必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.21.18.76 normal
The hostname for this IP is minecraftworldmap.com
2022-07-23 06:23:40
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.18.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11650
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.18.8.			IN	A

;; AUTHORITY SECTION:
.			260	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:32:13 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 8.18.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.18.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
216.218.206.77 attack
firewall-block, port(s): 50070/tcp
2019-11-06 00:02:05
34.212.63.114 attackspam
11/05/2019-16:10:02.953681 34.212.63.114 Protocol: 6 SURICATA TLS invalid record/traffic
2019-11-05 23:41:58
200.222.110.36 attack
2019-11-05T15:33:26.852628shield sshd\[4605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.222.110.36  user=root
2019-11-05T15:33:28.875707shield sshd\[4605\]: Failed password for root from 200.222.110.36 port 45422 ssh2
2019-11-05T15:38:29.164666shield sshd\[5003\]: Invalid user loring from 200.222.110.36 port 55854
2019-11-05T15:38:29.168824shield sshd\[5003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.222.110.36
2019-11-05T15:38:30.790083shield sshd\[5003\]: Failed password for invalid user loring from 200.222.110.36 port 55854 ssh2
2019-11-05 23:51:29
51.91.136.174 attackbots
2019-11-05T15:18:01.649966abusebot-5.cloudsearch.cf sshd\[27174\]: Invalid user ubuntu from 51.91.136.174 port 51366
2019-11-05 23:28:51
146.185.25.181 attackspam
DNS Enumeration
2019-11-05 23:59:32
5.135.179.178 attack
2019-11-05T16:35:55.993481tmaserv sshd\[26107\]: Invalid user adv from 5.135.179.178 port 55871
2019-11-05T16:35:55.996768tmaserv sshd\[26107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3287787.ip-5-135-179.eu
2019-11-05T16:35:57.968656tmaserv sshd\[26107\]: Failed password for invalid user adv from 5.135.179.178 port 55871 ssh2
2019-11-05T16:39:41.796013tmaserv sshd\[26309\]: Invalid user admin from 5.135.179.178 port 33404
2019-11-05T16:39:41.800872tmaserv sshd\[26309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3287787.ip-5-135-179.eu
2019-11-05T16:39:43.467011tmaserv sshd\[26309\]: Failed password for invalid user admin from 5.135.179.178 port 33404 ssh2
...
2019-11-05 23:35:14
61.133.232.252 attack
2019-11-05T14:40:39.929052abusebot-5.cloudsearch.cf sshd\[26870\]: Invalid user dj from 61.133.232.252 port 40256
2019-11-05T14:40:39.934157abusebot-5.cloudsearch.cf sshd\[26870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.252
2019-11-05 23:55:56
193.203.215.28 attack
11/05/2019-15:41:06.157859 193.203.215.28 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-05 23:38:05
173.249.6.245 attackbotsspam
Masscan Port Scanning Tool PA
2019-11-06 00:01:35
45.82.153.76 attackbotsspam
2019-11-05 16:30:33 dovecot_login authenticator failed for \(\[45.82.153.76\]\) \[45.82.153.76\]: 535 Incorrect authentication data \(set_id=info@opso.it\)
2019-11-05 16:30:42 dovecot_login authenticator failed for \(\[45.82.153.76\]\) \[45.82.153.76\]: 535 Incorrect authentication data
2019-11-05 16:30:53 dovecot_login authenticator failed for \(\[45.82.153.76\]\) \[45.82.153.76\]: 535 Incorrect authentication data
2019-11-05 16:30:59 dovecot_login authenticator failed for \(\[45.82.153.76\]\) \[45.82.153.76\]: 535 Incorrect authentication data
2019-11-05 16:31:13 dovecot_login authenticator failed for \(\[45.82.153.76\]\) \[45.82.153.76\]: 535 Incorrect authentication data
2019-11-05 23:32:51
115.159.235.17 attackbots
Nov  5 17:00:46 server sshd\[32235\]: Invalid user esther from 115.159.235.17
Nov  5 17:00:46 server sshd\[32235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.235.17 
Nov  5 17:00:48 server sshd\[32235\]: Failed password for invalid user esther from 115.159.235.17 port 32792 ssh2
Nov  5 17:40:18 server sshd\[9556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.235.17  user=root
Nov  5 17:40:20 server sshd\[9556\]: Failed password for root from 115.159.235.17 port 45610 ssh2
...
2019-11-06 00:06:09
45.136.110.41 attackspambots
45.136.110.41 was recorded 7 times by 2 hosts attempting to connect to the following ports: 533,14148,10480,18185,9520,3140,9485. Incident counter (4h, 24h, all-time): 7, 50, 214
2019-11-05 23:37:16
51.38.189.150 attackspam
Nov  5 05:22:03 eddieflores sshd\[8141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.ip-51-38-189.eu  user=root
Nov  5 05:22:05 eddieflores sshd\[8141\]: Failed password for root from 51.38.189.150 port 58038 ssh2
Nov  5 05:25:53 eddieflores sshd\[8465\]: Invalid user gerrit from 51.38.189.150
Nov  5 05:25:53 eddieflores sshd\[8465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.ip-51-38-189.eu
Nov  5 05:25:55 eddieflores sshd\[8465\]: Failed password for invalid user gerrit from 51.38.189.150 port 39912 ssh2
2019-11-06 00:09:03
182.162.143.236 attackbots
2019-11-05T15:41:26.146129abusebot-5.cloudsearch.cf sshd\[27410\]: Invalid user keith from 182.162.143.236 port 46344
2019-11-05 23:57:18
122.52.121.128 attackspambots
2019-11-05T15:48:28.516125abusebot-2.cloudsearch.cf sshd\[26588\]: Invalid user jenkins from 122.52.121.128 port 38238
2019-11-06 00:08:48

最近上报的IP列表

104.21.18.50 104.21.19.106 104.21.18.97 104.21.18.93
104.21.19.11 125.77.73.114 104.21.19.113 190.143.111.132
153.51.7.148 104.21.19.121 104.21.19.124 104.21.19.141
104.21.19.116 104.21.19.15 104.21.19.181 104.21.19.173
104.21.19.131 104.21.19.185 104.21.19.183 104.21.19.162