必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.235.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42224
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.235.9.			IN	A

;; AUTHORITY SECTION:
.			262	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 08:57:32 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 9.235.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.235.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
187.59.243.225 attackspam
Automatic report - Port Scan Attack
2020-01-14 07:42:38
103.48.192.48 attack
Jan 13 03:28:06 : SSH login attempts with invalid user
2020-01-14 07:49:17
49.88.112.113 attackspam
Jan 13 18:22:40 plusreed sshd[15962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Jan 13 18:22:42 plusreed sshd[15962]: Failed password for root from 49.88.112.113 port 22734 ssh2
...
2020-01-14 07:30:52
200.219.152.41 attackbots
IMAP
2020-01-14 07:35:50
209.235.67.49 attack
Jan 13 06:29:33 : SSH login attempts with invalid user
2020-01-14 07:32:18
36.230.66.148 attackspam
Jan 13 21:17:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: r.r)
Jan 13 21:17:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: admin)
Jan 13 21:17:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: 12345)
Jan 13 21:17:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: guest)
Jan 13 21:17:13 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: 123456)
Jan 13 21:17:14 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.230.66.148 port 46120 ssh2 (target: 158.69.100.156:22, password: 1234)
Jan 13 21:17:14 wildwolf ssh-honeypotd[26164]: Failed password for r.r from 36.23........
------------------------------
2020-01-14 07:40:26
218.92.0.184 attack
20/1/13@18:51:12: FAIL: IoT-SSH address from=218.92.0.184
...
2020-01-14 07:53:05
45.88.110.27 attack
Jan 13 23:51:48 Invalid user user from 45.88.110.27 port 40464
2020-01-14 07:28:02
129.146.172.170 attack
fail2ban
2020-01-14 07:38:32
82.196.124.208 attack
Jan 14 01:38:37 www sshd\[65720\]: Invalid user idc from 82.196.124.208
Jan 14 01:38:37 www sshd\[65720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.124.208
Jan 14 01:38:39 www sshd\[65720\]: Failed password for invalid user idc from 82.196.124.208 port 38980 ssh2
...
2020-01-14 07:57:13
159.65.49.251 attackbotsspam
Jan 14 00:16:17 meumeu sshd[27895]: Failed password for root from 159.65.49.251 port 53504 ssh2
Jan 14 00:18:31 meumeu sshd[28277]: Failed password for root from 159.65.49.251 port 46672 ssh2
...
2020-01-14 07:36:59
104.225.159.30 attackspambots
Jan 13 17:33:08 Tower sshd[12735]: Connection from 104.225.159.30 port 56720 on 192.168.10.220 port 22 rdomain ""
Jan 13 17:33:08 Tower sshd[12735]: Invalid user teste from 104.225.159.30 port 56720
Jan 13 17:33:08 Tower sshd[12735]: error: Could not get shadow information for NOUSER
Jan 13 17:33:08 Tower sshd[12735]: Failed password for invalid user teste from 104.225.159.30 port 56720 ssh2
Jan 13 17:33:08 Tower sshd[12735]: Received disconnect from 104.225.159.30 port 56720:11: Bye Bye [preauth]
Jan 13 17:33:08 Tower sshd[12735]: Disconnected from invalid user teste 104.225.159.30 port 56720 [preauth]
2020-01-14 07:54:25
106.8.86.51 attackbots
Unauthorized connection attempt detected from IP address 106.8.86.51 to port 23 [J]
2020-01-14 07:54:06
205.209.158.46 attack
20/1/13@16:21:52: FAIL: Alarm-Network address from=205.209.158.46
20/1/13@16:21:52: FAIL: Alarm-Network address from=205.209.158.46
20/1/13@16:21:52: FAIL: Alarm-Network address from=205.209.158.46
...
2020-01-14 07:53:40
125.74.10.146 attackbotsspam
Jan 14 00:17:20 vmanager6029 sshd\[15157\]: Invalid user msilva from 125.74.10.146 port 59066
Jan 14 00:17:20 vmanager6029 sshd\[15157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.10.146
Jan 14 00:17:22 vmanager6029 sshd\[15157\]: Failed password for invalid user msilva from 125.74.10.146 port 59066 ssh2
2020-01-14 07:29:44

最近上报的IP列表

104.21.235.82 104.21.235.93 104.21.235.94 104.21.24.138
104.21.24.161 154.216.113.2 104.21.24.162 104.21.24.191
104.21.24.195 104.21.24.200 104.21.24.209 104.21.24.220
104.21.24.221 104.21.24.233 104.21.24.235 177.242.108.122
104.21.24.236 156.114.169.47 84.78.22.94 104.21.24.34