必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.13.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.13.194.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:24:53 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 194.13.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.13.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
95.170.118.79 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-11-25 17:54:48
181.65.164.179 attackspam
SSH/22 MH Probe, BF, Hack -
2019-11-25 17:23:55
193.194.91.198 attack
Nov 25 09:00:26 ms-srv sshd[29889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.194.91.198
Nov 25 09:00:27 ms-srv sshd[29889]: Failed password for invalid user graham from 193.194.91.198 port 36700 ssh2
2019-11-25 17:53:37
123.146.140.87 attackbotsspam
123.146.140.87 was recorded 5 times by 2 hosts attempting to connect to the following ports: 23. Incident counter (4h, 24h, all-time): 5, 29, 587
2019-11-25 17:31:39
200.195.72.146 attackbotsspam
Nov 25 15:02:40 areeb-Workstation sshd[779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.195.72.146
Nov 25 15:02:42 areeb-Workstation sshd[779]: Failed password for invalid user ubnt from 200.195.72.146 port 60883 ssh2
...
2019-11-25 17:40:30
69.94.131.69 attack
Nov 25 07:13:56 h2421860 postfix/postscreen[9602]: CONNECT from [69.94.131.69]:51580 to [85.214.119.52]:25
Nov 25 07:13:56 h2421860 postfix/dnsblog[9605]: addr 69.94.131.69 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 25 07:13:56 h2421860 postfix/dnsblog[9604]: addr 69.94.131.69 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 25 07:13:56 h2421860 postfix/dnsblog[9607]: addr 69.94.131.69 listed by domain bl.mailspike.net as 127.0.0.10
Nov 25 07:13:56 h2421860 postfix/dnsblog[9605]: addr 69.94.131.69 listed by domain Unknown.trblspam.com as 185.53.179.7
Nov 25 07:13:56 h2421860 postfix/dnsblog[9606]: addr 69.94.131.69 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 25 07:14:02 h2421860 postfix/postscreen[9602]: DNSBL rank 10 for [69.94.131.69]:51580
Nov x@x
Nov 25 07:14:02 h2421860 postfix/postscreen[9602]: DISCONNECT [69.94.131.69]:51580


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=69.94.131.69
2019-11-25 17:51:16
178.252.147.76 attack
Nov 25 07:49:09 vps666546 sshd\[13316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.252.147.76  user=root
Nov 25 07:49:11 vps666546 sshd\[13316\]: Failed password for root from 178.252.147.76 port 50834 ssh2
Nov 25 07:56:31 vps666546 sshd\[13571\]: Invalid user km999 from 178.252.147.76 port 63786
Nov 25 07:56:31 vps666546 sshd\[13571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.252.147.76
Nov 25 07:56:33 vps666546 sshd\[13571\]: Failed password for invalid user km999 from 178.252.147.76 port 63786 ssh2
...
2019-11-25 17:50:32
159.203.197.8 attackspambots
159.203.197.8 was recorded 5 times by 5 hosts attempting to connect to the following ports: 5351. Incident counter (4h, 24h, all-time): 5, 17, 184
2019-11-25 17:18:34
192.99.28.247 attackbots
F2B jail: sshd. Time: 2019-11-25 10:30:34, Reported by: VKReport
2019-11-25 17:48:40
58.232.173.87 attackbots
58.232.173.87 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 17:37:27
122.51.114.28 attack
11/25/2019-02:53:13.712330 122.51.114.28 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-25 17:32:09
210.18.160.253 attackbotsspam
Port Scan 1433
2019-11-25 17:30:57
132.232.52.48 attack
Nov 25 10:32:34 MK-Soft-VM4 sshd[19968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.52.48 
Nov 25 10:32:36 MK-Soft-VM4 sshd[19968]: Failed password for invalid user kensey from 132.232.52.48 port 42776 ssh2
...
2019-11-25 17:36:31
5.35.213.20 attackspambots
Port 22 Scan, PTR: None
2019-11-25 17:42:24
80.241.221.145 attackspam
2019-11-25T09:36:40.234439abusebot-8.cloudsearch.cf sshd\[26069\]: Invalid user bot from 80.241.221.145 port 34280
2019-11-25 17:45:38

最近上报的IP列表

104.22.13.178 104.22.13.195 104.22.13.171 104.22.13.181
104.22.13.176 104.22.13.190 104.22.13.2 104.22.13.220
104.22.13.226 104.22.13.216 104.22.13.231 104.22.13.242
104.22.13.233 104.22.13.217 104.22.13.225 104.22.13.243
104.22.13.228 104.22.13.246 104.22.13.28 104.22.13.29