必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Akamai Technologies, Inc.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.94.122.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46341
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.94.122.195.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 15 21:17:35 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
195.122.94.104.in-addr.arpa domain name pointer a104-94-122-195.deploy.static.akamaitechnologies.com.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
195.122.94.104.in-addr.arpa	name = a104-94-122-195.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.17.27.67 attackspam
Invalid user adminftp from 31.17.27.67 port 37804
2019-07-24 17:57:06
217.238.166.113 attack
Invalid user admin from 217.238.166.113 port 46641
2019-07-24 18:00:55
111.231.219.142 attackspambots
Invalid user alex from 111.231.219.142 port 38912
2019-07-24 17:42:55
129.211.1.224 attack
Invalid user admin from 129.211.1.224 port 57228
2019-07-24 17:38:56
85.152.163.233 attack
Invalid user pi from 85.152.163.233 port 38118
2019-07-24 17:14:06
206.189.145.152 attackbots
Invalid user ftpuser from 206.189.145.152 port 56950
2019-07-24 17:28:30
139.59.78.236 attackspambots
Invalid user applmgr from 139.59.78.236 port 39630
2019-07-24 17:36:27
104.248.239.22 attack
Jul 24 11:59:10 eventyay sshd[28714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.239.22
Jul 24 11:59:12 eventyay sshd[28714]: Failed password for invalid user dev2 from 104.248.239.22 port 60944 ssh2
Jul 24 12:03:41 eventyay sshd[30007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.239.22
...
2019-07-24 18:16:48
104.149.164.154 attackspam
Invalid user phion from 104.149.164.154 port 43868
2019-07-24 17:45:36
51.91.36.96 attackspambots
Invalid user zabbix from 51.91.36.96 port 60326
2019-07-24 17:53:47
186.206.134.122 attackbotsspam
Invalid user temp1 from 186.206.134.122 port 55676
2019-07-24 18:04:47
128.199.197.53 attackspam
Invalid user diradmin from 128.199.197.53 port 39784
2019-07-24 18:13:54
83.211.109.73 attack
Invalid user adminftp from 83.211.109.73 port 49076
2019-07-24 17:50:23
188.166.237.191 attack
Invalid user ftpuser from 188.166.237.191 port 57616
2019-07-24 17:29:43
179.232.1.252 attackspam
Jul 24 09:57:18 db sshd\[32365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.252  user=root
Jul 24 09:57:20 db sshd\[32365\]: Failed password for root from 179.232.1.252 port 53078 ssh2
Jul 24 09:57:22 db sshd\[32367\]: Invalid user ubuntu from 179.232.1.252
Jul 24 09:57:22 db sshd\[32367\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.252 
Jul 24 09:57:24 db sshd\[32367\]: Failed password for invalid user ubuntu from 179.232.1.252 port 54050 ssh2
...
2019-07-24 18:06:03

最近上报的IP列表

3.179.187.177 54.154.77.253 196.179.8.109 72.125.99.238
120.237.111.235 196.119.191.120 198.2.195.209 79.27.135.161
54.191.105.43 179.171.101.2 95.26.236.114 148.0.132.149
50.128.218.89 60.230.91.20 88.79.100.118 4.223.59.131
78.250.199.60 91.13.201.79 115.77.73.138 154.167.139.96