必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.22.55.74 attack
test
2023-11-03 07:27:36
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.55.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8805
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.55.169.			IN	A

;; AUTHORITY SECTION:
.			524	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:47:25 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 169.55.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.55.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.28.107.235 attack
Autoban   81.28.107.235 AUTH/CONNECT
2019-10-10 16:05:46
82.221.131.71 attackbots
Oct 10 07:23:44 rotator sshd\[20971\]: Failed password for root from 82.221.131.71 port 40507 ssh2Oct 10 07:23:47 rotator sshd\[20971\]: Failed password for root from 82.221.131.71 port 40507 ssh2Oct 10 07:23:49 rotator sshd\[20971\]: Failed password for root from 82.221.131.71 port 40507 ssh2Oct 10 07:23:52 rotator sshd\[20971\]: Failed password for root from 82.221.131.71 port 40507 ssh2Oct 10 07:23:54 rotator sshd\[20971\]: Failed password for root from 82.221.131.71 port 40507 ssh2Oct 10 07:23:56 rotator sshd\[20971\]: Failed password for root from 82.221.131.71 port 40507 ssh2
...
2019-10-10 16:13:18
120.52.152.18 attack
UTC: 2019-10-09 pkts: 2
ports(tcp): 11, 119
2019-10-10 16:23:25
80.47.49.99 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/80.47.49.99/ 
 GB - 1H : (75)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GB 
 NAME ASN : ASN9105 
 
 IP : 80.47.49.99 
 
 CIDR : 80.40.0.0/13 
 
 PREFIX COUNT : 42 
 
 UNIQUE IP COUNT : 3022848 
 
 
 WYKRYTE ATAKI Z ASN9105 :  
  1H - 2 
  3H - 3 
  6H - 5 
 12H - 6 
 24H - 11 
 
 DateTime : 2019-10-10 05:49:16 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-10 16:15:55
106.12.205.227 attackspam
Oct  6 19:56:32 xxx sshd[15031]: Failed password for r.r from 106.12.205.227 port 36062 ssh2
Oct  6 19:56:33 xxx sshd[15031]: Received disconnect from 106.12.205.227 port 36062:11: Bye Bye [preauth]
Oct  6 19:56:33 xxx sshd[15031]: Disconnected from 106.12.205.227 port 36062 [preauth]
Oct  6 20:38:12 xxx sshd[29341]: Failed password for r.r from 106.12.205.227 port 58416 ssh2
Oct  6 20:38:12 xxx sshd[29341]: Received disconnect from 106.12.205.227 port 58416:11: Bye Bye [preauth]
Oct  6 20:38:12 xxx sshd[29341]: Disconnected from 106.12.205.227 port 58416 [preauth]
Oct  6 20:41:34 xxx sshd[30383]: Failed password for r.r from 106.12.205.227 port 59444 ssh2
Oct  6 20:41:34 xxx sshd[30383]: Received disconnect from 106.12.205.227 port 59444:11: Bye Bye [preauth]
Oct  6 20:41:34 xxx sshd[30383]: Disconnected from 106.12.205.227 port 59444 [preauth]
Oct  6 22:23:08 xxx sshd[28173]: Failed password for r.r from 106.12.205.227 port 33968 ssh2
Oct  6 22:23:08 xxx sshd[28173]: ........
-------------------------------
2019-10-10 16:19:29
51.38.237.214 attack
SSH Brute-Forcing (ownc)
2019-10-10 16:20:13
95.170.205.151 attackspam
Oct 10 07:51:10 web8 sshd\[21222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.170.205.151  user=root
Oct 10 07:51:12 web8 sshd\[21222\]: Failed password for root from 95.170.205.151 port 39136 ssh2
Oct 10 07:55:32 web8 sshd\[23346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.170.205.151  user=root
Oct 10 07:55:34 web8 sshd\[23346\]: Failed password for root from 95.170.205.151 port 59253 ssh2
Oct 10 07:59:47 web8 sshd\[25359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.170.205.151  user=root
2019-10-10 16:04:27
106.12.91.209 attackbots
Oct  7 04:39:53 nxxxxxxx sshd[2874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.91.209  user=r.r
Oct  7 04:39:56 nxxxxxxx sshd[2874]: Failed password for r.r from 106.12.91.209 port 55360 ssh2
Oct  7 04:39:56 nxxxxxxx sshd[2874]: Received disconnect from 106.12.91.209: 11: Bye Bye [preauth]
Oct  7 04:56:52 nxxxxxxx sshd[4522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.91.209  user=r.r
Oct  7 04:56:54 nxxxxxxx sshd[4522]: Failed password for r.r from 106.12.91.209 port 55726 ssh2
Oct  7 04:56:56 nxxxxxxx sshd[4522]: Received disconnect from 106.12.91.209: 11: Bye Bye [preauth]
Oct  7 05:01:30 nxxxxxxx sshd[4870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.91.209  user=r.r
Oct  7 05:01:32 nxxxxxxx sshd[4870]: Failed pas
.... truncated .... 

Oct  7 04:39:53 nxxxxxxx sshd[2874]: pam_unix(sshd:auth): authentication fail........
-------------------------------
2019-10-10 16:25:22
157.230.133.15 attackbotsspam
Oct  8 15:27:21 toyboy sshd[15775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.133.15  user=r.r
Oct  8 15:27:24 toyboy sshd[15775]: Failed password for r.r from 157.230.133.15 port 47340 ssh2
Oct  8 15:27:24 toyboy sshd[15775]: Received disconnect from 157.230.133.15: 11: Bye Bye [preauth]
Oct  8 15:46:47 toyboy sshd[16733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.133.15  user=r.r
Oct  8 15:46:49 toyboy sshd[16733]: Failed password for r.r from 157.230.133.15 port 40840 ssh2
Oct  8 15:46:49 toyboy sshd[16733]: Received disconnect from 157.230.133.15: 11: Bye Bye [preauth]
Oct  8 15:51:49 toyboy sshd[17030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.133.15  user=r.r
Oct  8 15:51:51 toyboy sshd[17030]: Failed password for r.r from 157.230.133.15 port 52410 ssh2
Oct  8 15:51:51 toyboy sshd[17030]: Received discon........
-------------------------------
2019-10-10 16:10:59
183.102.114.59 attackbotsspam
Oct 10 09:22:13 vpn01 sshd[2675]: Failed password for root from 183.102.114.59 port 39672 ssh2
...
2019-10-10 16:32:04
113.141.70.199 attackbots
$f2bV_matches
2019-10-10 16:37:24
45.40.192.118 attackbots
Oct  9 21:19:35 php1 sshd\[27877\]: Invalid user bodiesel from 45.40.192.118
Oct  9 21:19:35 php1 sshd\[27877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.192.118
Oct  9 21:19:37 php1 sshd\[27877\]: Failed password for invalid user bodiesel from 45.40.192.118 port 60708 ssh2
Oct  9 21:24:01 php1 sshd\[28241\]: Invalid user hiwi from 45.40.192.118
Oct  9 21:24:01 php1 sshd\[28241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.192.118
2019-10-10 16:08:14
219.240.49.50 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-10-10 16:07:13
83.15.183.137 attack
Oct 10 07:45:45 venus sshd\[14994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.15.183.137  user=root
Oct 10 07:45:47 venus sshd\[14994\]: Failed password for root from 83.15.183.137 port 41683 ssh2
Oct 10 07:50:48 venus sshd\[15070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.15.183.137  user=root
...
2019-10-10 16:03:55
112.6.231.114 attackspambots
Oct 10 03:02:54 plusreed sshd[20000]: Invalid user Low@123 from 112.6.231.114
...
2019-10-10 15:58:26

最近上报的IP列表

104.22.55.173 104.22.55.208 104.22.55.74 104.22.55.244
104.22.55.76 104.22.56.102 104.22.55.228 104.22.55.239
104.22.55.235 104.22.56.107 49.245.234.47 104.22.8.13
104.22.8.189 130.165.27.183 104.22.73.74 104.22.8.225
104.22.8.213 104.22.8.156 104.22.75.245 104.22.8.150