必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.40.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27738
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.40.169.			IN	A

;; AUTHORITY SECTION:
.			227	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:34:29 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 169.40.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.40.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.215.6.11 attackbots
Oct  7 04:08:40 web9 sshd\[27387\]: Invalid user Debian@2020 from 62.215.6.11
Oct  7 04:08:40 web9 sshd\[27387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.215.6.11
Oct  7 04:08:42 web9 sshd\[27387\]: Failed password for invalid user Debian@2020 from 62.215.6.11 port 32895 ssh2
Oct  7 04:13:28 web9 sshd\[28095\]: Invalid user Baiser2017 from 62.215.6.11
Oct  7 04:13:28 web9 sshd\[28095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.215.6.11
2019-10-07 22:21:27
175.107.221.136 attackspam
Automatic report - XMLRPC Attack
2019-10-07 22:25:17
65.151.157.14 attackspam
Oct  7 16:36:31 core sshd[3454]: Invalid user Aero2017 from 65.151.157.14 port 40598
Oct  7 16:36:33 core sshd[3454]: Failed password for invalid user Aero2017 from 65.151.157.14 port 40598 ssh2
...
2019-10-07 22:42:19
94.125.61.195 attackspam
Oct  7 15:43:25 h2177944 kernel: \[3331908.872581\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=94.125.61.195 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=64 ID=37360 DF PROTO=TCP SPT=50667 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  7 15:44:55 h2177944 kernel: \[3331998.276686\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=94.125.61.195 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=75 ID=55753 DF PROTO=TCP SPT=65430 DPT=993 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  7 15:51:54 h2177944 kernel: \[3332417.342618\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=94.125.61.195 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=67 ID=30246 DF PROTO=TCP SPT=52349 DPT=80 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  7 15:52:25 h2177944 kernel: \[3332448.250918\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=94.125.61.195 DST=85.214.117.9 LEN=40 TOS=0x08 PREC=0x20 TTL=81 ID=51791 DF PROTO=TCP SPT=53877 DPT=143 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  7 16:00:07 h2177944 kernel: \[3332910.305897\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=94.125.61.195 DST=85.214
2019-10-07 22:39:13
78.22.89.35 attackspambots
$f2bV_matches
2019-10-07 22:23:51
78.173.33.142 attackbotsspam
WordPress wp-login brute force :: 78.173.33.142 0.200 BYPASS [07/Oct/2019:22:45:27  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-07 22:20:09
183.80.75.247 attackspam
Unauthorised access (Oct  7) SRC=183.80.75.247 LEN=40 TTL=48 ID=62294 TCP DPT=8080 WINDOW=19710 SYN 
Unauthorised access (Oct  7) SRC=183.80.75.247 LEN=40 TTL=48 ID=56945 TCP DPT=8080 WINDOW=5806 SYN 
Unauthorised access (Oct  7) SRC=183.80.75.247 LEN=40 TTL=48 ID=28771 TCP DPT=8080 WINDOW=19710 SYN 
Unauthorised access (Oct  6) SRC=183.80.75.247 LEN=40 TTL=48 ID=11692 TCP DPT=8080 WINDOW=5806 SYN 
Unauthorised access (Oct  6) SRC=183.80.75.247 LEN=40 TTL=48 ID=52379 TCP DPT=8080 WINDOW=19710 SYN 
Unauthorised access (Oct  6) SRC=183.80.75.247 LEN=40 TTL=48 ID=23242 TCP DPT=8080 WINDOW=5806 SYN
2019-10-07 22:37:54
51.68.44.158 attackspambots
2019-10-07T13:56:34.081013shield sshd\[4900\]: Invalid user 123Party from 51.68.44.158 port 49962
2019-10-07T13:56:34.085514shield sshd\[4900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.ip-51-68-44.eu
2019-10-07T13:56:35.324961shield sshd\[4900\]: Failed password for invalid user 123Party from 51.68.44.158 port 49962 ssh2
2019-10-07T14:00:33.558521shield sshd\[5337\]: Invalid user Marcos@321 from 51.68.44.158 port 33246
2019-10-07T14:00:33.562953shield sshd\[5337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.ip-51-68-44.eu
2019-10-07 22:09:31
222.186.175.154 attackspam
Oct  7 09:44:50 xentho sshd[25514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Oct  7 09:44:52 xentho sshd[25514]: Failed password for root from 222.186.175.154 port 37914 ssh2
Oct  7 09:44:56 xentho sshd[25514]: Failed password for root from 222.186.175.154 port 37914 ssh2
Oct  7 09:44:50 xentho sshd[25514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Oct  7 09:44:52 xentho sshd[25514]: Failed password for root from 222.186.175.154 port 37914 ssh2
Oct  7 09:44:56 xentho sshd[25514]: Failed password for root from 222.186.175.154 port 37914 ssh2
Oct  7 09:44:50 xentho sshd[25514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Oct  7 09:44:52 xentho sshd[25514]: Failed password for root from 222.186.175.154 port 37914 ssh2
Oct  7 09:44:56 xentho sshd[25514]: Failed password for r
...
2019-10-07 22:08:12
111.222.156.66 attackspam
Unauthorised access (Oct  7) SRC=111.222.156.66 LEN=40 TTL=42 ID=64485 TCP DPT=8080 WINDOW=37920 SYN 
Unauthorised access (Oct  7) SRC=111.222.156.66 LEN=40 TTL=42 ID=22839 TCP DPT=8080 WINDOW=25032 SYN 
Unauthorised access (Oct  7) SRC=111.222.156.66 LEN=40 TTL=42 ID=61148 TCP DPT=8080 WINDOW=53608 SYN
2019-10-07 22:15:37
93.86.232.93 attackspam
$f2bV_matches
2019-10-07 22:32:22
218.250.165.163 attackspam
Connection by 218.250.165.163 on port: 23 got caught by honeypot at 10/7/2019 4:45:17 AM
2019-10-07 22:29:31
218.92.0.137 attack
Oct 07 06:27:24 askasleikir sshd[239068]: Failed password for root from 218.92.0.137 port 22936 ssh2
Oct 07 06:18:26 askasleikir sshd[238766]: Failed password for root from 218.92.0.137 port 24074 ssh2
Oct 07 06:16:36 askasleikir sshd[238689]: Failed password for root from 218.92.0.137 port 12244 ssh2
2019-10-07 22:36:32
187.178.157.135 attackspam
Automatic report - Port Scan Attack
2019-10-07 22:21:48
54.37.69.113 attackspam
Oct  7 11:45:33 work-partkepr sshd\[29198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.69.113  user=root
Oct  7 11:45:34 work-partkepr sshd\[29198\]: Failed password for root from 54.37.69.113 port 37216 ssh2
...
2019-10-07 22:17:10

最近上报的IP列表

104.22.40.165 104.22.40.170 104.22.40.166 104.22.40.171
104.22.40.172 104.22.40.174 104.22.40.187 104.22.40.185
104.22.40.188 104.22.40.194 104.22.40.196 104.22.40.201
104.22.40.211 104.22.40.220 104.22.40.209 104.22.40.232
104.22.40.230 104.22.40.241 104.22.40.246 104.22.40.69