必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.104.31.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20936
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.104.31.222.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 00:31:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 222.31.104.197.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 222.31.104.197.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
64.227.38.229 attack
Oct  1 22:41:15 ajax sshd[27267]: Failed password for root from 64.227.38.229 port 50874 ssh2
2020-10-03 06:14:50
151.253.125.136 attackbots
$f2bV_matches
2020-10-03 06:31:59
121.201.124.41 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2020-10-03 06:38:39
139.59.161.78 attack
Oct  2 22:59:28 DAAP sshd[3444]: Invalid user x from 139.59.161.78 port 12865
Oct  2 22:59:28 DAAP sshd[3444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.161.78
Oct  2 22:59:28 DAAP sshd[3444]: Invalid user x from 139.59.161.78 port 12865
Oct  2 22:59:30 DAAP sshd[3444]: Failed password for invalid user x from 139.59.161.78 port 12865 ssh2
Oct  2 23:04:06 DAAP sshd[3524]: Invalid user deployer from 139.59.161.78 port 36970
...
2020-10-03 06:47:52
203.142.70.26 attackspam
445/tcp 445/tcp 445/tcp...
[2020-08-29/10-01]4pkt,1pt.(tcp)
2020-10-03 06:29:16
59.127.107.1 attack
 TCP (SYN) 59.127.107.1:5292 -> port 23, len 40
2020-10-03 06:28:26
210.4.106.130 attackspambots
Port Scan
...
2020-10-03 06:27:41
172.81.235.238 attack
SSH Invalid Login
2020-10-03 06:35:02
103.240.237.182 attackbotsspam
Lines containing failures of 103.240.237.182 (max 1000)
Oct  2 22:23:54 server sshd[5607]: Connection from 103.240.237.182 port 13041 on 62.116.165.82 port 22
Oct  2 22:23:54 server sshd[5607]: Did not receive identification string from 103.240.237.182 port 13041
Oct  2 22:23:57 server sshd[5611]: Connection from 103.240.237.182 port 10054 on 62.116.165.82 port 22
Oct  2 22:23:58 server sshd[5611]: Address 103.240.237.182 maps to dhcp.tripleplay.in, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Oct  2 22:23:58 server sshd[5611]: Invalid user admin1 from 103.240.237.182 port 10054
Oct  2 22:23:58 server sshd[5611]: Connection closed by 103.240.237.182 port 10054 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.240.237.182
2020-10-03 06:43:55
15.236.144.21 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: ec2-15-236-144-21.eu-west-3.compute.amazonaws.com.
2020-10-03 06:22:19
193.169.252.37 attack
PHI,WP GET /wp-login.php
GET //wp-login.php
2020-10-03 06:47:25
185.242.85.136 attackspam
Phishing Attack
2020-10-03 06:13:33
142.93.66.165 attackbots
MYH,DEF GET /wp-login.php
2020-10-03 06:22:50
199.187.211.101 attackbotsspam
3,78-01/02 [bc00/m27] PostRequest-Spammer scoring: zurich
2020-10-03 06:45:37
140.143.127.36 attackspambots
Oct  2 21:39:46  sshd\[15398\]: Invalid user andrei from 140.143.127.36Oct  2 21:39:47  sshd\[15398\]: Failed password for invalid user andrei from 140.143.127.36 port 38994 ssh2
...
2020-10-03 06:30:53

最近上报的IP列表

6.183.112.216 240.101.79.28 47.154.40.196 122.206.213.251
43.180.99.232 220.114.53.28 83.78.152.60 19.227.120.253
82.10.61.184 215.147.55.162 187.106.41.35 14.163.53.215
47.123.250.48 140.136.121.185 191.241.162.40 66.94.232.196
114.40.32.27 89.97.215.31 181.123.150.126 175.63.242.10