sep  6 04:50:20 lcdev sshd\[31615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=softbank060113085041.bbtec.net
2019-09-07 08:41:21
168.181.51.119 attack
Sep  7 02:33:13 www2 sshd\[43677\]: Invalid user 1q2w3e4r from 168.181.51.119Sep  7 02:33:16 www2 sshd\[43677\]: Failed password for invalid user 1q2w3e4r from 168.181.51.119 port 29857 ssh2Sep  7 02:39:07 www2 sshd\[44287\]: Invalid user 123456789 from 168.181.51.119
...
2019-09-07 08:31:40
49.88.112.71 attackbotsspam
Sep  7 00:46:00 MK-Soft-VM6 sshd\[16051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.71  user=root
Sep  7 00:46:02 MK-Soft-VM6 sshd\[16051\]: Failed password for root from 49.88.112.71 port 61155 ssh2
Sep  7 00:46:05 MK-Soft-VM6 sshd\[16051\]: Failed password for root from 49.88.112.71 port 61155 ssh2
...
2019-09-07 08:46:46
46.33.225.84 attack
F2B jail: sshd. Time: 2019-09-06 22:52:42, Reported by: VKReport
2019-09-07 08:23:18
106.12.59.2 attackbots
Sep  6 18:19:50 hcbbdb sshd\[16241\]: Invalid user nagios from 106.12.59.2
Sep  6 18:19:50 hcbbdb sshd\[16241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.59.2
Sep  6 18:19:53 hcbbdb sshd\[16241\]: Failed password for invalid user nagios from 106.12.59.2 port 42736 ssh2
Sep  6 18:24:35 hcbbdb sshd\[16760\]: Invalid user test1 from 106.12.59.2
Sep  6 18:24:35 hcbbdb sshd\[16760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.59.2
2019-09-07 08:42:45
93.62.253.232 attack
" "
2019-09-07 08:10:01
104.236.142.200 attack
Sep  6 14:42:01 wbs sshd\[30902\]: Invalid user ts3server from 104.236.142.200
Sep  6 14:42:01 wbs sshd\[30902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.200
Sep  6 14:42:03 wbs sshd\[30902\]: Failed password for invalid user ts3server from 104.236.142.200 port 38026 ssh2
Sep  6 14:46:00 wbs sshd\[31259\]: Invalid user postgres from 104.236.142.200
Sep  6 14:46:00 wbs sshd\[31259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.142.200
2019-09-07 08:51:20

最近上报的IP列表

174.253.64.104 244.124.160.131 232.15.78.145 179.34.174.69
120.18.95.5 49.172.110.5 67.226.121.20 24.205.58.88
142.126.246.19 49.11.225.199 60.51.70.252 66.216.64.20
235.162.78.61 243.66.3.173 233.120.93.89 184.82.125.193
106.66.63.14 6.25.169.7 230.76.192.97 131.241.98.4