必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.28.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.28.64.			IN	A

;; AUTHORITY SECTION:
.			170	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:21:41 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 64.28.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 64.28.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.161.74.125 attackspambots
Invalid user paul from 111.161.74.125 port 11121
2020-09-26 22:47:09
23.98.73.106 attackbotsspam
Sep 26 16:40:40 vmd26974 sshd[18403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.98.73.106
Sep 26 16:40:43 vmd26974 sshd[18403]: Failed password for invalid user admin from 23.98.73.106 port 55636 ssh2
...
2020-09-26 22:47:53
1.1.214.95 attack
2020-05-21T13:57:22.777218suse-nuc sshd[6015]: Invalid user admin from 1.1.214.95 port 43183
...
2020-09-26 22:18:37
137.117.36.154 attackspambots
SSH Brute-Force Attack
2020-09-26 22:53:39
49.36.56.209 attackbots
20/9/25@16:38:44: FAIL: Alarm-Network address from=49.36.56.209
...
2020-09-26 22:32:50
79.49.104.39 attackbots
(sshd) Failed SSH login from 79.49.104.39 (IT/Italy/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 08:59:34 jbs1 sshd[14516]: Invalid user best from 79.49.104.39
Sep 26 08:59:36 jbs1 sshd[14516]: Failed password for invalid user best from 79.49.104.39 port 41368 ssh2
Sep 26 09:05:02 jbs1 sshd[16281]: Failed password for root from 79.49.104.39 port 49154 ssh2
Sep 26 09:06:43 jbs1 sshd[16848]: Invalid user deploy from 79.49.104.39
Sep 26 09:06:45 jbs1 sshd[16848]: Failed password for invalid user deploy from 79.49.104.39 port 47358 ssh2
2020-09-26 22:56:29
104.211.245.131 attackbotsspam
2020-09-26T13:58:20.329108vps773228.ovh.net sshd[28248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.245.131
2020-09-26T13:58:20.318856vps773228.ovh.net sshd[28248]: Invalid user admin from 104.211.245.131 port 23395
2020-09-26T13:58:22.402543vps773228.ovh.net sshd[28248]: Failed password for invalid user admin from 104.211.245.131 port 23395 ssh2
2020-09-26T16:35:28.072911vps773228.ovh.net sshd[30100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.245.131  user=root
2020-09-26T16:35:30.116105vps773228.ovh.net sshd[30100]: Failed password for root from 104.211.245.131 port 58405 ssh2
...
2020-09-26 22:37:34
167.71.227.75 attackbotsspam
fail2ban -- 167.71.227.75
...
2020-09-26 22:57:40
211.145.49.253 attackspam
Automatic Fail2ban report - Trying login SSH
2020-09-26 22:40:49
189.132.173.220 attackspam
1601066327 - 09/25/2020 22:38:47 Host: 189.132.173.220/189.132.173.220 Port: 445 TCP Blocked
2020-09-26 22:29:34
175.123.253.220 attackspam
(sshd) Failed SSH login from 175.123.253.220 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 09:57:11 jbs1 sshd[594]: Invalid user postgres from 175.123.253.220
Sep 26 09:57:11 jbs1 sshd[594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.123.253.220 
Sep 26 09:57:13 jbs1 sshd[594]: Failed password for invalid user postgres from 175.123.253.220 port 43668 ssh2
Sep 26 10:03:17 jbs1 sshd[2418]: Invalid user mongod from 175.123.253.220
Sep 26 10:03:17 jbs1 sshd[2418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.123.253.220
2020-09-26 22:23:55
20.193.64.26 attack
Sep 26 14:07:04 IngegnereFirenze sshd[3897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.193.64.26  user=root
...
2020-09-26 22:25:50
179.181.97.214 attackbots
1601066323 - 09/25/2020 22:38:43 Host: 179.181.97.214/179.181.97.214 Port: 445 TCP Blocked
2020-09-26 22:34:38
132.232.80.87 attack
2020-09-26T08:29:23.033750abusebot-5.cloudsearch.cf sshd[32449]: Invalid user warehouse from 132.232.80.87 port 55820
2020-09-26T08:29:23.041324abusebot-5.cloudsearch.cf sshd[32449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.80.87
2020-09-26T08:29:23.033750abusebot-5.cloudsearch.cf sshd[32449]: Invalid user warehouse from 132.232.80.87 port 55820
2020-09-26T08:29:25.339073abusebot-5.cloudsearch.cf sshd[32449]: Failed password for invalid user warehouse from 132.232.80.87 port 55820 ssh2
2020-09-26T08:32:31.755010abusebot-5.cloudsearch.cf sshd[32458]: Invalid user ark from 132.232.80.87 port 37142
2020-09-26T08:32:31.763040abusebot-5.cloudsearch.cf sshd[32458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.80.87
2020-09-26T08:32:31.755010abusebot-5.cloudsearch.cf sshd[32458]: Invalid user ark from 132.232.80.87 port 37142
2020-09-26T08:32:33.869983abusebot-5.cloudsearch.cf sshd[32458]
...
2020-09-26 22:28:01
106.75.169.106 attackspambots
(sshd) Failed SSH login from 106.75.169.106 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 26 05:46:53 idl1-dfw sshd[4069032]: Invalid user cassandra from 106.75.169.106 port 47304
Sep 26 05:46:55 idl1-dfw sshd[4069032]: Failed password for invalid user cassandra from 106.75.169.106 port 47304 ssh2
Sep 26 06:09:42 idl1-dfw sshd[4085745]: Invalid user jun from 106.75.169.106 port 60080
Sep 26 06:09:44 idl1-dfw sshd[4085745]: Failed password for invalid user jun from 106.75.169.106 port 60080 ssh2
Sep 26 06:13:44 idl1-dfw sshd[4088608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.169.106  user=root
2020-09-26 22:58:04

最近上报的IP列表

104.21.68.91 104.21.28.68 104.21.28.66 104.21.28.69
104.21.28.49 104.21.28.72 104.21.28.77 104.21.28.76
104.21.28.74 104.21.28.89 104.21.28.90 104.21.28.80
104.21.28.78 104.21.28.93 104.21.68.92 104.21.29.100
104.21.28.99 104.21.29.109 104.21.29.113 104.21.29.103