必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.104.132.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;97.104.132.113.			IN	A

;; AUTHORITY SECTION:
.			449	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022002 1800 900 604800 86400

;; Query time: 179 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 07:33:20 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 113.132.104.97.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 113.132.104.97.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
47.241.63.146 attackbots
" "
2020-08-06 15:47:42
51.68.44.154 attack
leo_www
2020-08-06 15:27:17
117.50.34.131 attackbotsspam
Aug  6 12:28:12 gw1 sshd[19140]: Failed password for root from 117.50.34.131 port 42278 ssh2
...
2020-08-06 15:46:37
212.129.31.56 attackspambots
212.129.31.56 - - \[06/Aug/2020:09:14:06 +0200\] "POST /wp-login.php HTTP/1.0" 200 6718 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
212.129.31.56 - - \[06/Aug/2020:09:14:08 +0200\] "POST /wp-login.php HTTP/1.0" 200 6548 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
212.129.31.56 - - \[06/Aug/2020:09:14:09 +0200\] "POST /wp-login.php HTTP/1.0" 200 6542 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-08-06 15:31:16
113.53.29.172 attackspambots
Fail2Ban Ban Triggered (2)
2020-08-06 15:40:01
120.53.9.188 attackbotsspam
2020-08-06T05:53:37.247534shield sshd\[6684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.9.188  user=root
2020-08-06T05:53:39.198735shield sshd\[6684\]: Failed password for root from 120.53.9.188 port 45246 ssh2
2020-08-06T05:56:10.411146shield sshd\[6907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.9.188  user=root
2020-08-06T05:56:12.361861shield sshd\[6907\]: Failed password for root from 120.53.9.188 port 43118 ssh2
2020-08-06T06:01:15.521147shield sshd\[7219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.9.188  user=root
2020-08-06 15:48:12
222.186.30.218 attackbotsspam
2020-08-06T09:18:03.994593vps773228.ovh.net sshd[2661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
2020-08-06T09:18:05.749036vps773228.ovh.net sshd[2661]: Failed password for root from 222.186.30.218 port 55124 ssh2
2020-08-06T09:18:03.994593vps773228.ovh.net sshd[2661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
2020-08-06T09:18:05.749036vps773228.ovh.net sshd[2661]: Failed password for root from 222.186.30.218 port 55124 ssh2
2020-08-06T09:18:07.650775vps773228.ovh.net sshd[2661]: Failed password for root from 222.186.30.218 port 55124 ssh2
...
2020-08-06 15:21:37
122.246.91.146 attackspambots
From: "amazon" 
Return-Path: 
Received: from vv.net (unknown [122.246.91.146])
Message-ID: <2020_____4@vv.net>
Subject: お支払い方法の情報を更新
Date: Thu, 6 Aug 2020 01:28:58 +0800
X-mailer: R_____w 6

http://144.172.64.51/ap/signin?key=a@b.c
2020-08-06 15:14:19
222.186.180.6 attackspam
Aug  6 09:15:50 eventyay sshd[29258]: Failed password for root from 222.186.180.6 port 58546 ssh2
Aug  6 09:16:04 eventyay sshd[29258]: error: maximum authentication attempts exceeded for root from 222.186.180.6 port 58546 ssh2 [preauth]
Aug  6 09:16:09 eventyay sshd[29261]: Failed password for root from 222.186.180.6 port 56070 ssh2
...
2020-08-06 15:21:07
178.127.115.86 attackspambots
Automatic report - Banned IP Access
2020-08-06 15:23:57
212.70.149.35 attackspambots
2020-08-06 10:28:26 dovecot_login authenticator failed for \(User\) \[212.70.149.35\]: 535 Incorrect authentication data \(set_id=switch8@org.ua\)2020-08-06 10:28:44 dovecot_login authenticator failed for \(User\) \[212.70.149.35\]: 535 Incorrect authentication data \(set_id=eclipse@org.ua\)2020-08-06 10:29:03 dovecot_login authenticator failed for \(User\) \[212.70.149.35\]: 535 Incorrect authentication data \(set_id=webserv@org.ua\)
...
2020-08-06 15:36:43
179.247.167.127 attack
Aug  5 15:31:02 v11 sshd[16380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.247.167.127  user=r.r
Aug  5 15:31:04 v11 sshd[16380]: Failed password for r.r from 179.247.167.127 port 40542 ssh2
Aug  5 15:31:04 v11 sshd[16380]: Received disconnect from 179.247.167.127 port 40542:11: Bye Bye [preauth]
Aug  5 15:31:04 v11 sshd[16380]: Disconnected from 179.247.167.127 port 40542 [preauth]
Aug  5 15:35:48 v11 sshd[16873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.247.167.127  user=r.r
Aug  5 15:35:50 v11 sshd[16873]: Failed password for r.r from 179.247.167.127 port 47320 ssh2
Aug  5 15:35:51 v11 sshd[16873]: Received disconnect from 179.247.167.127 port 47320:11: Bye Bye [preauth]
Aug  5 15:35:51 v11 sshd[16873]: Disconnected from 179.247.167.127 port 47320 [preauth]
Aug  5 15:39:50 v11 sshd[17345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse........
-------------------------------
2020-08-06 15:39:03
51.75.16.206 attackbots
Automatic report - Banned IP Access
2020-08-06 15:25:27
112.85.42.178 attack
2020-08-06T09:28:23.062912vps773228.ovh.net sshd[2797]: Failed password for root from 112.85.42.178 port 43220 ssh2
2020-08-06T09:28:26.503145vps773228.ovh.net sshd[2797]: Failed password for root from 112.85.42.178 port 43220 ssh2
2020-08-06T09:28:30.298996vps773228.ovh.net sshd[2797]: Failed password for root from 112.85.42.178 port 43220 ssh2
2020-08-06T09:28:33.306937vps773228.ovh.net sshd[2797]: Failed password for root from 112.85.42.178 port 43220 ssh2
2020-08-06T09:28:36.046849vps773228.ovh.net sshd[2797]: Failed password for root from 112.85.42.178 port 43220 ssh2
...
2020-08-06 15:32:22
139.59.61.103 attackspam
2020-08-06T02:08:22.9814581495-001 sshd[15283]: Invalid user b.321 from 139.59.61.103 port 56422
2020-08-06T02:08:24.7597021495-001 sshd[15283]: Failed password for invalid user b.321 from 139.59.61.103 port 56422 ssh2
2020-08-06T02:12:49.4721471495-001 sshd[15502]: Invalid user ABcd%1234 from 139.59.61.103 port 38780
2020-08-06T02:12:49.4751311495-001 sshd[15502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.61.103
2020-08-06T02:12:49.4721471495-001 sshd[15502]: Invalid user ABcd%1234 from 139.59.61.103 port 38780
2020-08-06T02:12:51.2395491495-001 sshd[15502]: Failed password for invalid user ABcd%1234 from 139.59.61.103 port 38780 ssh2
...
2020-08-06 15:10:40

最近上报的IP列表

148.241.97.166 147.102.46.169 218.99.91.237 185.56.9.40
106.12.2.223 187.111.220.108 14.185.15.194 82.77.68.79
191.253.104.228 117.50.65.85 27.77.26.218 223.207.219.15
223.206.244.182 189.55.163.119 244.92.197.159 223.205.246.134
9.125.98.100 106.36.63.161 223.17.74.66 222.254.134.251