必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.40.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.40.234.			IN	A

;; AUTHORITY SECTION:
.			582	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:32:55 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 234.40.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.40.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.78.12.22 attackspam
Unauthorized connection attempt detected from IP address 27.78.12.22 to port 22
2020-01-01 01:11:11
58.244.173.130 attackspambots
'IP reached maximum auth failures for a one day block'
2020-01-01 01:28:11
51.68.47.45 attackbots
Unauthorized connection attempt detected from IP address 51.68.47.45 to port 22
2020-01-01 01:40:59
46.153.17.14 attackbots
Dec 31 14:59:57 raspberrypi sshd\[30713\]: Invalid user rpm from 46.153.17.14Dec 31 14:59:59 raspberrypi sshd\[30713\]: Failed password for invalid user rpm from 46.153.17.14 port 36246 ssh2Dec 31 15:06:50 raspberrypi sshd\[3340\]: Invalid user guest from 46.153.17.14Dec 31 15:06:52 raspberrypi sshd\[3340\]: Failed password for invalid user guest from 46.153.17.14 port 58743 ssh2
...
2020-01-01 01:38:37
51.75.133.167 attack
20 attempts against mh-ssh on cloud.magehost.pro
2020-01-01 01:06:01
60.222.233.208 attackspambots
[Aegis] @ 2019-12-31 14:50:33  0000 -> SSH insecure connection attempt (scan).
2020-01-01 01:11:58
185.209.0.91 attack
Dec 31 18:26:57 debian-2gb-nbg1-2 kernel: \[72551.181534\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.209.0.91 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=27631 PROTO=TCP SPT=52971 DPT=32389 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-01 01:31:40
37.139.16.94 attackspam
5x Failed Password
2020-01-01 01:06:34
189.68.211.122 attackbots
port scan and connect, tcp 80 (http)
2020-01-01 01:12:43
206.189.138.22 attackspambots
Dec 31 15:02:22 goofy sshd\[12810\]: Invalid user nagios from 206.189.138.22
Dec 31 15:02:22 goofy sshd\[12810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.138.22
Dec 31 15:02:23 goofy sshd\[12810\]: Failed password for invalid user nagios from 206.189.138.22 port 64401 ssh2
Dec 31 15:05:36 goofy sshd\[12992\]: Invalid user nagios from 206.189.138.22
Dec 31 15:05:36 goofy sshd\[12992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.138.22
2020-01-01 01:28:23
167.71.45.56 attackbotsspam
fail2ban honeypot
2020-01-01 01:32:38
144.217.170.65 attackbotsspam
SSH login attempts.
2020-01-01 01:18:55
103.252.196.7 attackspambots
Multiple SSH login attempts.
2020-01-01 01:13:31
182.176.180.175 attackbotsspam
Invalid user jack from 182.176.180.175 port 47282
2020-01-01 01:34:28
92.118.160.25 attack
Fail2Ban Ban Triggered
2020-01-01 01:35:47

最近上报的IP列表

104.21.40.224 104.21.40.240 104.21.40.42 104.21.40.43
104.21.40.245 104.21.40.7 104.18.232.221 104.21.40.3
104.21.40.26 104.21.40.92 104.21.41.120 104.21.40.90
104.21.40.52 104.21.41.112 104.21.41.141 104.21.41.13
104.21.41.113 104.21.41.161 104.21.41.12 104.21.41.178