必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.21.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50415
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.21.148.			IN	A

;; AUTHORITY SECTION:
.			307	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022202 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 13:00:31 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 148.21.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.21.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.175.93.3 attackbotsspam
Dec 10 08:54:50 debian-2gb-vpn-nbg1-1 kernel: [335675.826037] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.3 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=46295 PROTO=TCP SPT=52577 DPT=3399 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-10 14:11:00
200.199.114.226 attack
T: f2b postfix aggressive 3x
2019-12-10 14:20:46
182.61.22.205 attackbots
Dec 10 07:24:15 eventyay sshd[8733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.22.205
Dec 10 07:24:16 eventyay sshd[8733]: Failed password for invalid user server from 182.61.22.205 port 54818 ssh2
Dec 10 07:31:57 eventyay sshd[8967]: Failed password for root from 182.61.22.205 port 60420 ssh2
...
2019-12-10 14:40:05
36.235.212.3 attackbotsspam
Honeypot attack, port: 23, PTR: 36-235-212-3.dynamic-ip.hinet.net.
2019-12-10 14:25:35
196.203.31.154 attack
IP attempted unauthorised action
2019-12-10 14:19:46
40.86.99.195 attackspam
Web App Attack
2019-12-10 14:56:07
18.216.162.100 attackspam
Forbidden directory scan :: 2019/12/10 06:31:52 [error] 40444#40444: *751765 access forbidden by rule, client: 18.216.162.100, server: [censored_2], request: "HEAD /~onixpw/cfg/AppleID.logln.myaccount.JAZ2834HQSD7Q7SD6Q6SD67QSD5Q7S6D6QSD76QSD67Q67D6QQSJDQLJF HTTP/1.1", host: "[censored_2]"
2019-12-10 14:57:14
138.197.78.121 attackspambots
2019-12-10T05:58:40.595632centos sshd\[18375\]: Invalid user backup from 138.197.78.121 port 42518
2019-12-10T05:58:40.600413centos sshd\[18375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.78.121
2019-12-10T05:58:42.613563centos sshd\[18375\]: Failed password for invalid user backup from 138.197.78.121 port 42518 ssh2
2019-12-10 14:07:08
207.154.211.36 attackbots
Dec 10 07:21:26 localhost sshd\[20944\]: Invalid user dacy from 207.154.211.36 port 38964
Dec 10 07:21:26 localhost sshd\[20944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.211.36
Dec 10 07:21:28 localhost sshd\[20944\]: Failed password for invalid user dacy from 207.154.211.36 port 38964 ssh2
2019-12-10 14:23:05
180.241.168.194 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-10 14:29:33
178.217.173.54 attackbotsspam
SSH brutforce
2019-12-10 14:15:49
218.92.0.202 attackspambots
2019-12-10T06:30:19.855760abusebot-4.cloudsearch.cf sshd\[27536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.202  user=root
2019-12-10 14:58:06
183.203.96.52 attack
Dec 10 07:03:30 * sshd[507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.203.96.52
Dec 10 07:03:32 * sshd[507]: Failed password for invalid user onyshko from 183.203.96.52 port 55928 ssh2
2019-12-10 14:09:39
118.89.62.112 attack
Dec 10 06:00:17 herz-der-gamer sshd[25718]: Invalid user lareta from 118.89.62.112 port 51564
Dec 10 06:00:17 herz-der-gamer sshd[25718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.62.112
Dec 10 06:00:17 herz-der-gamer sshd[25718]: Invalid user lareta from 118.89.62.112 port 51564
Dec 10 06:00:19 herz-der-gamer sshd[25718]: Failed password for invalid user lareta from 118.89.62.112 port 51564 ssh2
...
2019-12-10 14:10:05
117.73.9.42 attackspam
Brute force attempt
2019-12-10 14:51:20

最近上报的IP列表

104.22.23.138 104.22.22.250 104.22.23.159 104.22.22.174
104.22.23.104 104.22.30.58 104.22.36.177 104.22.37.177
104.22.3.185 104.22.26.12 104.22.5.6 104.22.49.151
104.22.49.64 104.22.49.79 104.22.5.42 104.22.5.77
104.22.50.160 104.22.49.184 104.22.5.207 104.22.50.180