必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.205.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27639
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.205.108.			IN	A

;; AUTHORITY SECTION:
.			398	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 05:49:32 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 108.205.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.205.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.161.57.123 attack
Forbidden access
2020-07-18 03:54:12
195.97.75.174 attackbotsspam
Jul 17 21:25:56 [host] sshd[18390]: Invalid user m
Jul 17 21:25:56 [host] sshd[18390]: pam_unix(sshd:
Jul 17 21:25:57 [host] sshd[18390]: Failed passwor
2020-07-18 03:30:45
69.51.16.248 attack
Failed password for invalid user su from 69.51.16.248 port 35972 ssh2
2020-07-18 03:49:26
160.16.80.134 attackbotsspam
Failed password for invalid user cs from 160.16.80.134 port 57714 ssh2
2020-07-18 03:54:41
37.187.125.235 attack
2020-07-17T18:21:31.191081abusebot.cloudsearch.cf sshd[15808]: Invalid user joerg from 37.187.125.235 port 38438
2020-07-17T18:21:31.198062abusebot.cloudsearch.cf sshd[15808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns333356.ip-37-187-125.eu
2020-07-17T18:21:31.191081abusebot.cloudsearch.cf sshd[15808]: Invalid user joerg from 37.187.125.235 port 38438
2020-07-17T18:21:32.931573abusebot.cloudsearch.cf sshd[15808]: Failed password for invalid user joerg from 37.187.125.235 port 38438 ssh2
2020-07-17T18:28:55.679633abusebot.cloudsearch.cf sshd[16045]: Invalid user www from 37.187.125.235 port 52062
2020-07-17T18:28:55.683473abusebot.cloudsearch.cf sshd[16045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns333356.ip-37-187-125.eu
2020-07-17T18:28:55.679633abusebot.cloudsearch.cf sshd[16045]: Invalid user www from 37.187.125.235 port 52062
2020-07-17T18:28:57.173387abusebot.cloudsearch.cf sshd[16045
...
2020-07-18 03:52:27
212.154.58.143 attackspam
Port scan on 1 port(s): 21
2020-07-18 03:49:46
148.70.31.188 attack
$f2bV_matches
2020-07-18 03:50:36
124.105.87.101 attackspambots
1594987718 - 07/17/2020 14:08:38 Host: 124.105.87.101/124.105.87.101 Port: 445 TCP Blocked
2020-07-18 03:37:27
122.51.72.249 attackspambots
Jul 17 17:16:27 jane sshd[24698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.72.249 
Jul 17 17:16:29 jane sshd[24698]: Failed password for invalid user mcq from 122.51.72.249 port 32872 ssh2
...
2020-07-18 03:43:52
185.158.113.43 attack
RDP Bruteforce
2020-07-18 03:26:20
45.145.66.106 attackspam
[H1.VM6] Blocked by UFW
2020-07-18 04:01:41
72.167.190.203 attackbots
Automatic report - XMLRPC Attack
2020-07-18 03:58:29
45.125.65.52 attackbots
Jul 17 21:01:17 srv01 postfix/smtpd\[6772\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 21:01:56 srv01 postfix/smtpd\[11583\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 21:02:14 srv01 postfix/smtpd\[11583\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 21:06:48 srv01 postfix/smtpd\[6770\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 21:07:22 srv01 postfix/smtpd\[6770\]: warning: unknown\[45.125.65.52\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-18 03:28:20
180.151.56.103 attackbots
Jul 17 15:21:28 ns392434 sshd[7590]: Invalid user ubuntu from 180.151.56.103 port 50832
Jul 17 15:21:28 ns392434 sshd[7590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.151.56.103
Jul 17 15:21:28 ns392434 sshd[7590]: Invalid user ubuntu from 180.151.56.103 port 50832
Jul 17 15:21:30 ns392434 sshd[7590]: Failed password for invalid user ubuntu from 180.151.56.103 port 50832 ssh2
Jul 17 15:51:30 ns392434 sshd[8615]: Invalid user laura from 180.151.56.103 port 40748
Jul 17 15:51:30 ns392434 sshd[8615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.151.56.103
Jul 17 15:51:30 ns392434 sshd[8615]: Invalid user laura from 180.151.56.103 port 40748
Jul 17 15:51:33 ns392434 sshd[8615]: Failed password for invalid user laura from 180.151.56.103 port 40748 ssh2
Jul 17 15:52:52 ns392434 sshd[8635]: Invalid user user1 from 180.151.56.103 port 55994
2020-07-18 03:54:25
159.65.158.30 attackspambots
2020-07-17T17:58:14.637643abusebot-8.cloudsearch.cf sshd[1353]: Invalid user ftpadmin from 159.65.158.30 port 33684
2020-07-17T17:58:14.643839abusebot-8.cloudsearch.cf sshd[1353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.30
2020-07-17T17:58:14.637643abusebot-8.cloudsearch.cf sshd[1353]: Invalid user ftpadmin from 159.65.158.30 port 33684
2020-07-17T17:58:16.589744abusebot-8.cloudsearch.cf sshd[1353]: Failed password for invalid user ftpadmin from 159.65.158.30 port 33684 ssh2
2020-07-17T18:06:21.946132abusebot-8.cloudsearch.cf sshd[1378]: Invalid user baba from 159.65.158.30 port 58668
2020-07-17T18:06:21.951799abusebot-8.cloudsearch.cf sshd[1378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.158.30
2020-07-17T18:06:21.946132abusebot-8.cloudsearch.cf sshd[1378]: Invalid user baba from 159.65.158.30 port 58668
2020-07-17T18:06:23.752382abusebot-8.cloudsearch.cf sshd[1378]: Failed 
...
2020-07-18 03:19:09

最近上报的IP列表

104.21.203.5 104.21.213.68 104.21.220.151 104.21.221.168
104.210.109.151 104.210.36.193 104.210.60.150 104.210.73.202
104.211.136.51 104.211.181.225 104.211.217.120 104.211.221.195
104.211.31.21 104.211.54.253 104.214.114.99 104.22.11.201
104.22.12.109 104.22.12.157 104.22.13.109 104.22.13.157