必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.20.46.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56939
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.20.46.94.			IN	A

;; AUTHORITY SECTION:
.			338	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:27:14 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 94.46.20.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.46.20.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.115.250.23 attack
2019-04-22 05:29:12 1hIPdo-0008Bx-JY SMTP connection from \(optimal.bookholics.icu\) \[93.115.250.23\]:44308 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-22 05:29:31 1hIPe7-0008CU-P9 SMTP connection from \(optimal.bookholics.icu\) \[93.115.250.23\]:33215 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-22 05:32:24 1hIPgt-0008Ip-Su SMTP connection from \(optimal.bookholics.icu\) \[93.115.250.23\]:33708 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 04:06:43
138.197.145.26 attack
Jan 27 21:41:11 pkdns2 sshd\[5303\]: Invalid user edison from 138.197.145.26Jan 27 21:41:13 pkdns2 sshd\[5303\]: Failed password for invalid user edison from 138.197.145.26 port 47384 ssh2Jan 27 21:45:01 pkdns2 sshd\[5513\]: Invalid user student from 138.197.145.26Jan 27 21:45:03 pkdns2 sshd\[5513\]: Failed password for invalid user student from 138.197.145.26 port 46866 ssh2Jan 27 21:47:49 pkdns2 sshd\[5728\]: Invalid user webmaster from 138.197.145.26Jan 27 21:47:52 pkdns2 sshd\[5728\]: Failed password for invalid user webmaster from 138.197.145.26 port 46348 ssh2
...
2020-01-28 04:10:25
54.254.164.180 attackspambots
Unauthorized connection attempt detected from IP address 54.254.164.180 to port 2220 [J]
2020-01-28 03:52:11
54.37.74.189 attack
Attempted abnormal login - autodetected.
2020-01-28 03:48:50
216.218.206.91 attackspambots
389/tcp 445/tcp 8443/tcp...
[2019-11-29/2020-01-27]17pkt,6pt.(tcp),2pt.(udp)
2020-01-28 03:57:38
93.115.250.17 attackbots
2019-04-21 09:36:49 1hI71t-0005Ct-F4 SMTP connection from \(lookalike.khaosob.icu\) \[93.115.250.17\]:56145 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-21 09:36:51 1hI71v-0005Cu-19 SMTP connection from \(lookalike.khaosob.icu\) \[93.115.250.17\]:44007 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-21 09:40:32 1hI75T-0005KP-Ui SMTP connection from \(lookalike.khaosob.icu\) \[93.115.250.17\]:57059 I=\[193.107.90.29\]:25 closed by DROP in ACL
...
2020-01-28 04:12:54
216.176.176.150 attackspambots
Jan 27 09:25:43 wbs sshd\[20039\]: Invalid user xg from 216.176.176.150
Jan 27 09:25:43 wbs sshd\[20039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ge0.border1.sea.defaultroute.net
Jan 27 09:25:45 wbs sshd\[20039\]: Failed password for invalid user xg from 216.176.176.150 port 47552 ssh2
Jan 27 09:28:27 wbs sshd\[20254\]: Invalid user dspace from 216.176.176.150
Jan 27 09:28:27 wbs sshd\[20254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ge0.border1.sea.defaultroute.net
2020-01-28 03:53:54
36.48.167.37 attackspam
Unauthorized connection attempt detected from IP address 36.48.167.37 to port 1433
2020-01-28 04:00:00
71.6.233.8 attackspam
Honeypot attack, port: 445, PTR: scanners.labs.rapid7.com.
2020-01-28 03:57:22
58.141.232.44 attackspam
Unauthorized connection attempt detected from IP address 58.141.232.44 to port 23 [J]
2020-01-28 03:47:15
138.68.168.137 attackspam
Dec 19 03:24:30 dallas01 sshd[28204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
Dec 19 03:24:32 dallas01 sshd[28204]: Failed password for invalid user guenter from 138.68.168.137 port 60208 ssh2
Dec 19 03:29:37 dallas01 sshd[31708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-01-28 04:14:22
35.234.113.186 attack
1580152570 - 01/27/2020 20:16:10 Host: research.coap-explorer.realmv6.org/35.234.113.186 Port: 5683 UDP Blocked
2020-01-28 04:00:17
188.165.215.138 attack
[2020-01-27 14:43:57] NOTICE[1148][C-000032c7] chan_sip.c: Call from '' (188.165.215.138:51001) to extension '9011441902933947' rejected because extension not found in context 'public'.
[2020-01-27 14:43:57] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-27T14:43:57.997-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441902933947",SessionID="0x7fd82c3faf98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/188.165.215.138/51001",ACLName="no_extension_match"
[2020-01-27 14:44:49] NOTICE[1148][C-000032cc] chan_sip.c: Call from '' (188.165.215.138:50572) to extension '00441902933947' rejected because extension not found in context 'public'.
[2020-01-27 14:44:49] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-01-27T14:44:49.274-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441902933947",SessionID="0x7fd82c06eac8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV
...
2020-01-28 03:59:07
146.148.50.254 attackbotsspam
7001/tcp 6379/tcp 8088/tcp...
[2020-01-01/27]4pkt,4pt.(tcp)
2020-01-28 04:12:13
93.115.250.26 attack
2019-04-24 05:38:07 1hJ8jX-0002Wr-5s SMTP connection from \(blade.bookholics.icu\) \[93.115.250.26\]:48474 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-04-24 05:38:27 1hJ8jr-0002XD-Df SMTP connection from \(blade.bookholics.icu\) \[93.115.250.26\]:37538 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-04-24 05:38:30 1hJ8ju-0002XH-OH SMTP connection from \(blade.bookholics.icu\) \[93.115.250.26\]:37150 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 04:02:13

最近上报的IP列表

104.20.45.212 104.20.46.248 104.20.44.91 104.20.48.173
104.20.47.173 104.20.49.121 104.20.47.248 104.20.49.59
104.18.180.69 104.20.46.187 104.20.5.238 104.20.48.65
104.20.46.169 104.20.5.29 104.20.5.3 104.20.50.100
104.20.50.59 104.18.180.71 104.20.51.121 104.20.5.119