必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.45.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.45.81.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:36:01 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 81.45.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 81.45.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
223.229.172.137 attackspam
1594384516 - 07/10/2020 14:35:16 Host: 223.229.172.137/223.229.172.137 Port: 445 TCP Blocked
2020-07-10 21:34:31
112.121.153.187 attackbots
IP 112.121.153.187 attacked honeypot on port: 80 at 7/10/2020 5:35:13 AM
2020-07-10 21:09:25
183.109.124.137 attackspam
Multiple SSH authentication failures from 183.109.124.137
2020-07-10 21:42:41
45.132.129.177 attackbots
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:55:40
61.177.172.61 attackspam
Jul 10 13:21:58 game-panel sshd[17967]: Failed password for root from 61.177.172.61 port 1744 ssh2
Jul 10 13:22:02 game-panel sshd[17967]: Failed password for root from 61.177.172.61 port 1744 ssh2
Jul 10 13:22:11 game-panel sshd[17967]: error: maximum authentication attempts exceeded for root from 61.177.172.61 port 1744 ssh2 [preauth]
2020-07-10 21:25:49
45.132.128.221 attackbots
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:59:13
45.132.129.151 attackbots
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:57:55
112.85.42.174 attack
2020-07-10T16:05:59.214971afi-git.jinr.ru sshd[10305]: Failed password for root from 112.85.42.174 port 53954 ssh2
2020-07-10T16:06:02.563980afi-git.jinr.ru sshd[10305]: Failed password for root from 112.85.42.174 port 53954 ssh2
2020-07-10T16:06:05.671254afi-git.jinr.ru sshd[10305]: Failed password for root from 112.85.42.174 port 53954 ssh2
2020-07-10T16:06:05.671391afi-git.jinr.ru sshd[10305]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 53954 ssh2 [preauth]
2020-07-10T16:06:05.671406afi-git.jinr.ru sshd[10305]: Disconnecting: Too many authentication failures [preauth]
...
2020-07-10 21:10:51
222.190.130.62 attackbotsspam
Jul 10 14:29:08 vps sshd[139552]: Failed password for invalid user kimberleigh from 222.190.130.62 port 59190 ssh2
Jul 10 14:32:04 vps sshd[155647]: Invalid user baerbel from 222.190.130.62 port 35654
Jul 10 14:32:04 vps sshd[155647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.190.130.62
Jul 10 14:32:06 vps sshd[155647]: Failed password for invalid user baerbel from 222.190.130.62 port 35654 ssh2
Jul 10 14:35:08 vps sshd[171513]: Invalid user jianghh from 222.190.130.62 port 40350
...
2020-07-10 21:41:46
139.155.93.180 attackspambots
Jul 10 08:35:29 lanister sshd[19858]: Invalid user 22 from 139.155.93.180
Jul 10 08:35:29 lanister sshd[19858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.93.180
Jul 10 08:35:29 lanister sshd[19858]: Invalid user 22 from 139.155.93.180
Jul 10 08:35:32 lanister sshd[19858]: Failed password for invalid user 22 from 139.155.93.180 port 59264 ssh2
2020-07-10 21:13:38
222.186.171.247 attackspam
Jul 10 13:00:12 rush sshd[14703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.171.247
Jul 10 13:00:15 rush sshd[14703]: Failed password for invalid user css from 222.186.171.247 port 38036 ssh2
Jul 10 13:10:12 rush sshd[14959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.171.247
...
2020-07-10 21:25:11
45.138.147.108 attackspam
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:53:30
202.62.224.61 attackspam
Jul 10 15:06:36 srv-ubuntu-dev3 sshd[77199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.62.224.61  user=mail
Jul 10 15:06:38 srv-ubuntu-dev3 sshd[77199]: Failed password for mail from 202.62.224.61 port 42992 ssh2
Jul 10 15:10:26 srv-ubuntu-dev3 sshd[77808]: Invalid user office from 202.62.224.61
Jul 10 15:10:26 srv-ubuntu-dev3 sshd[77808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.62.224.61
Jul 10 15:10:26 srv-ubuntu-dev3 sshd[77808]: Invalid user office from 202.62.224.61
Jul 10 15:10:28 srv-ubuntu-dev3 sshd[77808]: Failed password for invalid user office from 202.62.224.61 port 55444 ssh2
Jul 10 15:14:25 srv-ubuntu-dev3 sshd[78410]: Invalid user dust from 202.62.224.61
Jul 10 15:14:25 srv-ubuntu-dev3 sshd[78410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.62.224.61
Jul 10 15:14:25 srv-ubuntu-dev3 sshd[78410]: Invalid user dust from 202.6
...
2020-07-10 21:18:53
45.132.129.219 attackspambots
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:55:21
45.132.129.171 attackbotsspam
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:57:26

最近上报的IP列表

104.22.46.116 104.22.46.104 104.22.45.80 104.22.45.78
104.22.46.127 104.22.46.130 104.22.46.136 104.22.46.144
104.22.46.146 104.22.46.151 104.22.46.152 104.22.46.139
104.22.46.147 104.22.46.132 104.22.46.145 104.22.46.168
104.22.46.148 104.22.46.170 104.22.46.188 104.22.46.200