必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.22.75.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 124
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.22.75.91.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:45:34 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 91.75.22.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 91.75.22.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.144.225.150 attack
Dec  1 18:50:49 sachi sshd\[2757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.225.150  user=root
Dec  1 18:50:51 sachi sshd\[2757\]: Failed password for root from 192.144.225.150 port 35834 ssh2
Dec  1 18:59:07 sachi sshd\[3573\]: Invalid user oooooo from 192.144.225.150
Dec  1 18:59:07 sachi sshd\[3573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.225.150
Dec  1 18:59:09 sachi sshd\[3573\]: Failed password for invalid user oooooo from 192.144.225.150 port 34784 ssh2
2019-12-02 13:05:10
13.85.68.8 attack
Dec  2 06:19:29 vtv3 sshd[6351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.85.68.8 
Dec  2 06:19:31 vtv3 sshd[6351]: Failed password for invalid user marekniewadzi from 13.85.68.8 port 60362 ssh2
Dec  2 06:25:10 vtv3 sshd[9738]: Failed password for root from 13.85.68.8 port 46388 ssh2
Dec  2 06:37:37 vtv3 sshd[15680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.85.68.8 
Dec  2 06:37:40 vtv3 sshd[15680]: Failed password for invalid user beauchaine from 13.85.68.8 port 45552 ssh2
Dec  2 06:43:32 vtv3 sshd[18515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.85.68.8 
Dec  2 06:56:18 vtv3 sshd[24659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.85.68.8 
Dec  2 06:56:20 vtv3 sshd[24659]: Failed password for invalid user wwwadmin from 13.85.68.8 port 58410 ssh2
Dec  2 07:02:19 vtv3 sshd[27575]: pam_unix(sshd:auth): authentication
2019-12-02 13:21:21
222.186.173.180 attackspambots
Dec  2 00:25:04 linuxvps sshd\[35791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
Dec  2 00:25:05 linuxvps sshd\[35791\]: Failed password for root from 222.186.173.180 port 38148 ssh2
Dec  2 00:25:22 linuxvps sshd\[35957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.180  user=root
Dec  2 00:25:23 linuxvps sshd\[35957\]: Failed password for root from 222.186.173.180 port 4362 ssh2
Dec  2 00:25:33 linuxvps sshd\[35957\]: Failed password for root from 222.186.173.180 port 4362 ssh2
2019-12-02 13:29:54
186.31.37.203 attack
Dec  2 05:10:07 game-panel sshd[16239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.37.203
Dec  2 05:10:09 game-panel sshd[16239]: Failed password for invalid user rpc from 186.31.37.203 port 44778 ssh2
Dec  2 05:16:55 game-panel sshd[16501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.37.203
2019-12-02 13:32:27
163.172.4.100 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-02 13:20:33
111.231.94.138 attack
Dec  2 05:52:45 sd-53420 sshd\[11132\]: Invalid user oooooooooo from 111.231.94.138
Dec  2 05:52:45 sd-53420 sshd\[11132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.94.138
Dec  2 05:52:47 sd-53420 sshd\[11132\]: Failed password for invalid user oooooooooo from 111.231.94.138 port 37094 ssh2
Dec  2 05:59:03 sd-53420 sshd\[12937\]: Invalid user rado from 111.231.94.138
Dec  2 05:59:03 sd-53420 sshd\[12937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.94.138
...
2019-12-02 13:09:35
118.24.201.132 attackbotsspam
Dec  1 23:59:04 TORMINT sshd\[31735\]: Invalid user web2 from 118.24.201.132
Dec  1 23:59:04 TORMINT sshd\[31735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.201.132
Dec  1 23:59:06 TORMINT sshd\[31735\]: Failed password for invalid user web2 from 118.24.201.132 port 58600 ssh2
...
2019-12-02 13:06:00
65.98.111.218 attackbotsspam
Dec  2 06:24:54 sd-53420 sshd\[18020\]: User root from 65.98.111.218 not allowed because none of user's groups are listed in AllowGroups
Dec  2 06:24:54 sd-53420 sshd\[18020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.98.111.218  user=root
Dec  2 06:24:56 sd-53420 sshd\[18020\]: Failed password for invalid user root from 65.98.111.218 port 44090 ssh2
Dec  2 06:30:20 sd-53420 sshd\[19005\]: User root from 65.98.111.218 not allowed because none of user's groups are listed in AllowGroups
Dec  2 06:30:20 sd-53420 sshd\[19005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.98.111.218  user=root
...
2019-12-02 13:37:35
91.121.86.62 attackbots
Dec  2 06:05:37 DAAP sshd[29714]: Invalid user 123456 from 91.121.86.62 port 55620
Dec  2 06:05:37 DAAP sshd[29714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.86.62
Dec  2 06:05:37 DAAP sshd[29714]: Invalid user 123456 from 91.121.86.62 port 55620
Dec  2 06:05:39 DAAP sshd[29714]: Failed password for invalid user 123456 from 91.121.86.62 port 55620 ssh2
...
2019-12-02 13:12:26
222.186.180.17 attackspam
Dec  2 06:17:28 [host] sshd[24647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Dec  2 06:17:30 [host] sshd[24647]: Failed password for root from 222.186.180.17 port 8706 ssh2
Dec  2 06:17:48 [host] sshd[24656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
2019-12-02 13:19:10
218.92.0.141 attackbotsspam
Dec  2 06:16:48 root sshd[24139]: Failed password for root from 218.92.0.141 port 4136 ssh2
Dec  2 06:16:53 root sshd[24139]: Failed password for root from 218.92.0.141 port 4136 ssh2
Dec  2 06:16:58 root sshd[24139]: Failed password for root from 218.92.0.141 port 4136 ssh2
Dec  2 06:17:01 root sshd[24139]: Failed password for root from 218.92.0.141 port 4136 ssh2
...
2019-12-02 13:18:03
51.77.201.36 attackbotsspam
Dec  2 05:52:52 vps691689 sshd[3661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.201.36
Dec  2 05:52:54 vps691689 sshd[3661]: Failed password for invalid user hausding from 51.77.201.36 port 42350 ssh2
...
2019-12-02 13:16:26
27.94.212.164 attackspambots
Dec  2 05:58:59 [host] sshd[23616]: Invalid user hofgaertner from 27.94.212.164
Dec  2 05:58:59 [host] sshd[23616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.94.212.164
Dec  2 05:59:00 [host] sshd[23616]: Failed password for invalid user hofgaertner from 27.94.212.164 port 54208 ssh2
2019-12-02 13:10:11
92.63.196.3 attackbots
Dec  2 06:29:36 mc1 kernel: \[6550788.270509\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.63.196.3 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=19209 PROTO=TCP SPT=42605 DPT=9833 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec  2 06:37:30 mc1 kernel: \[6551262.169024\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.63.196.3 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=35344 PROTO=TCP SPT=42605 DPT=7007 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec  2 06:39:10 mc1 kernel: \[6551362.344459\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.63.196.3 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=23667 PROTO=TCP SPT=42605 DPT=7001 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-02 13:39:48
118.25.152.227 attackspam
Dec  2 06:32:06 vps666546 sshd\[30170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.152.227  user=root
Dec  2 06:32:08 vps666546 sshd\[30170\]: Failed password for root from 118.25.152.227 port 38051 ssh2
Dec  2 06:39:06 vps666546 sshd\[30416\]: Invalid user http from 118.25.152.227 port 41231
Dec  2 06:39:06 vps666546 sshd\[30416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.152.227
Dec  2 06:39:08 vps666546 sshd\[30416\]: Failed password for invalid user http from 118.25.152.227 port 41231 ssh2
...
2019-12-02 13:42:14

最近上报的IP列表

104.22.75.242 104.22.76.100 104.22.76.110 104.22.76.104
104.22.76.116 104.22.76.114 104.22.76.128 104.22.76.121
104.22.76.135 104.22.76.142 104.22.76.163 104.22.76.167
104.22.76.170 104.22.76.173 104.22.76.182 104.22.76.185
104.22.76.183 104.22.76.208 104.22.76.206 104.22.76.195