必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.0.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.0.194.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:22:19 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 194.0.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.0.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.230.237.76 attackspam
Oct 12 16:29:27 vps01 sshd[12368]: Failed password for root from 157.230.237.76 port 45382 ssh2
2019-10-12 22:37:10
151.80.140.166 attackspam
Oct 12 04:29:48 friendsofhawaii sshd\[9492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dev.geronimo-dev.ovh  user=root
Oct 12 04:29:50 friendsofhawaii sshd\[9492\]: Failed password for root from 151.80.140.166 port 42866 ssh2
Oct 12 04:34:04 friendsofhawaii sshd\[9834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dev.geronimo-dev.ovh  user=root
Oct 12 04:34:06 friendsofhawaii sshd\[9834\]: Failed password for root from 151.80.140.166 port 54340 ssh2
Oct 12 04:38:29 friendsofhawaii sshd\[10213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dev.geronimo-dev.ovh  user=root
2019-10-12 22:41:03
123.30.236.149 attackspam
Oct 12 04:28:10 sachi sshd\[8458\]: Invalid user Comptable-123 from 123.30.236.149
Oct 12 04:28:10 sachi sshd\[8458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.236.149
Oct 12 04:28:12 sachi sshd\[8458\]: Failed password for invalid user Comptable-123 from 123.30.236.149 port 41656 ssh2
Oct 12 04:33:50 sachi sshd\[8955\]: Invalid user 123Mark from 123.30.236.149
Oct 12 04:33:50 sachi sshd\[8955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.236.149
2019-10-12 22:35:48
193.32.160.140 attack
2019-10-12 16:17:48 H=\(\[193.32.160.142\]\) \[193.32.160.140\] F=\ rejected RCPT \: Unrouteable address
2019-10-12 16:17:48 H=\(\[193.32.160.142\]\) \[193.32.160.140\] F=\ rejected RCPT \: Unrouteable address
2019-10-12 16:17:48 H=\(\[193.32.160.142\]\) \[193.32.160.140\] F=\ rejected RCPT \: Unrouteable address
2019-10-12 16:17:48 H=\(\[193.32.160.142\]\) \[193.32.160.140\] F=\ rejected RCPT \: Unrouteable address
2019-10-12 16:17:48 H=\(\[193.32.160.142\]\) \[193.32.160.140\] F=\ rejected RCPT \: Unrouteable address
2019-10-12 16:17:48 H=\(\[193.32.160.142\]\) \[193.32.160.140\] F=\ rejected RCPT \: Unrouteable address
2019-10-12 16:17:48 H=\(\[193.32.160.142\]\) \[193.32.160.140\] F=\ rejected RCPT \: Unrouteable address
2019-10-12 16
2019-10-12 22:22:35
122.131.6.204 attack
(Oct 12)  LEN=40 TTL=55 ID=22798 TCP DPT=8080 WINDOW=29353 SYN 
 (Oct 12)  LEN=40 TTL=55 ID=14949 TCP DPT=8080 WINDOW=29353 SYN 
 (Oct 11)  LEN=40 TTL=55 ID=39691 TCP DPT=8080 WINDOW=29353 SYN 
 (Oct 10)  LEN=40 TTL=55 ID=54636 TCP DPT=8080 WINDOW=29353 SYN 
 (Oct  9)  LEN=40 TTL=55 ID=14054 TCP DPT=8080 WINDOW=29353 SYN 
 (Oct  9)  LEN=40 TTL=55 ID=36035 TCP DPT=8080 WINDOW=29353 SYN 
 (Oct  8)  LEN=40 TTL=55 ID=58544 TCP DPT=8080 WINDOW=29353 SYN 
 (Oct  8)  LEN=40 TTL=55 ID=49395 TCP DPT=8080 WINDOW=29353 SYN 
 (Oct  7)  LEN=40 TTL=55 ID=40302 TCP DPT=8080 WINDOW=29353 SYN 
 (Oct  7)  LEN=40 TTL=55 ID=38391 TCP DPT=8080 WINDOW=29353 SYN 
 (Oct  7)  LEN=40 TTL=55 ID=22417 TCP DPT=8080 WINDOW=29353 SYN
2019-10-12 22:33:49
185.173.35.25 attackbots
" "
2019-10-12 22:49:18
117.62.22.209 attack
port scan and connect, tcp 80 (http)
2019-10-12 22:11:01
182.61.188.40 attackspam
Oct 12 16:31:17 OPSO sshd\[15646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.188.40  user=root
Oct 12 16:31:19 OPSO sshd\[15646\]: Failed password for root from 182.61.188.40 port 45338 ssh2
Oct 12 16:35:47 OPSO sshd\[16561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.188.40  user=root
Oct 12 16:35:50 OPSO sshd\[16561\]: Failed password for root from 182.61.188.40 port 57278 ssh2
Oct 12 16:40:17 OPSO sshd\[17304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.188.40  user=root
2019-10-12 22:44:29
183.131.82.99 attackspam
$f2bV_matches
2019-10-12 22:35:00
52.33.96.135 attackbots
10/12/2019-16:17:02.144326 52.33.96.135 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-12 22:55:31
62.165.235.38 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-10-12 22:19:56
212.47.235.193 attack
scan r
2019-10-12 22:57:12
36.37.115.106 attackbots
SSH/22 MH Probe, BF, Hack -
2019-10-12 22:38:08
211.75.136.208 attackbotsspam
2019-10-12T14:08:44.886655shield sshd\[6803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-75-136-208.hinet-ip.hinet.net  user=root
2019-10-12T14:08:46.744867shield sshd\[6803\]: Failed password for root from 211.75.136.208 port 29628 ssh2
2019-10-12T14:13:21.463845shield sshd\[7835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-75-136-208.hinet-ip.hinet.net  user=root
2019-10-12T14:13:23.683182shield sshd\[7835\]: Failed password for root from 211.75.136.208 port 9285 ssh2
2019-10-12T14:17:26.519293shield sshd\[8732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211-75-136-208.hinet-ip.hinet.net  user=root
2019-10-12 22:32:53
222.171.82.169 attackspam
Oct 12 04:31:00 friendsofhawaii sshd\[9581\]: Invalid user Sport2017 from 222.171.82.169
Oct 12 04:31:00 friendsofhawaii sshd\[9581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.171.82.169
Oct 12 04:31:02 friendsofhawaii sshd\[9581\]: Failed password for invalid user Sport2017 from 222.171.82.169 port 60114 ssh2
Oct 12 04:38:06 friendsofhawaii sshd\[10174\]: Invalid user PASSW0RD@2019 from 222.171.82.169
Oct 12 04:38:06 friendsofhawaii sshd\[10174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.171.82.169
2019-10-12 22:46:01

最近上报的IP列表

104.22.0.193 104.22.0.202 104.22.0.2 104.22.0.208
104.22.0.212 104.22.0.214 104.22.0.216 104.22.0.22
104.22.0.218 104.22.0.224 104.22.0.213 104.22.0.231
104.22.0.241 104.22.0.242 104.22.0.250 104.22.0.244
104.22.0.251 104.22.0.26 104.22.0.31 104.22.0.252