必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.42.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31288
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.42.34.			IN	A

;; AUTHORITY SECTION:
.			284	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:29:50 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 34.42.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.42.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.4.172.182 attackbotsspam
failed_logins
2019-07-07 22:38:00
162.243.99.164 attackbotsspam
Triggered by Fail2Ban at Vostok web server
2019-07-07 22:44:10
206.189.198.64 attackbots
Jul  7 16:15:46 pornomens sshd\[30010\]: Invalid user bogota from 206.189.198.64 port 48428
Jul  7 16:15:46 pornomens sshd\[30010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.198.64
Jul  7 16:15:48 pornomens sshd\[30010\]: Failed password for invalid user bogota from 206.189.198.64 port 48428 ssh2
...
2019-07-07 23:19:01
24.253.138.217 attackspam
Jul  7 16:56:19 dedicated sshd[3473]: Invalid user daniel from 24.253.138.217 port 40136
Jul  7 16:56:19 dedicated sshd[3473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=24.253.138.217
Jul  7 16:56:19 dedicated sshd[3473]: Invalid user daniel from 24.253.138.217 port 40136
Jul  7 16:56:21 dedicated sshd[3473]: Failed password for invalid user daniel from 24.253.138.217 port 40136 ssh2
Jul  7 16:58:47 dedicated sshd[3689]: Invalid user postgres from 24.253.138.217 port 37548
2019-07-07 23:12:30
86.195.244.22 attackspambots
86.195.244.22 - - [07/Jul/2019:15:46:52 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
86.195.244.22 - - [07/Jul/2019:15:46:53 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
86.195.244.22 - - [07/Jul/2019:15:46:53 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
86.195.244.22 - - [07/Jul/2019:15:46:53 +0200] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
86.195.244.22 - - [07/Jul/2019:15:46:53 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
86.195.244.22 - - [07/Jul/2019:15:46:53 +0200] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-07 22:31:35
41.235.46.51 attack
Jul  7 15:47:03 [munged] sshd[13424]: Invalid user admin from 41.235.46.51 port 50629
Jul  7 15:47:03 [munged] sshd[13424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.235.46.51
2019-07-07 22:22:18
195.9.99.122 attack
SSH invalid-user multiple login try
2019-07-07 23:10:16
45.13.39.53 attackspam
Jul  7 16:21:15 mail postfix/smtpd\[31933\]: warning: unknown\[45.13.39.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 16:22:03 mail postfix/smtpd\[1463\]: warning: unknown\[45.13.39.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  7 16:22:54 mail postfix/smtpd\[1006\]: warning: unknown\[45.13.39.53\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-07 22:28:57
130.61.53.23 attack
Port Scan 3389
2019-07-07 23:24:11
138.68.20.158 attackspambots
SSH Brute Force
2019-07-07 23:20:21
128.199.182.235 attackspambots
2019-07-07T14:18:33.494523abusebot-6.cloudsearch.cf sshd\[11210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.182.235  user=root
2019-07-07 23:05:55
193.213.152.118 attackspam
Jul  7 13:45:54 *** sshd[30902]: Invalid user external from 193.213.152.118
2019-07-07 22:55:28
41.72.7.247 attackbotsspam
Jul  7 16:45:48 srv-4 sshd\[16789\]: Invalid user admin from 41.72.7.247
Jul  7 16:45:48 srv-4 sshd\[16789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.72.7.247
Jul  7 16:45:49 srv-4 sshd\[16789\]: Failed password for invalid user admin from 41.72.7.247 port 50831 ssh2
...
2019-07-07 22:57:10
5.133.66.246 attackbots
Jul  7 15:45:26 server postfix/smtpd[30230]: NOQUEUE: reject: RCPT from boundless.ppobmspays.com[5.133.66.246]: 554 5.7.1 Service unavailable; Client host [5.133.66.246] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=
2019-07-07 23:07:56
45.70.196.180 attackspambots
Jul  7 15:44:28 vmd17057 sshd\[16566\]: Invalid user sinus from 45.70.196.180 port 40342
Jul  7 15:44:28 vmd17057 sshd\[16566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.196.180
Jul  7 15:44:29 vmd17057 sshd\[16566\]: Failed password for invalid user sinus from 45.70.196.180 port 40342 ssh2
...
2019-07-07 23:27:49

最近上报的IP列表

104.21.42.35 104.21.42.31 104.21.42.36 104.21.42.44
104.21.69.86 104.21.42.40 104.21.42.46 104.21.42.37
114.124.177.84 104.21.42.51 104.21.42.53 104.21.42.63
104.21.42.57 104.21.42.64 104.21.42.47 104.21.42.72
104.21.42.65 104.21.42.71 104.21.42.74 104.21.42.67