必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.22.55.74 attack
test
2023-11-03 07:27:36
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.55.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.55.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 08 20:30:37 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
Host 106.55.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.55.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
71.19.250.131 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-11-30 18:35:14
124.239.196.154 attackbots
2019-11-30T10:19:04.828072abusebot-8.cloudsearch.cf sshd\[20928\]: Invalid user hat from 124.239.196.154 port 53800
2019-11-30 18:35:32
81.22.45.159 attackbots
11/30/2019-04:52:13.319557 81.22.45.159 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-30 18:27:13
171.229.27.121 attackbots
Brute force attempt
2019-11-30 18:35:52
218.92.0.145 attackspambots
Nov 30 11:09:57 h2177944 sshd\[3750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Nov 30 11:09:58 h2177944 sshd\[3750\]: Failed password for root from 218.92.0.145 port 58656 ssh2
Nov 30 11:10:02 h2177944 sshd\[3750\]: Failed password for root from 218.92.0.145 port 58656 ssh2
Nov 30 11:10:05 h2177944 sshd\[3750\]: Failed password for root from 218.92.0.145 port 58656 ssh2
...
2019-11-30 18:11:42
125.138.217.102 attack
" "
2019-11-30 18:05:14
49.150.106.77 attackbotsspam
11/30/2019-01:25:05.267044 49.150.106.77 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-30 18:22:28
118.238.4.201 attackbotsspam
fail2ban honeypot
2019-11-30 18:34:48
193.255.111.139 attackbots
Nov 29 20:37:01 tdfoods sshd\[17556\]: Invalid user mail123456788 from 193.255.111.139
Nov 29 20:37:01 tdfoods sshd\[17556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.255.111.139
Nov 29 20:37:04 tdfoods sshd\[17556\]: Failed password for invalid user mail123456788 from 193.255.111.139 port 55354 ssh2
Nov 29 20:40:50 tdfoods sshd\[17902\]: Invalid user rose1 from 193.255.111.139
Nov 29 20:40:50 tdfoods sshd\[17902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.255.111.139
2019-11-30 18:06:24
51.68.195.146 attackbots
Port scan on 1 port(s): 139
2019-11-30 18:33:40
159.203.201.225 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-30 18:13:37
147.50.3.30 attackspambots
Nov 30 10:16:27 vpn01 sshd[13927]: Failed password for root from 147.50.3.30 port 53211 ssh2
...
2019-11-30 18:12:22
213.149.135.29 attackbots
Invalid user admin from 213.149.135.29 port 8388
2019-11-30 18:03:40
91.137.140.242 attack
8291/tcp 8291/tcp 8291/tcp
[2019-11-30]3pkt
2019-11-30 18:36:10
124.156.117.111 attackspam
fail2ban
2019-11-30 18:18:05

最近上报的IP列表

145.82.64.78 31.13.115.0 147.131.144.144 32.146.44.133
18.77.10.250 230.37.252.0 140.42.163.80 126.219.3.155
239.252.237.128 129.181.149.191 82.249.23.14 75.249.173.36
88.71.132.58 129.11.225.251 9.9.152.239 43.53.82.253
133.134.193.183 9.89.202.195 187.129.106.164 98.100.7.253