必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.52.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4984
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.52.70.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:38:29 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 70.52.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.52.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.140.161.107 attackspambots
Unauthorized connection attempt detected from IP address 185.140.161.107 to port 80 [T]
2020-08-10 19:52:32
118.69.173.199 attackbotsspam
118.69.173.199 - - [10/Aug/2020:11:07:21 +0100] "POST /wp-login.php HTTP/1.1" 200 2017 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.69.173.199 - - [10/Aug/2020:11:07:24 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.69.173.199 - - [10/Aug/2020:11:07:25 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-10 19:15:46
140.143.5.72 attackspambots
Aug 10 13:56:03 itv-usvr-01 sshd[5606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.5.72  user=root
Aug 10 13:56:04 itv-usvr-01 sshd[5606]: Failed password for root from 140.143.5.72 port 54390 ssh2
Aug 10 14:00:37 itv-usvr-01 sshd[5787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.5.72  user=root
Aug 10 14:00:39 itv-usvr-01 sshd[5787]: Failed password for root from 140.143.5.72 port 49780 ssh2
Aug 10 14:05:06 itv-usvr-01 sshd[5968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.5.72  user=root
Aug 10 14:05:08 itv-usvr-01 sshd[5968]: Failed password for root from 140.143.5.72 port 45170 ssh2
2020-08-10 19:36:35
106.53.125.253 attack
2020-08-10T12:45:35.279799centos sshd[27538]: Failed password for root from 106.53.125.253 port 40356 ssh2
2020-08-10T12:48:16.025365centos sshd[27993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.125.253  user=root
2020-08-10T12:48:18.186970centos sshd[27993]: Failed password for root from 106.53.125.253 port 49702 ssh2
...
2020-08-10 19:27:56
139.199.23.233 attackbotsspam
Aug 10 11:13:45 vm0 sshd[15252]: Failed password for root from 139.199.23.233 port 42618 ssh2
...
2020-08-10 19:21:50
67.255.103.243 attack
23/tcp
[2020-08-10]1pkt
2020-08-10 19:23:20
138.68.226.234 attack
2020-08-10T14:01:09.372605hostname sshd[2181]: Failed password for root from 138.68.226.234 port 32918 ssh2
2020-08-10T14:04:54.403426hostname sshd[3376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.226.234  user=root
2020-08-10T14:04:56.376749hostname sshd[3376]: Failed password for root from 138.68.226.234 port 43160 ssh2
...
2020-08-10 19:35:26
45.129.33.13 attackspambots
[H1] Blocked by UFW
2020-08-10 19:28:26
147.30.14.184 attack
 TCP (SYN) 147.30.14.184:62343 -> port 23, len 40
2020-08-10 19:56:21
128.72.31.28 attackspam
$f2bV_matches
2020-08-10 19:32:49
195.72.233.94 attackspambots
Unauthorized connection attempt detected from IP address 195.72.233.94 to port 445 [T]
2020-08-10 19:39:24
177.124.40.7 attackspambots
 TCP (SYN) 177.124.40.7:53047 -> port 1433, len 40
2020-08-10 19:41:00
134.209.63.140 attackbotsspam
TCP ports : 8312 / 29972
2020-08-10 19:43:56
185.89.45.198 attack
Brute forcing RDP port 3389
2020-08-10 19:33:58
203.113.103.10 attackbotsspam
Unauthorized connection attempt detected from IP address 203.113.103.10 to port 445 [T]
2020-08-10 19:38:46

最近上报的IP列表

104.22.52.69 104.22.52.76 104.22.52.83 104.22.52.71
104.22.52.91 104.22.52.94 104.22.52.98 104.22.53.100
104.22.53.101 104.22.53.109 104.22.53.104 104.22.53.106
104.22.53.105 104.22.53.102 104.22.53.131 104.22.53.111
104.22.53.150 104.22.53.152 104.22.53.141 104.22.53.153