必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.22.133.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.22.133.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:36:11 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 105.133.22.162.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 162.22.133.105.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.75.62.141 attack
Too many connections or unauthorized access detected from Arctic banned ip
2019-09-10 11:24:02
78.85.239.10 attackspam
RDP Scan
2019-09-10 11:57:13
208.81.163.110 attackbotsspam
Sep 10 06:46:33 server sshd\[15930\]: Invalid user ec2-user from 208.81.163.110 port 51132
Sep 10 06:46:33 server sshd\[15930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.81.163.110
Sep 10 06:46:35 server sshd\[15930\]: Failed password for invalid user ec2-user from 208.81.163.110 port 51132 ssh2
Sep 10 06:52:51 server sshd\[18720\]: Invalid user guest from 208.81.163.110 port 59804
Sep 10 06:52:51 server sshd\[18720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.81.163.110
2019-09-10 11:54:06
182.61.10.190 attackbotsspam
Sep 10 05:27:27 vmanager6029 sshd\[12487\]: Invalid user oracle from 182.61.10.190 port 51744
Sep 10 05:27:27 vmanager6029 sshd\[12487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.10.190
Sep 10 05:27:28 vmanager6029 sshd\[12487\]: Failed password for invalid user oracle from 182.61.10.190 port 51744 ssh2
2019-09-10 11:32:04
157.230.128.195 attack
962/tcp 961/tcp 960/tcp...≡ [900/tcp,962/tcp]
[2019-07-18/09-09]241pkt,63pt.(tcp)
2019-09-10 11:20:21
193.112.2.207 attackspam
Sep  9 22:16:26 ny01 sshd[29631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.2.207
Sep  9 22:16:28 ny01 sshd[29631]: Failed password for invalid user admin from 193.112.2.207 port 58090 ssh2
Sep  9 22:22:32 ny01 sshd[30687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.2.207
2019-09-10 11:29:02
142.93.218.128 attackspam
Sep  9 17:05:55 php2 sshd\[15364\]: Invalid user git from 142.93.218.128
Sep  9 17:05:55 php2 sshd\[15364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.218.128
Sep  9 17:05:56 php2 sshd\[15364\]: Failed password for invalid user git from 142.93.218.128 port 58278 ssh2
Sep  9 17:12:03 php2 sshd\[16087\]: Invalid user kafka from 142.93.218.128
Sep  9 17:12:03 php2 sshd\[16087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.218.128
2019-09-10 11:30:00
36.72.100.115 attackbots
2019-09-10T03:39:23.943019abusebot-2.cloudsearch.cf sshd\[16996\]: Invalid user minecraft from 36.72.100.115 port 41962
2019-09-10 12:01:43
51.75.144.20 attackspambots
SIPVicious Scanner Detection, PTR: ns3129528.ip-51-75-144.eu.
2019-09-10 11:21:02
185.93.3.111 attack
(From patsyundum@gmail.com) hi there 
We all know there are no tricks with google anymore 
So, instead of looking for ways to trick google, why not perform a whitehat results driven monthly SEO Plan instead. 
 
Check out our plans 
https://googlealexarank.com/index.php/seo-packages/ 
 
We know how to get you into top safely, without risking your investment during google updates 
 
thanks and regards 
Mike 
str8creativecom@gmail.com
2019-09-10 11:35:05
80.203.84.228 attackbots
2019-09-10T03:11:48.345464abusebot-2.cloudsearch.cf sshd\[16830\]: Invalid user ubuntu from 80.203.84.228 port 55274
2019-09-10 11:37:47
193.70.2.117 attackbotsspam
Sep  9 17:17:34 php1 sshd\[6422\]: Invalid user christian from 193.70.2.117
Sep  9 17:17:34 php1 sshd\[6422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.ip-193-70-2.eu
Sep  9 17:17:35 php1 sshd\[6422\]: Failed password for invalid user christian from 193.70.2.117 port 57200 ssh2
Sep  9 17:22:51 php1 sshd\[7036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.ip-193-70-2.eu  user=mysql
Sep  9 17:22:54 php1 sshd\[7036\]: Failed password for mysql from 193.70.2.117 port 39692 ssh2
2019-09-10 11:39:09
187.189.93.10 attack
Automatic report - Banned IP Access
2019-09-10 11:47:53
221.132.17.74 attackspambots
Apr 10 03:52:00 vtv3 sshd\[21615\]: Invalid user ttt from 221.132.17.74 port 36594
Apr 10 03:52:00 vtv3 sshd\[21615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.74
Apr 10 03:52:02 vtv3 sshd\[21615\]: Failed password for invalid user ttt from 221.132.17.74 port 36594 ssh2
Apr 10 03:59:12 vtv3 sshd\[24298\]: Invalid user dragos from 221.132.17.74 port 44014
Apr 10 03:59:12 vtv3 sshd\[24298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.74
Apr 15 09:06:02 vtv3 sshd\[23697\]: Invalid user asterisk from 221.132.17.74 port 57434
Apr 15 09:06:02 vtv3 sshd\[23697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.74
Apr 15 09:06:03 vtv3 sshd\[23697\]: Failed password for invalid user asterisk from 221.132.17.74 port 57434 ssh2
Apr 15 09:12:03 vtv3 sshd\[26761\]: Invalid user info from 221.132.17.74 port 51680
Apr 15 09:12:03 vtv3 sshd\[26761\]: pam
2019-09-10 11:41:11
209.59.174.4 attackspambots
2019-09-10T03:32:48.698321abusebot-2.cloudsearch.cf sshd\[16939\]: Invalid user odoo from 209.59.174.4 port 56524
2019-09-10 11:56:39

最近上报的IP列表

107.129.218.155 185.242.92.73 149.230.223.179 140.251.30.125
172.240.186.135 228.213.229.225 5.218.214.223 30.40.51.185
68.253.122.147 36.206.67.192 243.226.104.150 81.84.243.242
244.197.83.252 13.101.27.197 83.208.218.244 29.31.251.214
228.81.240.117 235.247.120.108 164.146.132.117 137.133.59.217