必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.6.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42656
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.6.242.			IN	A

;; AUTHORITY SECTION:
.			216	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 05:54:34 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 242.6.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.6.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.235.73.68 attack
ssh brute-force
2020-08-31 07:04:39
198.211.102.110 attack
198.211.102.110 - - [30/Aug/2020:23:54:03 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.211.102.110 - - [31/Aug/2020:00:10:04 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-31 07:03:55
165.16.77.71 attackspambots
1598819653 - 08/30/2020 22:34:13 Host: 165.16.77.71/165.16.77.71 Port: 445 TCP Blocked
2020-08-31 07:42:31
41.42.13.174 attackspambots
Aug 30 23:02:21 hell sshd[8575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.42.13.174
Aug 30 23:02:23 hell sshd[8575]: Failed password for invalid user testuser2 from 41.42.13.174 port 1408 ssh2
...
2020-08-31 07:27:29
13.234.110.156 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-31 07:41:43
222.186.31.166 attack
[SID1] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-31 07:22:08
93.99.50.30 attackspam
93.99.50.30 - - \[30/Aug/2020:23:32:55 +0300\] "POST /wordpress/xmlrpc.php HTTP/1.1" 200 426 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" "-"
93.99.50.30 - - \[30/Aug/2020:23:34:32 +0300\] "POST /wordpress/xmlrpc.php HTTP/1.1" 200 426 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" "-"
...
2020-08-31 07:34:14
195.54.160.183 attackspam
2020-08-30T16:46:55.830980correo.[domain] sshd[31259]: Invalid user admin from 195.54.160.183 port 30863 2020-08-30T16:46:58.129149correo.[domain] sshd[31259]: Failed password for invalid user admin from 195.54.160.183 port 30863 ssh2 2020-08-30T16:46:58.746743correo.[domain] sshd[31265]: Invalid user admin from 195.54.160.183 port 38857 ...
2020-08-31 07:05:22
194.26.29.95 attackbotsspam
Multiport scan : 65 ports scanned 3074 3076 3175 3202 3280 3315 3335 3460 3483 3506 3514 3538 3601 3630 3654 3681 3755 3767 3783 3798 3883 3890 3898 3918 3984 4065 4134 4137 4177 4187 4214 4220 4391 4469 4503 4518 4564 4610 4616 4624 4655 4713 4802 4837 4881 4897 4924 4993 5025 5078 5175 5239 5316 5343 5420 5498 5506 5516 5523 5586 5719 5860 5875 5944 5953
2020-08-31 07:35:41
134.175.121.80 attackbotsspam
Aug 30 22:45:17 django-0 sshd[14686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.121.80  user=root
Aug 30 22:45:20 django-0 sshd[14686]: Failed password for root from 134.175.121.80 port 39258 ssh2
...
2020-08-31 07:29:17
153.127.68.121 attackbotsspam
Aug 31 01:11:08 prod4 sshd\[2605\]: Failed password for root from 153.127.68.121 port 54360 ssh2
Aug 31 01:11:13 prod4 sshd\[2618\]: Failed password for root from 153.127.68.121 port 60134 ssh2
Aug 31 01:11:17 prod4 sshd\[2632\]: Failed password for root from 153.127.68.121 port 39672 ssh2
...
2020-08-31 07:15:08
178.165.99.208 attackspam
Invalid user hoang from 178.165.99.208 port 54778
2020-08-31 07:16:26
103.120.220.65 attackspam
Aug 30 22:22:29 ns382633 sshd\[6921\]: Invalid user steam from 103.120.220.65 port 45868
Aug 30 22:22:29 ns382633 sshd\[6921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.120.220.65
Aug 30 22:22:31 ns382633 sshd\[6921\]: Failed password for invalid user steam from 103.120.220.65 port 45868 ssh2
Aug 30 22:53:58 ns382633 sshd\[11989\]: Invalid user cactiuser from 103.120.220.65 port 43562
Aug 30 22:53:58 ns382633 sshd\[11989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.120.220.65
2020-08-31 07:18:55
113.31.119.77 attackbotsspam
Aug 30 23:28:44 cho sshd[1952193]: Invalid user yjq from 113.31.119.77 port 35706
Aug 30 23:28:44 cho sshd[1952193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.31.119.77 
Aug 30 23:28:44 cho sshd[1952193]: Invalid user yjq from 113.31.119.77 port 35706
Aug 30 23:28:46 cho sshd[1952193]: Failed password for invalid user yjq from 113.31.119.77 port 35706 ssh2
Aug 30 23:32:19 cho sshd[1952450]: Invalid user jenkins from 113.31.119.77 port 46600
...
2020-08-31 07:23:25
192.241.227.40 attack
" "
2020-08-31 07:42:50

最近上报的IP列表

104.22.6.184 104.22.6.75 104.22.60.116 104.22.60.133
104.22.60.193 104.22.60.246 104.22.60.253 104.22.61.116
104.22.61.133 104.22.61.193 104.22.61.246 104.22.61.253
104.22.62.134 104.22.62.189 104.22.62.86 104.22.63.134
104.22.63.189 104.22.63.86 104.22.64.125 104.22.64.176