必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Malmö

省份(region): Skåne

国家(country): Sweden

运营商(isp): Telenor

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.194.22.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31908
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.194.22.52.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 09:23:25 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
52.22.194.46.in-addr.arpa domain name pointer c-2ec21634-74736162.cust.telenor.se.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.22.194.46.in-addr.arpa	name = c-2ec21634-74736162.cust.telenor.se.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.241.140.216 attackspam
Unauthorized connection attempt from IP address 178.241.140.216 on Port 445(SMB)
2020-08-11 02:39:17
111.230.236.93 attackspambots
Aug 10 12:02:24 IngegnereFirenze sshd[19250]: User root from 111.230.236.93 not allowed because not listed in AllowUsers
...
2020-08-11 02:42:41
201.87.255.51 attack
1597060938 - 08/10/2020 14:02:18 Host: 201.87.255.51/201.87.255.51 Port: 445 TCP Blocked
2020-08-11 02:47:03
51.254.36.178 attack
Aug 10 17:18:27 ns381471 sshd[31553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.36.178
Aug 10 17:18:29 ns381471 sshd[31553]: Failed password for invalid user 1Qwe2zxc. from 51.254.36.178 port 49852 ssh2
2020-08-11 02:44:30
37.26.25.221 attack
Unauthorized connection attempt from IP address 37.26.25.221 on Port 445(SMB)
2020-08-11 02:06:12
189.213.37.26 attackbots
Automatic report - Port Scan Attack
2020-08-11 02:48:12
61.188.18.141 attackbotsspam
Aug 10 08:32:55 vm0 sshd[23111]: Failed password for root from 61.188.18.141 port 55812 ssh2
Aug 10 14:03:14 vm0 sshd[8739]: Failed password for root from 61.188.18.141 port 43588 ssh2
...
2020-08-11 01:53:12
117.50.99.197 attackbotsspam
Aug 10 14:45:22 ws12vmsma01 sshd[51801]: Failed password for root from 117.50.99.197 port 36602 ssh2
Aug 10 14:49:49 ws12vmsma01 sshd[52535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.197  user=root
Aug 10 14:49:51 ws12vmsma01 sshd[52535]: Failed password for root from 117.50.99.197 port 43284 ssh2
...
2020-08-11 01:52:51
206.189.155.76 attackbotsspam
206.189.155.76 - - [10/Aug/2020:14:41:52 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.155.76 - - [10/Aug/2020:14:42:00 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
206.189.155.76 - - [10/Aug/2020:14:42:13 +0100] "POST /wp-login.php HTTP/1.1" 200 1949 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-11 01:54:48
79.6.216.208 attackspambots
Aug 10 19:44:52 vmd17057 sshd[27722]: Failed password for root from 79.6.216.208 port 59834 ssh2
...
2020-08-11 02:10:55
85.132.16.200 attackbots
Unauthorized connection attempt from IP address 85.132.16.200 on Port 445(SMB)
2020-08-11 02:37:20
177.189.209.143 attackbotsspam
2020-08-10T11:07:35.853229server.mjenks.net sshd[2018158]: Invalid user administrator123 from 177.189.209.143 port 10145
2020-08-10T11:07:35.860419server.mjenks.net sshd[2018158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.189.209.143
2020-08-10T11:07:35.853229server.mjenks.net sshd[2018158]: Invalid user administrator123 from 177.189.209.143 port 10145
2020-08-10T11:07:37.883536server.mjenks.net sshd[2018158]: Failed password for invalid user administrator123 from 177.189.209.143 port 10145 ssh2
2020-08-10T11:11:31.966808server.mjenks.net sshd[2018648]: Invalid user guest from 177.189.209.143 port 28385
...
2020-08-11 02:10:09
39.40.101.185 attack
Unauthorized connection attempt from IP address 39.40.101.185 on Port 445(SMB)
2020-08-11 02:01:33
49.74.219.26 attackbotsspam
Aug 10 18:39:36 django-0 sshd[24743]: Failed password for root from 49.74.219.26 port 42119 ssh2
Aug 10 18:43:30 django-0 sshd[24867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.74.219.26  user=root
Aug 10 18:43:31 django-0 sshd[24867]: Failed password for root from 49.74.219.26 port 47650 ssh2
...
2020-08-11 02:37:06
202.131.152.2 attackbotsspam
Aug 10 15:37:19 vm0 sshd[13681]: Failed password for root from 202.131.152.2 port 43062 ssh2
...
2020-08-11 01:57:11

最近上报的IP列表

242.182.1.166 213.36.45.244 117.148.17.244 135.110.76.157
186.25.235.68 232.187.233.43 251.7.170.21 128.110.107.105
148.52.144.235 219.53.20.226 59.124.76.202 132.102.29.177
108.10.44.58 47.235.140.136 185.25.17.112 8.235.4.59
35.227.213.220 202.216.23.173 171.237.8.185 142.83.79.247