必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.21.18.76 normal
The hostname for this IP is minecraftworldmap.com
2022-07-23 06:23:40
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.1.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3495
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.1.64.			IN	A

;; AUTHORITY SECTION:
.			466	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:08:08 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 64.1.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.1.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.248.71.69 attack
Apr 10 11:15:48 vmd48417 sshd[27158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.248.71.69
2020-04-10 18:03:36
51.77.148.77 attackspam
SSH Brute-Force reported by Fail2Ban
2020-04-10 18:12:49
128.201.76.248 attack
$f2bV_matches
2020-04-10 18:09:06
58.16.187.26 attack
SSH Brute-Force. Ports scanning.
2020-04-10 18:04:42
165.227.108.145 attackspambots
another cyber-attack by permanently blocked DigitalOcean domain/ip ranges 

 bad_bot_host: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36
2020-04-10 18:11:50
185.220.100.245 attackspam
7,25-01/01 [bc01/m16] PostRequest-Spammer scoring: essen
2020-04-10 18:29:11
170.210.214.50 attack
$f2bV_matches
2020-04-10 18:05:17
122.51.167.200 attackbotsspam
Apr 10 10:24:32 sshgateway sshd\[10089\]: Invalid user arkserver from 122.51.167.200
Apr 10 10:24:32 sshgateway sshd\[10089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.167.200
Apr 10 10:24:34 sshgateway sshd\[10089\]: Failed password for invalid user arkserver from 122.51.167.200 port 35020 ssh2
2020-04-10 18:31:08
106.54.64.55 attack
Fail2Ban Ban Triggered
2020-04-10 18:30:48
31.47.39.172 attackspambots
Apr 10 08:20:25 powerpi2 sshd[616]: Invalid user test from 31.47.39.172 port 57148
Apr 10 08:20:28 powerpi2 sshd[616]: Failed password for invalid user test from 31.47.39.172 port 57148 ssh2
Apr 10 08:22:47 powerpi2 sshd[713]: Invalid user deploy from 31.47.39.172 port 48068
...
2020-04-10 18:24:54
196.44.236.213 attack
Apr 10 00:33:59 askasleikir sshd[67275]: Failed password for invalid user siva from 196.44.236.213 port 37438 ssh2
2020-04-10 18:02:54
178.62.37.78 attackspam
Apr 10 03:49:39 firewall sshd[14175]: Invalid user user from 178.62.37.78
Apr 10 03:49:42 firewall sshd[14175]: Failed password for invalid user user from 178.62.37.78 port 59174 ssh2
Apr 10 03:55:56 firewall sshd[14400]: Invalid user deploy from 178.62.37.78
...
2020-04-10 18:19:23
79.143.44.122 attackbotsspam
Apr 10 11:14:38 srv01 sshd[17942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.44.122  user=root
Apr 10 11:14:40 srv01 sshd[17942]: Failed password for root from 79.143.44.122 port 34462 ssh2
Apr 10 11:17:25 srv01 sshd[18141]: Invalid user test from 79.143.44.122 port 57036
Apr 10 11:17:25 srv01 sshd[18141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.143.44.122
Apr 10 11:17:25 srv01 sshd[18141]: Invalid user test from 79.143.44.122 port 57036
Apr 10 11:17:27 srv01 sshd[18141]: Failed password for invalid user test from 79.143.44.122 port 57036 ssh2
...
2020-04-10 18:05:44
45.55.201.219 attackbotsspam
2020-04-09 UTC: (20x) - arma3server,bitcoin,duser,fossil,georg,glassfish3,lia,master,oracle,root(6x),teamspeak,test,tu,ubuntu,user
2020-04-10 18:36:50
36.153.0.228 attackbots
Apr 10 11:31:57 ovpn sshd\[20386\]: Invalid user libuuid from 36.153.0.228
Apr 10 11:31:57 ovpn sshd\[20386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.153.0.228
Apr 10 11:32:00 ovpn sshd\[20386\]: Failed password for invalid user libuuid from 36.153.0.228 port 39197 ssh2
Apr 10 11:36:12 ovpn sshd\[21408\]: Invalid user postgres from 36.153.0.228
Apr 10 11:36:12 ovpn sshd\[21408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.153.0.228
2020-04-10 18:11:23

最近上报的IP列表

109.92.165.114 104.21.1.68 191.76.97.77 104.21.1.70
110.159.232.25 110.159.230.13 110.159.240.71 104.21.1.79
110.16.107.85 110.164.205.231 110.159.74.223 110.164.160.191
52.1.46.5 110.155.196.239 110.159.21.109 110.16.6.151
110.164.205.245 110.165.23.52 110.165.23.48 110.165.23.59