必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.28.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22578
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.28.168.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 20:03:03 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 168.28.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.28.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.155.23.35 attack
$f2bV_matches
2019-10-30 17:34:31
180.183.198.127 attackspambots
Unauthorised access (Oct 30) SRC=180.183.198.127 LEN=52 TTL=113 ID=1567 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-30 18:02:20
45.82.153.132 attackspam
2019-10-30T10:54:59.208947mail01 postfix/smtpd[4780]: warning: unknown[45.82.153.132]: SASL PLAIN authentication failed:
2019-10-30T10:55:06.164729mail01 postfix/smtpd[22186]: warning: unknown[45.82.153.132]: SASL PLAIN authentication failed:
2019-10-30T10:56:33.187271mail01 postfix/smtpd[3952]: warning: unknown[45.82.153.132]: SASL PLAIN authentication failed:
2019-10-30 17:57:13
121.28.12.24 attackbotsspam
82/tcp
[2019-10-30]1pkt
2019-10-30 17:27:55
180.249.245.169 attack
445/tcp
[2019-10-30]1pkt
2019-10-30 17:47:41
74.80.33.7 attackspambots
RDP Bruteforce
2019-10-30 17:39:29
103.8.118.152 attack
Unauthorised access (Oct 30) SRC=103.8.118.152 LEN=52 TTL=116 ID=20085 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 30) SRC=103.8.118.152 LEN=52 TTL=114 ID=24162 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-30 18:00:16
211.195.12.33 attack
(sshd) Failed SSH login from 211.195.12.33 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 30 09:22:46 server2 sshd[25596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33  user=root
Oct 30 09:22:47 server2 sshd[25596]: Failed password for root from 211.195.12.33 port 51295 ssh2
Oct 30 09:28:34 server2 sshd[25769]: Invalid user administrator from 211.195.12.33 port 46369
Oct 30 09:28:36 server2 sshd[25769]: Failed password for invalid user administrator from 211.195.12.33 port 46369 ssh2
Oct 30 09:33:04 server2 sshd[25894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.195.12.33  user=root
2019-10-30 18:03:10
199.229.249.177 attackbotsspam
199.229.249.177 - admin \[29/Oct/2019:20:21:57 -0700\] "GET /rss/order/new HTTP/1.1" 401 25199.229.249.177 - admin \[29/Oct/2019:20:33:05 -0700\] "GET /rss/order/new HTTP/1.1" 401 25199.229.249.177 - admin \[29/Oct/2019:20:49:39 -0700\] "GET /rss/order/new HTTP/1.1" 401 25
...
2019-10-30 17:32:22
142.93.39.177 attack
5007/tcp
[2019-10-30]1pkt
2019-10-30 17:55:00
138.197.175.236 attackspam
Invalid user shclient from 138.197.175.236 port 42472
2019-10-30 17:40:35
77.42.106.156 attackspambots
2323/tcp
[2019-10-30]1pkt
2019-10-30 17:38:24
35.193.136.194 attack
Automatic report - XMLRPC Attack
2019-10-30 17:29:12
140.115.22.94 attackspam
5x Failed Password
2019-10-30 17:53:44
201.249.182.148 attackbotsspam
445/tcp 445/tcp
[2019-10-30]2pkt
2019-10-30 17:33:46

最近上报的IP列表

230.255.208.85 104.21.28.175 104.21.28.178 104.21.28.179
104.21.28.18 104.21.28.180 104.21.28.185 104.21.28.189
104.21.28.194 104.21.28.196 104.21.28.197 104.21.28.199
104.21.28.201 104.21.28.209 104.21.28.210 104.21.28.211
104.21.28.220 104.21.28.225 104.21.28.23 104.21.28.231