必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.75.109.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.75.109.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 09:22:44 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.109.75.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.109.75.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
13.111.30.128 attack
smtp server attack
2020-08-09 14:19:06
40.115.5.76 attackbots
MAIL: User Login Brute Force Attempt
2020-08-09 14:21:01
138.197.213.233 attack
Aug  9 05:53:19 lnxmysql61 sshd[9264]: Failed password for root from 138.197.213.233 port 50588 ssh2
Aug  9 05:53:19 lnxmysql61 sshd[9264]: Failed password for root from 138.197.213.233 port 50588 ssh2
2020-08-09 14:32:05
136.61.209.73 attack
Aug  9 07:38:29 piServer sshd[5812]: Failed password for root from 136.61.209.73 port 52466 ssh2
Aug  9 07:41:35 piServer sshd[6232]: Failed password for root from 136.61.209.73 port 43726 ssh2
...
2020-08-09 13:50:11
93.174.93.25 attackbotsspam
Aug  9 07:56:54 srv3 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=93.174.93.25, lip=172.16.1.7, session=\
Aug  9 07:57:06 srv3 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 6 secs\): user=\, method=PLAIN, rip=93.174.93.25, lip=172.16.1.7, session=\
Aug  9 07:57:14 srv3 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 10 secs\): user=\, method=PLAIN, rip=93.174.93.25, lip=172.16.1.7, session=\
Aug  9 07:57:15 srv3 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 10 secs\): user=\, method=PLAIN, rip=93.174.93.25, lip=172.16.1.7, session=\<7/PygWusnGFdrl0Z\>
Aug  9 07:57:15 srv3 dovecot: pop3-login: Aborted login \(auth failed, 1 attempts in 10 secs\): user=\, method=PLAIN, rip=93.174.93.25, lip=172.16.1.7, session=\
2020-08-09 14:05:28
189.125.93.48 attackbots
Aug  9 04:42:44 sigma sshd\[4748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.93.48  user=rootAug  9 04:53:46 sigma sshd\[5720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.125.93.48  user=root
...
2020-08-09 14:11:46
186.250.203.112 attack
Brute force attempt
2020-08-09 14:31:03
196.27.127.61 attackbots
Aug  9 12:33:01 itv-usvr-01 sshd[31064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61  user=root
Aug  9 12:33:04 itv-usvr-01 sshd[31064]: Failed password for root from 196.27.127.61 port 42748 ssh2
Aug  9 12:37:43 itv-usvr-01 sshd[31243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61  user=root
Aug  9 12:37:45 itv-usvr-01 sshd[31243]: Failed password for root from 196.27.127.61 port 42196 ssh2
Aug  9 12:37:43 itv-usvr-01 sshd[31243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.27.127.61  user=root
Aug  9 12:37:45 itv-usvr-01 sshd[31243]: Failed password for root from 196.27.127.61 port 42196 ssh2
2020-08-09 13:59:15
128.199.84.201 attackbotsspam
Aug 9 05:45:42 *hidden* sshd[30804]: Failed password for *hidden* from 128.199.84.201 port 58582 ssh2 Aug 9 05:49:50 *hidden* sshd[41375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.84.201 user=root Aug 9 05:49:52 *hidden* sshd[41375]: Failed password for *hidden* from 128.199.84.201 port 55114 ssh2 Aug 9 05:53:37 *hidden* sshd[50352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.84.201 user=root Aug 9 05:53:39 *hidden* sshd[50352]: Failed password for *hidden* from 128.199.84.201 port 51646 ssh2
2020-08-09 14:18:14
80.99.159.65 attackbotsspam
1596945235 - 08/09/2020 10:53:55 Host: catv-80-99-159-65.catv.broadband.hu/80.99.159.65 Port: 8080 TCP Blocked
...
2020-08-09 14:04:12
123.126.106.88 attackspambots
prod6
...
2020-08-09 14:16:20
35.227.108.34 attackspam
ssh brute force
2020-08-09 14:10:41
66.33.212.126 attack
66.33.212.126 - - [09/Aug/2020:05:46:25 +0100] "POST /wp-login.php HTTP/1.1" 200 2018 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.33.212.126 - - [09/Aug/2020:05:46:26 +0100] "POST /wp-login.php HTTP/1.1" 200 1967 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.33.212.126 - - [09/Aug/2020:05:46:27 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-09 13:51:37
159.89.237.235 attackbots
159.89.237.235 - - [09/Aug/2020:05:53:50 +0200] "GET /wp-login.php HTTP/1.1" 200 5738 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.237.235 - - [09/Aug/2020:05:53:51 +0200] "POST /wp-login.php HTTP/1.1" 200 5989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.89.237.235 - - [09/Aug/2020:05:53:52 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-09 14:05:06
64.227.67.106 attackbotsspam
[ssh] SSH attack
2020-08-09 14:29:46

最近上报的IP列表

124.222.135.169 207.189.75.249 242.19.88.236 67.144.77.105
64.233.172.213 228.225.47.28 126.8.84.159 175.151.231.0
66.20.229.152 213.214.156.239 64.36.206.150 48.161.94.188
56.78.237.65 249.143.206.29 104.32.64.22 2.113.218.1
197.115.31.190 7.61.7.73 217.105.153.19 34.252.78.218