必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.21.18.76 normal
The hostname for this IP is minecraftworldmap.com
2022-07-23 06:23:40
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.1.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.1.124.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 175 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:08:02 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 124.1.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.1.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.238.157.105 attackspambots
Unauthorised access (Jan 29) SRC=115.238.157.105 LEN=40 TTL=242 ID=4670 TCP DPT=1433 WINDOW=1024 SYN
2020-01-30 01:13:59
104.206.128.26 attackbots
Unauthorized connection attempt detected from IP address 104.206.128.26 to port 5900 [J]
2020-01-30 00:53:58
52.31.44.139 attackbotsspam
port scan and connect, tcp 80 (http)
2020-01-30 01:15:04
2.90.194.6 attackspam
2019-11-25 05:12:47 1iZ5jy-0003iR-0f SMTP connection from \(\[2.90.194.6\]\) \[2.90.194.6\]:57435 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-11-25 05:12:57 1iZ5k8-0003ii-AK SMTP connection from \(\[2.90.194.6\]\) \[2.90.194.6\]:57523 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-11-25 05:13:08 1iZ5kH-0003it-Vv SMTP connection from \(\[2.90.194.6\]\) \[2.90.194.6\]:36194 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 01:13:17
200.120.0.164 attackbotsspam
2019-03-15 02:10:22 H=pc-164-0-120-200.cm.vtr.net \[200.120.0.164\]:17452 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-15 02:10:49 H=pc-164-0-120-200.cm.vtr.net \[200.120.0.164\]:17616 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2019-03-15 02:11:12 H=pc-164-0-120-200.cm.vtr.net \[200.120.0.164\]:17750 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-01-30 00:45:51
200.117.104.9 attack
2019-07-08 01:44:05 1hkGpA-0005zu-BU SMTP connection from host9.200-117-104.telecom.net.ar \[200.117.104.9\]:35460 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 01:44:23 1hkGpS-00060D-0w SMTP connection from host9.200-117-104.telecom.net.ar \[200.117.104.9\]:35609 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 01:44:35 1hkGpe-00060Q-HZ SMTP connection from host9.200-117-104.telecom.net.ar \[200.117.104.9\]:35713 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 00:50:04
83.97.20.203 attackbots
5433/tcp 9999/tcp...
[2019-12-27/2020-01-29]12pkt,4pt.(tcp)
2020-01-30 01:14:26
118.107.47.91 attackspambots
445/tcp 1433/tcp
[2020-01-01/29]2pkt
2020-01-30 01:06:13
14.215.129.156 attack
445/tcp 1433/tcp...
[2019-12-05/2020-01-29]8pkt,2pt.(tcp)
2020-01-30 01:07:50
2.89.190.229 attack
2020-01-24 18:26:52 1iv2jM-0004yq-34 SMTP connection from \(\[2.89.190.229\]\) \[2.89.190.229\]:3521 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-01-24 18:27:11 1iv2jd-0004ze-Ji SMTP connection from \(\[2.89.190.229\]\) \[2.89.190.229\]:3683 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-01-24 18:27:25 1iv2jr-0004zt-On SMTP connection from \(\[2.89.190.229\]\) \[2.89.190.229\]:26096 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 01:16:33
200.120.185.202 attackspambots
2020-01-25 11:41:34 1ivIsc-00055s-64 SMTP connection from pc-202-185-120-200.cm.vtr.net \[200.120.185.202\]:12390 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-01-25 11:42:23 1ivItD-00056e-4f SMTP connection from pc-202-185-120-200.cm.vtr.net \[200.120.185.202\]:12531 I=\[193.107.88.166\]:25 closed by DROP in ACL
2020-01-25 11:42:58 1ivItu-00057v-TQ SMTP connection from pc-202-185-120-200.cm.vtr.net \[200.120.185.202\]:12674 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-30 00:44:17
47.74.245.7 attackbots
Jan 29 17:45:08 SilenceServices sshd[16598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.245.7
Jan 29 17:45:10 SilenceServices sshd[16598]: Failed password for invalid user kadiyala123 from 47.74.245.7 port 51296 ssh2
Jan 29 17:47:54 SilenceServices sshd[19257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.74.245.7
2020-01-30 01:17:25
1.172.48.243 attackspambots
" "
2020-01-30 00:40:14
222.186.30.167 attackbots
Unauthorized connection attempt detected from IP address 222.186.30.167 to port 22 [J]
2020-01-30 00:38:23
182.74.16.99 attackspambots
445/tcp 445/tcp
[2020-01-22/29]2pkt
2020-01-30 00:39:26

最近上报的IP列表

104.21.1.129 104.21.1.119 104.21.1.114 104.21.1.121
104.21.1.126 104.21.1.117 104.21.1.128 104.21.1.141
104.21.1.138 104.21.67.144 104.21.1.142 90.41.139.124
104.21.1.145 104.21.1.149 104.21.1.151 104.21.1.159
104.21.1.146 104.21.1.147 104.21.1.150 104.21.1.161