必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.47.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.47.249.			IN	A

;; AUTHORITY SECTION:
.			398	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:07:39 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 249.47.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.47.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.252.17.17 attackspam
Attempts to probe for or exploit a Drupal site on url: /data/admin/ver.txt. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-08-12 15:08:20
223.240.211.139 attack
Aug 12 04:37:06 localhost postfix/smtpd\[23705\]: warning: unknown\[223.240.211.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 04:37:13 localhost postfix/smtpd\[23705\]: warning: unknown\[223.240.211.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 04:37:24 localhost postfix/smtpd\[23705\]: warning: unknown\[223.240.211.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 04:37:50 localhost postfix/smtpd\[23705\]: warning: unknown\[223.240.211.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 04:37:57 localhost postfix/smtpd\[23705\]: warning: unknown\[223.240.211.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-12 15:30:25
144.76.185.113 attackbotsspam
144.76.185.113 - - [12/Aug/2019:04:38:05 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
144.76.185.113 - - [12/Aug/2019:04:38:05 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
144.76.185.113 - - [12/Aug/2019:04:38:05 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
144.76.185.113 - - [12/Aug/2019:04:38:05 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
144.76.185.113 - - [12/Aug/2019:04:38:05 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
144.76.185.113 - - [12/Aug/2019:04:38:06 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-08-12 15:27:54
182.114.242.28 attackbotsspam
Automatic report - Port Scan Attack
2019-08-12 14:45:16
134.175.141.166 attackspambots
$f2bV_matches
2019-08-12 15:31:26
47.61.89.83 attackbotsspam
Aug 12 04:37:55 srv206 sshd[23071]: Invalid user admin from 47.61.89.83
Aug 12 04:37:55 srv206 sshd[23071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.61.89.83
Aug 12 04:37:55 srv206 sshd[23071]: Invalid user admin from 47.61.89.83
Aug 12 04:37:57 srv206 sshd[23071]: Failed password for invalid user admin from 47.61.89.83 port 54422 ssh2
...
2019-08-12 15:31:50
79.122.234.6 attackspam
[portscan] Port scan
2019-08-12 15:34:46
59.188.250.56 attack
Aug 12 08:19:41 dedicated sshd[31687]: Invalid user erpnext from 59.188.250.56 port 55106
2019-08-12 14:39:49
116.196.82.50 attackspam
Aug 12 07:59:25 microserver sshd[23023]: Invalid user cal from 116.196.82.50 port 35590
Aug 12 07:59:25 microserver sshd[23023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.82.50
Aug 12 07:59:27 microserver sshd[23023]: Failed password for invalid user cal from 116.196.82.50 port 35590 ssh2
Aug 12 08:03:01 microserver sshd[23597]: Invalid user ftptest from 116.196.82.50 port 40102
Aug 12 08:03:01 microserver sshd[23597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.82.50
Aug 12 08:13:18 microserver sshd[24928]: Invalid user nn from 116.196.82.50 port 52694
Aug 12 08:13:18 microserver sshd[24928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.82.50
Aug 12 08:13:20 microserver sshd[24928]: Failed password for invalid user nn from 116.196.82.50 port 52694 ssh2
Aug 12 08:16:56 microserver sshd[25481]: Invalid user roberta from 116.196.82.50 port 56966
Aug 12 08:1
2019-08-12 15:13:28
62.102.148.68 attack
Aug 12 09:38:43 mail sshd[11973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.102.148.68  user=root
Aug 12 09:38:45 mail sshd[11973]: Failed password for root from 62.102.148.68 port 49114 ssh2
...
2019-08-12 15:44:27
106.13.33.181 attack
Automatic report - Banned IP Access
2019-08-12 15:26:50
141.98.9.130 attackspambots
Aug 12 08:45:44 relay postfix/smtpd\[23387\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:46:17 relay postfix/smtpd\[12613\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:46:58 relay postfix/smtpd\[18244\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:47:26 relay postfix/smtpd\[22651\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:48:14 relay postfix/smtpd\[18244\]: warning: unknown\[141.98.9.130\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-12 14:56:03
190.247.86.220 attackspam
Looking for resource vulnerabilities
2019-08-12 14:41:06
104.236.252.162 attackspambots
Aug 12 06:43:11 MK-Soft-Root1 sshd\[16875\]: Invalid user maie from 104.236.252.162 port 59738
Aug 12 06:43:11 MK-Soft-Root1 sshd\[16875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.252.162
Aug 12 06:43:12 MK-Soft-Root1 sshd\[16875\]: Failed password for invalid user maie from 104.236.252.162 port 59738 ssh2
...
2019-08-12 14:52:11
45.227.253.216 attackbots
Aug 12 08:45:21 relay postfix/smtpd\[22651\]: warning: unknown\[45.227.253.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:45:28 relay postfix/smtpd\[21731\]: warning: unknown\[45.227.253.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:50:42 relay postfix/smtpd\[19648\]: warning: unknown\[45.227.253.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:50:49 relay postfix/smtpd\[24817\]: warning: unknown\[45.227.253.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:51:12 relay postfix/smtpd\[19648\]: warning: unknown\[45.227.253.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-12 14:57:55

最近上报的IP列表

104.22.48.97 104.22.48.150 104.22.66.159 104.22.66.132
104.22.67.132 104.22.67.152 104.22.66.244 104.22.67.159
104.22.66.152 104.221.131.22 104.221.131.24 104.221.132.114
104.221.132.120 104.221.131.26 104.221.131.28 104.221.132.122
104.221.132.116 104.221.132.118 104.221.132.124 104.221.131.30