必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.13.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49150
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.13.25.			IN	A

;; AUTHORITY SECTION:
.			452	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 120 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 17:54:44 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 25.13.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 25.13.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
138.68.17.105 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-08-30 08:14:14
45.141.84.57 attackspambots
Aug 30 00:31:51 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=45.141.84.57 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=23 ID=26437 PROTO=TCP SPT=7755 DPT=7755 WINDOW=50723 RES=0x00 SYN URGP=50723 Aug 30 00:34:18 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=45.141.84.57 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=23 ID=26437 PROTO=TCP SPT=4999 DPT=4999 WINDOW=50723 RES=0x00 SYN URGP=50723 Aug 30 00:39:12 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=45.141.84.57 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=23 ID=26437 PROTO=TCP SPT=4444 DPT=4444 WINDOW=50723 RES=0x00 SYN URGP=50723 Aug 30 00:44:22 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=45.141.84.57 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=23 ID=26437 PROTO=TCP SPT=8888 DPT=8888 WINDOW=50723 RES=0x00 SYN URGP=50723 Aug 30 00:46:49 *hid
...
2020-08-30 08:35:28
189.223.70.5 attackspam
Icarus honeypot on github
2020-08-30 08:12:05
211.154.6.8 attackbotsspam
SSH brute force
2020-08-30 08:09:28
47.94.215.35 attackbotsspam
21 attempts against mh-ssh on cloud
2020-08-30 08:44:23
146.88.240.4 attackbots
146.88.240.4 was recorded 9 times by 4 hosts attempting to connect to the following ports: 3283,47808,53. Incident counter (4h, 24h, all-time): 9, 91, 85496
2020-08-30 08:46:25
200.69.234.168 attackspam
Aug 30 01:42:49 vps333114 sshd[29951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.234.168
Aug 30 01:42:51 vps333114 sshd[29951]: Failed password for invalid user whz from 200.69.234.168 port 36830 ssh2
...
2020-08-30 08:28:27
218.56.158.75 attackbots
Port Scan
...
2020-08-30 08:14:28
129.19.63.107 attackspambots
Looking for Test Certificate
2020-08-30 08:20:25
187.189.234.234 attackspam
Icarus honeypot on github
2020-08-30 08:18:04
195.58.38.87 attackbotsspam
Icarus honeypot on github
2020-08-30 08:13:38
193.27.229.189 attack
Fail2Ban Ban Triggered
2020-08-30 08:32:43
139.59.84.29 attack
Aug 29 17:19:20 ny01 sshd[16817]: Failed password for root from 139.59.84.29 port 57052 ssh2
Aug 29 17:23:19 ny01 sshd[17267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.84.29
Aug 29 17:23:21 ny01 sshd[17267]: Failed password for invalid user admin from 139.59.84.29 port 33248 ssh2
2020-08-30 08:14:56
182.75.248.254 attackbotsspam
Aug 30 01:32:18 vm0 sshd[8138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.75.248.254
Aug 30 01:32:20 vm0 sshd[8138]: Failed password for invalid user sandeep from 182.75.248.254 port 61157 ssh2
...
2020-08-30 08:42:43
58.221.204.114 attackspam
Aug 29 23:21:04 minden010 sshd[19143]: Failed password for root from 58.221.204.114 port 39190 ssh2
Aug 29 23:24:50 minden010 sshd[20373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.221.204.114
Aug 29 23:24:52 minden010 sshd[20373]: Failed password for invalid user openkm from 58.221.204.114 port 41860 ssh2
...
2020-08-30 08:24:21

最近上报的IP列表

104.21.13.249 104.21.13.254 190.148.235.98 104.21.13.28
104.21.13.36 104.21.13.37 104.21.13.38 153.55.60.180
104.21.13.39 104.21.13.4 104.21.13.41 161.129.58.79
104.21.13.45 104.21.13.49 104.21.13.52 104.21.13.53
104.21.13.55 183.173.93.91 104.21.13.65 104.21.13.66