必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.234.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57330
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.234.243.			IN	A

;; AUTHORITY SECTION:
.			414	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:18:03 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 243.234.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.234.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
160.16.148.161 attack
Aug 14 16:39:54 Tower sshd[24165]: Connection from 160.16.148.161 port 59260 on 192.168.10.220 port 22 rdomain ""
Aug 14 16:39:55 Tower sshd[24165]: Failed password for root from 160.16.148.161 port 59260 ssh2
Aug 14 16:39:55 Tower sshd[24165]: Received disconnect from 160.16.148.161 port 59260:11: Bye Bye [preauth]
Aug 14 16:39:55 Tower sshd[24165]: Disconnected from authenticating user root 160.16.148.161 port 59260 [preauth]
2020-08-15 08:23:31
114.33.101.245 attackspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-15 08:35:57
159.192.143.249 attackspambots
Aug 14 23:31:10 lukav-desktop sshd\[22881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.143.249  user=root
Aug 14 23:31:13 lukav-desktop sshd\[22881\]: Failed password for root from 159.192.143.249 port 45698 ssh2
Aug 14 23:35:28 lukav-desktop sshd\[24917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.143.249  user=root
Aug 14 23:35:30 lukav-desktop sshd\[24917\]: Failed password for root from 159.192.143.249 port 35016 ssh2
Aug 14 23:39:39 lukav-desktop sshd\[27011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.143.249  user=root
2020-08-15 08:40:21
148.240.70.42 attack
2020-08-15T03:35:17.173337billing sshd[21852]: Failed password for root from 148.240.70.42 port 33802 ssh2
2020-08-15T03:39:46.585383billing sshd[31834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148-240-70-42.reservada.static.axtel.net  user=root
2020-08-15T03:39:48.779089billing sshd[31834]: Failed password for root from 148.240.70.42 port 34300 ssh2
...
2020-08-15 08:35:27
192.241.169.184 attackbots
Failed password for root from 192.241.169.184 port 56892 ssh2
2020-08-15 08:12:07
139.155.30.122 attack
detected by Fail2Ban
2020-08-15 08:13:52
189.211.186.154 attack
Icarus honeypot on github
2020-08-15 08:16:31
202.184.31.64 attackbots
Aug 14 22:34:20 melroy-server sshd[25652]: Failed password for root from 202.184.31.64 port 54852 ssh2
...
2020-08-15 08:37:27
60.173.116.25 attackspam
2020-08-14T23:56:58.170105shield sshd\[21002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.173.116.25  user=root
2020-08-14T23:57:01.010810shield sshd\[21002\]: Failed password for root from 60.173.116.25 port 50018 ssh2
2020-08-15T00:01:41.429460shield sshd\[21507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.173.116.25  user=root
2020-08-15T00:01:43.453256shield sshd\[21507\]: Failed password for root from 60.173.116.25 port 53006 ssh2
2020-08-15T00:06:18.977417shield sshd\[22054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.173.116.25  user=root
2020-08-15 08:13:18
95.29.16.190 attackspambots
1597437629 - 08/14/2020 22:40:29 Host: 95.29.16.190/95.29.16.190 Port: 445 TCP Blocked
2020-08-15 08:08:01
185.200.118.58 attackspam
 UDP 185.200.118.58:46394 -> port 1194, len 42
2020-08-15 08:14:40
113.22.25.119 attackspam
Unauthorized connection attempt from IP address 113.22.25.119 on Port 445(SMB)
2020-08-15 08:33:46
106.75.3.59 attackbots
Ssh brute force
2020-08-15 08:06:01
139.59.57.2 attackspambots
Aug 15 02:19:59 mout sshd[3344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.57.2  user=root
Aug 15 02:20:01 mout sshd[3344]: Failed password for root from 139.59.57.2 port 59596 ssh2
2020-08-15 08:21:09
64.57.253.25 attack
Aug 14 22:36:41 nextcloud sshd\[14520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.57.253.25  user=root
Aug 14 22:36:42 nextcloud sshd\[14520\]: Failed password for root from 64.57.253.25 port 54882 ssh2
Aug 14 22:40:14 nextcloud sshd\[18539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.57.253.25  user=root
2020-08-15 08:18:23

最近上报的IP列表

104.21.234.236 104.21.68.230 104.21.234.29 104.21.234.28
104.21.234.45 104.21.234.44 104.21.234.253 104.21.234.51
104.21.234.50 104.21.234.57 104.21.234.56 104.21.68.232
104.21.234.58 104.21.234.8 104.21.234.72 104.21.234.59
104.21.234.86 104.21.234.73 104.21.234.98 104.21.234.9