必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.45.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.45.254.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 295 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:36:00 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 254.45.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 254.45.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
41.232.149.241 attackspam
Port Scan detected!
...
2020-09-04 06:27:19
206.174.214.90 attackspambots
(sshd) Failed SSH login from 206.174.214.90 (CA/Canada/h206-174-214-90.bigpipeinc.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  3 19:05:10 amsweb01 sshd[10526]: Invalid user ali from 206.174.214.90 port 45304
Sep  3 19:05:11 amsweb01 sshd[10526]: Failed password for invalid user ali from 206.174.214.90 port 45304 ssh2
Sep  3 19:15:50 amsweb01 sshd[12896]: Invalid user hj from 206.174.214.90 port 41466
Sep  3 19:15:52 amsweb01 sshd[12896]: Failed password for invalid user hj from 206.174.214.90 port 41466 ssh2
Sep  3 19:19:41 amsweb01 sshd[13812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.174.214.90  user=root
2020-09-04 06:21:19
104.244.75.153 attackbotsspam
Unauthorized SSH login attempts
2020-09-04 06:49:39
222.147.137.182 attack
Attempted connection to port 23.
2020-09-04 06:37:42
192.241.222.97 attackspambots
Automatic report after SMTP connect attempts
2020-09-04 06:57:40
218.104.128.54 attack
Failed password for invalid user richard from 218.104.128.54 port 58488 ssh2
2020-09-04 06:50:11
40.113.145.175 attackspambots
(smtpauth) Failed SMTP AUTH login from 40.113.145.175 (NL/Netherlands/-): 5 in the last 3600 secs
2020-09-04 06:39:31
115.76.48.148 attack
Sep  3 18:48:34 mellenthin postfix/smtpd[20954]: NOQUEUE: reject: RCPT from unknown[115.76.48.148]: 554 5.7.1 Service unavailable; Client host [115.76.48.148] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/115.76.48.148; from= to= proto=ESMTP helo=
2020-09-04 06:49:27
180.97.31.28 attackspam
2020-09-03T19:44:11.042405lavrinenko.info sshd[23673]: Invalid user lau from 180.97.31.28 port 57572
2020-09-03T19:44:11.048141lavrinenko.info sshd[23673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.97.31.28
2020-09-03T19:44:11.042405lavrinenko.info sshd[23673]: Invalid user lau from 180.97.31.28 port 57572
2020-09-03T19:44:13.043394lavrinenko.info sshd[23673]: Failed password for invalid user lau from 180.97.31.28 port 57572 ssh2
2020-09-03T19:49:00.208859lavrinenko.info sshd[24000]: Invalid user eliane from 180.97.31.28 port 56526
...
2020-09-04 06:21:56
113.101.136.208 attackspam
Lines containing failures of 113.101.136.208
Sep  2 03:59:24 newdogma sshd[19477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.101.136.208  user=r.r
Sep  2 03:59:27 newdogma sshd[19477]: Failed password for r.r from 113.101.136.208 port 50422 ssh2
Sep  2 03:59:28 newdogma sshd[19477]: Received disconnect from 113.101.136.208 port 50422:11: Bye Bye [preauth]
Sep  2 03:59:28 newdogma sshd[19477]: Disconnected from authenticating user r.r 113.101.136.208 port 50422 [preauth]
Sep  2 04:12:38 newdogma sshd[22372]: Invalid user vbox from 113.101.136.208 port 46676
Sep  2 04:12:38 newdogma sshd[22372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.101.136.208 
Sep  2 04:12:40 newdogma sshd[22372]: Failed password for invalid user vbox from 113.101.136.208 port 46676 ssh2
Sep  2 04:12:43 newdogma sshd[22372]: Received disconnect from 113.101.136.208 port 46676:11: Bye Bye [preauth]
Sep ........
------------------------------
2020-09-04 06:48:45
150.109.61.134 attackspam
Sep  3 17:52:34 game-panel sshd[14641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.61.134
Sep  3 17:52:35 game-panel sshd[14641]: Failed password for invalid user zhangyong from 150.109.61.134 port 54224 ssh2
Sep  3 17:55:42 game-panel sshd[14732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.61.134
2020-09-04 06:57:57
85.62.1.30 attack
20/9/3@15:33:24: FAIL: Alarm-Network address from=85.62.1.30
20/9/3@15:33:24: FAIL: Alarm-Network address from=85.62.1.30
...
2020-09-04 06:44:05
54.209.204.136 attackspam
SMTP Screen: 54.209.204.136 (United States): tried sending to 6 unknown recipients
2020-09-04 06:46:23
5.187.188.116 attackspam
SSH Invalid Login
2020-09-04 06:35:31
129.250.206.86 attackspambots
 UDP 129.250.206.86:8920 -> port 53, len 75
2020-09-04 06:44:56

最近上报的IP列表

104.22.45.253 104.22.45.68 104.22.45.73 104.22.45.99
104.22.46.103 104.22.45.95 104.22.46.116 104.22.45.81
104.22.46.104 104.22.45.80 104.22.45.78 104.22.46.127
104.22.46.130 104.22.46.136 104.22.46.144 104.22.46.146
104.22.46.151 104.22.46.152 104.22.46.139 104.22.46.147