必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.21.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40573
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.21.232.			IN	A

;; AUTHORITY SECTION:
.			518	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:15:53 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 232.21.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 232.21.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
219.133.71.26 attackspam
Aug  5 22:33:00 Ubuntu-1404-trusty-64-minimal sshd\[15554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.133.71.26  user=root
Aug  5 22:33:02 Ubuntu-1404-trusty-64-minimal sshd\[15554\]: Failed password for root from 219.133.71.26 port 39508 ssh2
Aug  5 22:34:23 Ubuntu-1404-trusty-64-minimal sshd\[15990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.133.71.26  user=root
Aug  5 22:34:24 Ubuntu-1404-trusty-64-minimal sshd\[15990\]: Failed password for root from 219.133.71.26 port 51550 ssh2
Aug  5 22:35:49 Ubuntu-1404-trusty-64-minimal sshd\[16415\]: Invalid user com from 219.133.71.26
Aug  5 22:35:49 Ubuntu-1404-trusty-64-minimal sshd\[16415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.133.71.26
2020-08-06 08:46:29
180.180.241.93 attackspambots
(sshd) Failed SSH login from 180.180.241.93 (TH/Thailand/-): 5 in the last 3600 secs
2020-08-06 12:03:15
104.131.45.150 attack
Lines containing failures of 104.131.45.150
Aug  3 00:07:20 shared02 sshd[17393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.45.150  user=r.r
Aug  3 00:07:22 shared02 sshd[17393]: Failed password for r.r from 104.131.45.150 port 41584 ssh2
Aug  3 00:07:22 shared02 sshd[17393]: Received disconnect from 104.131.45.150 port 41584:11: Bye Bye [preauth]
Aug  3 00:07:22 shared02 sshd[17393]: Disconnected from authenticating user r.r 104.131.45.150 port 41584 [preauth]
Aug  3 00:18:21 shared02 sshd[23428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.45.150  user=r.r
Aug  3 00:18:23 shared02 sshd[23428]: Failed password for r.r from 104.131.45.150 port 33536 ssh2
Aug  3 00:18:23 shared02 sshd[23428]: Received disconnect from 104.131.45.150 port 33536:11: Bye Bye [preauth]
Aug  3 00:18:23 shared02 sshd[23428]: Disconnected from authenticating user r.r 104.131.45.150 port 33536........
------------------------------
2020-08-06 08:44:38
37.49.230.35 attackspambots
Unauthorized connection attempt detected from IP address 37.49.230.35 to port 4567
2020-08-06 12:18:08
115.207.44.230 attack
08/05/2020-23:55:57.186127 115.207.44.230 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-08-06 12:03:48
222.186.173.183 attackbotsspam
Triggered by Fail2Ban at Ares web server
2020-08-06 12:15:25
36.89.81.175 attackspambots
Unauthorised access (Aug  5) SRC=36.89.81.175 LEN=52 TOS=0x10 PREC=0x40 TTL=118 ID=23784 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-06 08:59:25
81.171.19.24 attackspambots
81.171.19.24 - - [06/Aug/2020:05:15:25 +0100] "POST /wp-login.php HTTP/1.1" 200 2006 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
81.171.19.24 - - [06/Aug/2020:05:15:26 +0100] "POST /wp-login.php HTTP/1.1" 200 1927 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
81.171.19.24 - - [06/Aug/2020:05:15:26 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-06 12:17:21
104.203.89.202 attackbotsspam
Unauthorized connection attempt from IP address 104.203.89.202 on port 3389
2020-08-06 12:12:50
148.66.142.174 attackbotsspam
Automatic report - Banned IP Access
2020-08-06 12:09:18
35.182.190.5 attackspam
35.182.190.5 - - [06/Aug/2020:05:55:41 +0200] "GET /wp-login.php HTTP/1.1" 200 5738 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.182.190.5 - - [06/Aug/2020:05:55:42 +0200] "POST /wp-login.php HTTP/1.1" 200 5989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
35.182.190.5 - - [06/Aug/2020:05:55:43 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-06 12:13:34
61.177.172.128 attackspambots
Aug  6 02:42:29 minden010 sshd[6684]: Failed password for root from 61.177.172.128 port 44109 ssh2
Aug  6 02:42:32 minden010 sshd[6684]: Failed password for root from 61.177.172.128 port 44109 ssh2
Aug  6 02:42:35 minden010 sshd[6684]: Failed password for root from 61.177.172.128 port 44109 ssh2
Aug  6 02:42:38 minden010 sshd[6684]: Failed password for root from 61.177.172.128 port 44109 ssh2
...
2020-08-06 08:44:18
114.67.105.7 attack
(sshd) Failed SSH login from 114.67.105.7 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  6 05:46:14 amsweb01 sshd[25727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.105.7  user=root
Aug  6 05:46:16 amsweb01 sshd[25727]: Failed password for root from 114.67.105.7 port 44880 ssh2
Aug  6 05:53:19 amsweb01 sshd[26610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.105.7  user=root
Aug  6 05:53:21 amsweb01 sshd[26610]: Failed password for root from 114.67.105.7 port 50519 ssh2
Aug  6 05:55:42 amsweb01 sshd[26917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.105.7  user=root
2020-08-06 12:11:20
189.90.114.37 attackbotsspam
Aug  5 23:01:29 abendstille sshd\[15740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.114.37  user=root
Aug  5 23:01:31 abendstille sshd\[15740\]: Failed password for root from 189.90.114.37 port 23489 ssh2
Aug  5 23:03:25 abendstille sshd\[17577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.114.37  user=root
Aug  5 23:03:27 abendstille sshd\[17577\]: Failed password for root from 189.90.114.37 port 24929 ssh2
Aug  5 23:05:19 abendstille sshd\[19246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.90.114.37  user=root
...
2020-08-06 08:56:19
103.228.53.59 attackbots
20/8/5@23:55:51: FAIL: Alarm-Intrusion address from=103.228.53.59
...
2020-08-06 12:04:08

最近上报的IP列表

104.21.21.26 104.21.21.250 104.21.21.25 104.21.21.243
104.21.21.254 104.21.21.27 104.21.21.30 104.21.21.36
104.21.21.39 104.21.68.169 104.21.21.31 104.21.21.33
104.21.21.42 104.21.21.43 104.21.21.48 104.21.21.5
104.21.21.64 104.21.21.45 104.21.21.65 104.21.21.67