必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.224.232.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.224.232.214.		IN	A

;; AUTHORITY SECTION:
.			208	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031901 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 20 12:19:26 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
b'Host 214.232.224.104.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 104.224.232.214.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.25.151.40 attack
Feb  4 21:44:57 dedicated sshd[16865]: Invalid user luca from 118.25.151.40 port 57364
2020-02-05 05:03:34
199.249.230.109 attack
02/04/2020-21:20:33.488893 199.249.230.109 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 47
2020-02-05 05:01:17
118.25.104.48 attackspambots
Feb  4 16:42:35 server sshd\[21321\]: Failed password for invalid user ire from 118.25.104.48 port 8885 ssh2
Feb  4 23:18:31 server sshd\[13993\]: Invalid user admin from 118.25.104.48
Feb  4 23:18:31 server sshd\[13993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.104.48 
Feb  4 23:18:33 server sshd\[13993\]: Failed password for invalid user admin from 118.25.104.48 port 64613 ssh2
Feb  4 23:20:49 server sshd\[14581\]: Invalid user test from 118.25.104.48
Feb  4 23:20:49 server sshd\[14581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.104.48 
...
2020-02-05 04:44:05
84.224.192.24 attackspambots
Feb  4 21:20:32 grey postfix/smtpd\[25091\]: NOQUEUE: reject: RCPT from netacc-gpn-4-192-24.pool.telenor.hu\[84.224.192.24\]: 554 5.7.1 Service unavailable\; Client host \[84.224.192.24\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?84.224.192.24\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-05 05:01:48
151.80.254.78 attackbots
Feb  4 10:33:17 hpm sshd\[18938\]: Invalid user ftpuser from 151.80.254.78
Feb  4 10:33:17 hpm sshd\[18938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.78
Feb  4 10:33:19 hpm sshd\[18938\]: Failed password for invalid user ftpuser from 151.80.254.78 port 60122 ssh2
Feb  4 10:36:31 hpm sshd\[19220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.254.78  user=root
Feb  4 10:36:33 hpm sshd\[19220\]: Failed password for root from 151.80.254.78 port 33320 ssh2
2020-02-05 04:45:08
93.147.38.144 attackbotsspam
Feb  4 21:12:51 mxgate1 postfix/postscreen[19461]: CONNECT from [93.147.38.144]:34936 to [176.31.12.44]:25
Feb  4 21:12:51 mxgate1 postfix/dnsblog[19464]: addr 93.147.38.144 listed by domain zen.spamhaus.org as 127.0.0.11
Feb  4 21:12:51 mxgate1 postfix/dnsblog[19464]: addr 93.147.38.144 listed by domain zen.spamhaus.org as 127.0.0.4
Feb  4 21:12:51 mxgate1 postfix/dnsblog[19466]: addr 93.147.38.144 listed by domain cbl.abuseat.org as 127.0.0.2
Feb  4 21:12:51 mxgate1 postfix/dnsblog[19465]: addr 93.147.38.144 listed by domain bl.spamcop.net as 127.0.0.2
Feb  4 21:12:57 mxgate1 postfix/postscreen[19461]: DNSBL rank 4 for [93.147.38.144]:34936
Feb x@x
Feb  4 21:12:58 mxgate1 postfix/postscreen[19461]: HANGUP after 0.69 from [93.147.38.144]:34936 in tests after SMTP handshake
Feb  4 21:12:58 mxgate1 postfix/postscreen[19461]: DISCONNECT [93.147.38.144]:34936


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=93.147.38.144
2020-02-05 04:59:44
201.209.235.210 attackbots
Honeypot attack, port: 445, PTR: 201-209-235-210.genericrev.cantv.net.
2020-02-05 04:41:21
103.87.76.66 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-05 05:05:07
185.211.245.170 attack
Feb  4 21:07:38 relay postfix/smtpd\[2997\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 21:07:45 relay postfix/smtpd\[2995\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 21:15:02 relay postfix/smtpd\[6329\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 21:15:09 relay postfix/smtpd\[3045\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 21:21:02 relay postfix/smtpd\[15047\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-05 04:28:33
121.159.50.45 attackbots
Honeypot attack, port: 4567, PTR: PTR record not found
2020-02-05 05:02:37
131.196.13.8 attack
2019-02-26 18:56:06 H=\(\[131.196.13.8\]\) \[131.196.13.8\]:38031 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-26 18:56:09 H=\(\[131.196.13.8\]\) \[131.196.13.8\]:38096 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-02-26 18:56:11 H=\(\[131.196.13.8\]\) \[131.196.13.8\]:38152 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-02-05 04:22:42
220.130.178.36 attackspam
Unauthorized connection attempt detected from IP address 220.130.178.36 to port 2220 [J]
2020-02-05 05:03:57
113.172.11.87 attackbotsspam
Brute force attempt
2020-02-05 05:01:05
103.95.41.9 attackbots
Feb  4 21:20:40 lnxded64 sshd[25012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.95.41.9
2020-02-05 04:52:18
190.15.122.4 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-05 04:52:01

最近上报的IP列表

104.223.9.183 104.225.146.77 104.225.216.83 104.227.245.155
104.232.32.135 104.233.175.173 104.233.175.183 104.233.177.193
104.233.228.100 104.233.228.232 104.236.100.153 104.236.11.136
104.236.111.152 104.236.115.229 104.236.116.148 104.236.12.69
104.236.126.45 104.239.148.161 104.239.153.180 104.239.158.154