必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.0.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.0.133.			IN	A

;; AUTHORITY SECTION:
.			176	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:07:39 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 133.0.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.0.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.56.213.81 attackspambots
May 27 18:46:52 124388 sshd[32622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.213.81
May 27 18:46:52 124388 sshd[32622]: Invalid user chartmania from 183.56.213.81 port 38122
May 27 18:46:55 124388 sshd[32622]: Failed password for invalid user chartmania from 183.56.213.81 port 38122 ssh2
May 27 18:50:07 124388 sshd[32765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.56.213.81  user=root
May 27 18:50:09 124388 sshd[32765]: Failed password for root from 183.56.213.81 port 33944 ssh2
2020-05-28 04:28:50
14.249.230.134 attack
failed_logins
2020-05-28 04:27:36
49.88.112.55 attackbots
2020-05-27T22:26:54.180711sd-86998 sshd[6993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2020-05-27T22:26:55.712108sd-86998 sshd[6993]: Failed password for root from 49.88.112.55 port 46588 ssh2
2020-05-27T22:26:59.008619sd-86998 sshd[6993]: Failed password for root from 49.88.112.55 port 46588 ssh2
2020-05-27T22:26:54.180711sd-86998 sshd[6993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2020-05-27T22:26:55.712108sd-86998 sshd[6993]: Failed password for root from 49.88.112.55 port 46588 ssh2
2020-05-27T22:26:59.008619sd-86998 sshd[6993]: Failed password for root from 49.88.112.55 port 46588 ssh2
2020-05-27T22:26:54.180711sd-86998 sshd[6993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2020-05-27T22:26:55.712108sd-86998 sshd[6993]: Failed password for root from 49.88.112.55 port 4658
...
2020-05-28 04:39:26
134.175.55.10 attackbotsspam
May 27 20:46:18 srv-ubuntu-dev3 sshd[86862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.55.10  user=root
May 27 20:46:20 srv-ubuntu-dev3 sshd[86862]: Failed password for root from 134.175.55.10 port 38962 ssh2
May 27 20:47:53 srv-ubuntu-dev3 sshd[87085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.55.10  user=root
May 27 20:47:55 srv-ubuntu-dev3 sshd[87085]: Failed password for root from 134.175.55.10 port 59052 ssh2
May 27 20:49:30 srv-ubuntu-dev3 sshd[87303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.55.10  user=root
May 27 20:49:32 srv-ubuntu-dev3 sshd[87303]: Failed password for root from 134.175.55.10 port 50914 ssh2
May 27 20:51:05 srv-ubuntu-dev3 sshd[87573]: Invalid user kyle from 134.175.55.10
May 27 20:51:05 srv-ubuntu-dev3 sshd[87573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh
...
2020-05-28 04:45:22
222.186.52.39 attackspambots
May 27 22:25:41 piServer sshd[28231]: Failed password for root from 222.186.52.39 port 26329 ssh2
May 27 22:25:43 piServer sshd[28231]: Failed password for root from 222.186.52.39 port 26329 ssh2
May 27 22:25:47 piServer sshd[28231]: Failed password for root from 222.186.52.39 port 26329 ssh2
...
2020-05-28 04:31:16
185.193.53.49 attack
RDP Brute-Force (honeypot 1)
2020-05-28 04:23:04
192.241.200.17 attackbotsspam
" "
2020-05-28 04:12:13
121.201.31.130 attackbotsspam
Port probing on unauthorized port 1433
2020-05-28 04:39:12
121.229.14.191 attackspam
May 27 22:06:18 * sshd[23869]: Failed password for root from 121.229.14.191 port 34550 ssh2
2020-05-28 04:42:38
81.169.188.157 attackbots
May 27 22:15:25 abendstille sshd\[28314\]: Invalid user admin from 81.169.188.157
May 27 22:15:25 abendstille sshd\[28314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.169.188.157
May 27 22:15:27 abendstille sshd\[28314\]: Failed password for invalid user admin from 81.169.188.157 port 53792 ssh2
May 27 22:15:29 abendstille sshd\[28314\]: Failed password for invalid user admin from 81.169.188.157 port 53792 ssh2
May 27 22:15:31 abendstille sshd\[28314\]: Failed password for invalid user admin from 81.169.188.157 port 53792 ssh2
...
2020-05-28 04:29:48
144.217.42.212 attack
May 27 21:49:15 buvik sshd[26740]: Invalid user ubuntu from 144.217.42.212
May 27 21:49:15 buvik sshd[26740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.42.212
May 27 21:49:17 buvik sshd[26740]: Failed password for invalid user ubuntu from 144.217.42.212 port 55407 ssh2
...
2020-05-28 04:30:32
175.98.112.29 attackbotsspam
2020-05-27 17:49:09,391 fail2ban.actions        [937]: NOTICE  [sshd] Ban 175.98.112.29
2020-05-27 18:28:29,169 fail2ban.actions        [937]: NOTICE  [sshd] Ban 175.98.112.29
2020-05-27 19:07:28,033 fail2ban.actions        [937]: NOTICE  [sshd] Ban 175.98.112.29
2020-05-27 19:45:42,778 fail2ban.actions        [937]: NOTICE  [sshd] Ban 175.98.112.29
2020-05-27 20:20:06,531 fail2ban.actions        [937]: NOTICE  [sshd] Ban 175.98.112.29
...
2020-05-28 04:24:16
106.12.210.166 attack
2020-05-27T18:24:52.850953ionos.janbro.de sshd[124967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.210.166  user=root
2020-05-27T18:24:54.875411ionos.janbro.de sshd[124967]: Failed password for root from 106.12.210.166 port 54400 ssh2
2020-05-27T18:28:30.353916ionos.janbro.de sshd[124985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.210.166  user=root
2020-05-27T18:28:32.293400ionos.janbro.de sshd[124985]: Failed password for root from 106.12.210.166 port 52146 ssh2
2020-05-27T18:32:14.470120ionos.janbro.de sshd[125014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.210.166  user=root
2020-05-27T18:32:16.163376ionos.janbro.de sshd[125014]: Failed password for root from 106.12.210.166 port 49916 ssh2
2020-05-27T18:36:02.818158ionos.janbro.de sshd[125076]: Invalid user st4ck from 106.12.210.166 port 47686
2020-05-27T18:36:03.571219ionos.j
...
2020-05-28 04:18:24
101.69.200.162 attackspam
SSH_attack
2020-05-28 04:40:26
123.207.185.54 attackbots
May 27 21:48:47 piServer sshd[25469]: Failed password for root from 123.207.185.54 port 45340 ssh2
May 27 21:53:03 piServer sshd[25720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.185.54 
May 27 21:53:05 piServer sshd[25720]: Failed password for invalid user lynum from 123.207.185.54 port 43660 ssh2
...
2020-05-28 04:43:31

最近上报的IP列表

104.21.0.147 104.21.67.132 104.21.0.154 104.21.0.155
104.21.0.150 104.21.0.161 104.21.0.166 104.21.0.164
104.21.0.157 104.21.0.180 104.21.0.176 104.21.67.133
104.21.0.174 104.21.0.185 104.21.0.192 104.21.0.195
104.21.0.199 104.21.0.209 104.21.0.208 104.21.0.197