必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.0.22.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26234
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.0.22.137.			IN	A

;; AUTHORITY SECTION:
.			515	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 19:15:18 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
137.22.0.104.in-addr.arpa domain name pointer 104-0-22-137.lightspeed.miamfl.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.22.0.104.in-addr.arpa	name = 104-0-22-137.lightspeed.miamfl.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.37.75.210 attack
Invalid user pang from 54.37.75.210 port 59416
2020-07-14 21:08:30
49.35.105.159 attackspambots
Unauthorized connection attempt from IP address 49.35.105.159 on Port 445(SMB)
2020-07-14 21:19:09
140.143.56.61 attackspam
Invalid user kc from 140.143.56.61 port 36426
2020-07-14 21:00:59
118.145.8.50 attackspambots
SSH brute-force attempt
2020-07-14 21:23:08
131.1.217.143 attackbotsspam
Invalid user kumar from 131.1.217.143 port 58123
2020-07-14 21:02:28
43.254.160.30 attackbotsspam
Unauthorized connection attempt from IP address 43.254.160.30 on Port 445(SMB)
2020-07-14 21:34:55
139.99.89.91 attack
2020-07-14T15:12:55.621510vps773228.ovh.net sshd[10271]: Failed password for invalid user liu from 139.99.89.91 port 46036 ssh2
2020-07-14T15:15:45.790481vps773228.ovh.net sshd[10275]: Invalid user test from 139.99.89.91 port 33610
2020-07-14T15:15:45.813133vps773228.ovh.net sshd[10275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.ip-139-99-89.net
2020-07-14T15:15:45.790481vps773228.ovh.net sshd[10275]: Invalid user test from 139.99.89.91 port 33610
2020-07-14T15:15:47.653462vps773228.ovh.net sshd[10275]: Failed password for invalid user test from 139.99.89.91 port 33610 ssh2
...
2020-07-14 21:21:04
163.172.127.251 attackbots
2020-07-14T13:13:21.946608abusebot-5.cloudsearch.cf sshd[19380]: Invalid user ezio from 163.172.127.251 port 57168
2020-07-14T13:13:21.952776abusebot-5.cloudsearch.cf sshd[19380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.127.251
2020-07-14T13:13:21.946608abusebot-5.cloudsearch.cf sshd[19380]: Invalid user ezio from 163.172.127.251 port 57168
2020-07-14T13:13:24.013102abusebot-5.cloudsearch.cf sshd[19380]: Failed password for invalid user ezio from 163.172.127.251 port 57168 ssh2
2020-07-14T13:15:49.833160abusebot-5.cloudsearch.cf sshd[19433]: Invalid user user14 from 163.172.127.251 port 44666
2020-07-14T13:15:49.839170abusebot-5.cloudsearch.cf sshd[19433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.127.251
2020-07-14T13:15:49.833160abusebot-5.cloudsearch.cf sshd[19433]: Invalid user user14 from 163.172.127.251 port 44666
2020-07-14T13:15:51.217088abusebot-5.cloudsearch.cf sshd[1
...
2020-07-14 21:16:58
101.78.209.39 attackspam
Invalid user admin from 101.78.209.39 port 56507
2020-07-14 21:05:09
66.112.218.245 attackbotsspam
Invalid user backup from 66.112.218.245 port 39882
2020-07-14 21:06:43
18.220.0.184 attackbotsspam
Invalid user jx from 18.220.0.184 port 43618
2020-07-14 21:13:37
103.69.125.74 attackbotsspam
Invalid user info from 103.69.125.74 port 39252
2020-07-14 21:04:53
49.233.147.108 attackbotsspam
Invalid user lynn from 49.233.147.108 port 60918
2020-07-14 21:10:24
47.30.183.224 attackbotsspam
Unauthorized connection attempt from IP address 47.30.183.224 on Port 445(SMB)
2020-07-14 21:44:08
106.245.228.122 attack
Failed password for invalid user webmaster from 106.245.228.122 port 19769 ssh2
2020-07-14 21:03:53

最近上报的IP列表

101.109.146.138 104.1.45.141 104.0.0.31 104.0.170.81
103.99.8.118 103.99.9.49 104.0.131.89 103.99.9.22
103.99.9.26 101.109.146.141 104.1.62.203 104.100.201.140
103.99.9.57 103.99.8.65 104.100.218.169 104.10.61.163
104.10.169.206 104.102.105.202 104.100.22.172 104.100.204.26