必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.28.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44240
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.28.195.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:29:38 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 195.28.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.28.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.144.53.94 attackspambots
(From noreply@gplforest3431.tech) Hello There,

Are you using Wordpress/Woocommerce or maybe do you actually plan to work with it later on ? We currently offer more than 2500 premium plugins and also themes 100 % free to download : http://riply.xyz/Ne0XA

Cheers,

Mac
2019-10-17 15:42:08
212.154.114.130 attackspam
firewall-block, port(s): 445/tcp
2019-10-17 16:15:15
204.111.241.83 attackspambots
Invalid user pi from 204.111.241.83 port 34120
2019-10-17 15:58:55
107.170.76.170 attackspam
Tried sshing with brute force.
2019-10-17 16:16:02
5.189.16.37 attackbotsspam
Oct 17 08:40:28 mc1 kernel: \[2580796.384858\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=5.189.16.37 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=48041 PROTO=TCP SPT=45729 DPT=15565 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 08:42:38 mc1 kernel: \[2580926.701193\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=5.189.16.37 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=21830 PROTO=TCP SPT=45729 DPT=14967 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 08:47:00 mc1 kernel: \[2581189.049535\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=5.189.16.37 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=20147 PROTO=TCP SPT=45729 DPT=14367 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-17 15:45:03
121.204.150.59 attack
Oct 17 09:25:26 MK-Soft-VM6 sshd[23816]: Failed password for root from 121.204.150.59 port 38588 ssh2
...
2019-10-17 16:16:48
49.235.239.80 attackbotsspam
Oct 15 22:12:43 xb0 sshd[31758]: Failed password for invalid user cj from 49.235.239.80 port 40350 ssh2
Oct 15 22:12:43 xb0 sshd[31758]: Received disconnect from 49.235.239.80: 11: Bye Bye [preauth]
Oct 15 22:30:17 xb0 sshd[20359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.239.80  user=r.r
Oct 15 22:30:19 xb0 sshd[20359]: Failed password for r.r from 49.235.239.80 port 48218 ssh2
Oct 15 22:30:19 xb0 sshd[20359]: Received disconnect from 49.235.239.80: 11: Bye Bye [preauth]
Oct 15 22:34:25 xb0 sshd[6410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.239.80  user=r.r
Oct 15 22:34:27 xb0 sshd[6410]: Failed password for r.r from 49.235.239.80 port 54032 ssh2
Oct 15 22:34:28 xb0 sshd[6410]: Received disconnect from 49.235.239.80: 11: Bye Bye [preauth]
Oct 15 22:38:28 xb0 sshd[3159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.2........
-------------------------------
2019-10-17 16:06:01
180.165.1.44 attack
Oct 17 04:05:50 game-panel sshd[30159]: Failed password for root from 180.165.1.44 port 33358 ssh2
Oct 17 04:10:17 game-panel sshd[30393]: Failed password for root from 180.165.1.44 port 42988 ssh2
2019-10-17 16:07:22
117.50.49.74 attack
Automatic report - SSH Brute-Force Attack
2019-10-17 16:04:52
40.135.239.35 attackbots
$f2bV_matches
2019-10-17 16:05:19
106.243.162.3 attackspam
Oct 17 07:08:33 www sshd\[240170\]: Invalid user one from 106.243.162.3
Oct 17 07:08:33 www sshd\[240170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.243.162.3
Oct 17 07:08:35 www sshd\[240170\]: Failed password for invalid user one from 106.243.162.3 port 60675 ssh2
...
2019-10-17 15:56:00
203.195.243.146 attackspambots
Oct 17 08:38:49 lnxweb62 sshd[20041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.243.146
2019-10-17 16:10:37
112.179.242.181 attackbots
POP
2019-10-17 15:41:13
113.80.86.2 attackbotsspam
Oct 17 00:39:37 Tower sshd[42950]: Connection from 113.80.86.2 port 41552 on 192.168.10.220 port 22
Oct 17 00:39:38 Tower sshd[42950]: Failed password for root from 113.80.86.2 port 41552 ssh2
Oct 17 00:39:39 Tower sshd[42950]: Received disconnect from 113.80.86.2 port 41552:11: Bye Bye [preauth]
Oct 17 00:39:39 Tower sshd[42950]: Disconnected from authenticating user root 113.80.86.2 port 41552 [preauth]
2019-10-17 15:52:58
80.43.241.201 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/80.43.241.201/ 
 GB - 1H : (85)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GB 
 NAME ASN : ASN9105 
 
 IP : 80.43.241.201 
 
 CIDR : 80.40.0.0/13 
 
 PREFIX COUNT : 42 
 
 UNIQUE IP COUNT : 3022848 
 
 
 WYKRYTE ATAKI Z ASN9105 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 7 
 
 DateTime : 2019-10-17 05:51:20 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-17 16:01:34

最近上报的IP列表

104.21.28.228 104.21.28.241 104.21.28.20 104.21.28.38
104.21.29.116 104.21.29.215 104.21.29.210 104.21.29.99
104.21.3.156 104.21.3.168 104.21.3.137 104.21.30.100
104.21.3.29 104.21.3.22 104.21.30.14 104.21.3.93
104.21.30.120 104.21.30.184 104.21.30.172 104.21.30.250