必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.21.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58867
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.21.129.			IN	A

;; AUTHORITY SECTION:
.			593	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022201 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 03:55:58 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 129.21.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 129.21.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
63.159.251.38 attackspambots
Unauthorized connection attempt from IP address 63.159.251.38 on Port 445(SMB)
2019-10-06 01:55:59
14.228.34.230 attack
Unauthorized connection attempt from IP address 14.228.34.230 on Port 445(SMB)
2019-10-06 01:32:15
181.30.26.40 attackspambots
2019-10-05T12:30:57.870941ns525875 sshd\[12844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.26.40  user=root
2019-10-05T12:30:59.985829ns525875 sshd\[12844\]: Failed password for root from 181.30.26.40 port 35016 ssh2
2019-10-05T12:35:24.636796ns525875 sshd\[18303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.26.40  user=root
2019-10-05T12:35:26.741524ns525875 sshd\[18303\]: Failed password for root from 181.30.26.40 port 45702 ssh2
...
2019-10-06 01:40:13
36.76.183.184 attack
Unauthorized connection attempt from IP address 36.76.183.184 on Port 445(SMB)
2019-10-06 01:52:46
125.164.137.152 attackspam
Unauthorized connection attempt from IP address 125.164.137.152 on Port 445(SMB)
2019-10-06 02:02:43
145.239.41.135 attack
Port scan: Attack repeated for 24 hours
2019-10-06 01:54:45
201.55.199.143 attack
Oct  5 16:12:09 web8 sshd\[12719\]: Invalid user 123Word from 201.55.199.143
Oct  5 16:12:09 web8 sshd\[12719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.199.143
Oct  5 16:12:11 web8 sshd\[12719\]: Failed password for invalid user 123Word from 201.55.199.143 port 34544 ssh2
Oct  5 16:21:26 web8 sshd\[17247\]: Invalid user Cold@123 from 201.55.199.143
Oct  5 16:21:26 web8 sshd\[17247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.199.143
2019-10-06 01:28:43
27.76.110.96 attackbots
Unauthorized connection attempt from IP address 27.76.110.96 on Port 445(SMB)
2019-10-06 01:38:16
144.217.42.212 attackspam
SSH brute-force: detected 10 distinct usernames within a 24-hour window.
2019-10-06 01:38:00
221.224.194.83 attack
Oct  5 19:29:15 eventyay sshd[16712]: Failed password for root from 221.224.194.83 port 44046 ssh2
Oct  5 19:33:35 eventyay sshd[16782]: Failed password for root from 221.224.194.83 port 51092 ssh2
...
2019-10-06 01:42:00
199.204.248.231 attackbots
Automatic report - Banned IP Access
2019-10-06 01:25:29
123.19.228.76 attackspambots
Unauthorized connection attempt from IP address 123.19.228.76 on Port 445(SMB)
2019-10-06 02:05:29
46.70.11.88 attack
Unauthorized connection attempt from IP address 46.70.11.88 on Port 445(SMB)
2019-10-06 01:30:53
198.108.66.33 attack
" "
2019-10-06 01:46:41
171.249.80.40 attackbots
Unauthorized connection attempt from IP address 171.249.80.40 on Port 445(SMB)
2019-10-06 01:39:13

最近上报的IP列表

104.21.20.246 104.21.21.223 104.21.21.58 104.21.22.79
104.21.23.196 104.21.23.205 104.21.233.167 104.21.233.168
104.21.233.169 104.21.233.170 104.21.233.219 104.21.233.220
104.21.235.123 104.21.235.124 104.21.25.14 104.21.25.201
104.21.26.147 104.21.26.167 104.21.27.121 104.21.27.138