必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.45.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51102
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.45.127.			IN	A

;; AUTHORITY SECTION:
.			383	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021602 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 17 10:31:48 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 127.45.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 127.45.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.55.39.161 attackspam
Automatic report - Banned IP Access
2020-06-17 02:31:11
103.215.206.196 attackspam
Icarus honeypot on github
2020-06-17 02:54:17
124.78.152.241 attack
Invalid user lq from 124.78.152.241 port 58124
2020-06-17 03:03:33
45.201.173.251 attackspambots
port scan and connect, tcp 8080 (http-proxy)
2020-06-17 02:44:37
185.176.27.34 attackbots
06/16/2020-14:40:01.846007 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-06-17 03:01:09
51.158.189.0 attackspambots
Jun 16 20:10:14 minden010 sshd[14451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.189.0
Jun 16 20:10:16 minden010 sshd[14451]: Failed password for invalid user nginx from 51.158.189.0 port 40262 ssh2
Jun 16 20:19:48 minden010 sshd[17802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.189.0
...
2020-06-17 03:01:56
87.251.74.47 attackbotsspam
Port scan on 14 port(s): 20591 20866 21846 21906 21982 22225 22787 22859 22977 23066 23616 23625 23664 23980
2020-06-17 02:35:58
69.174.91.33 attackspam
fell into ViewStateTrap:paris
2020-06-17 03:11:45
106.13.87.145 attack
Jun 16 21:28:18 pkdns2 sshd\[56807\]: Invalid user ved from 106.13.87.145Jun 16 21:28:19 pkdns2 sshd\[56807\]: Failed password for invalid user ved from 106.13.87.145 port 52468 ssh2Jun 16 21:31:29 pkdns2 sshd\[56978\]: Failed password for root from 106.13.87.145 port 38136 ssh2Jun 16 21:34:25 pkdns2 sshd\[57101\]: Invalid user oracle from 106.13.87.145Jun 16 21:34:27 pkdns2 sshd\[57101\]: Failed password for invalid user oracle from 106.13.87.145 port 52010 ssh2Jun 16 21:37:19 pkdns2 sshd\[57258\]: Invalid user anand from 106.13.87.145
...
2020-06-17 02:38:37
222.186.42.7 attackbotsspam
Jun 16 20:53:43 piServer sshd[21085]: Failed password for root from 222.186.42.7 port 12868 ssh2
Jun 16 20:53:46 piServer sshd[21085]: Failed password for root from 222.186.42.7 port 12868 ssh2
Jun 16 20:53:49 piServer sshd[21085]: Failed password for root from 222.186.42.7 port 12868 ssh2
...
2020-06-17 02:55:51
79.104.58.62 attackbots
Invalid user elias from 79.104.58.62 port 54106
2020-06-17 03:05:07
165.22.48.131 attackspambots
Unauthorized SSH login attempts
2020-06-17 02:34:23
112.17.84.119 attackbots
2020-06-16T14:16:04.702780+02:00  sshd[5474]: Failed password for invalid user nsa from 112.17.84.119 port 57664 ssh2
2020-06-17 03:11:30
117.239.71.66 attack
20/6/16@08:17:38: FAIL: Alarm-Network address from=117.239.71.66
...
2020-06-17 02:46:12
5.182.39.64 attackbotsspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-16T16:13:48Z and 2020-06-16T16:48:01Z
2020-06-17 03:09:57

最近上报的IP列表

104.21.44.73 104.21.45.13 104.21.45.14 104.21.45.149
104.21.45.168 104.21.45.18 104.21.45.183 243.21.191.238
104.21.45.200 104.21.45.206 104.21.45.207 104.21.45.218
104.21.45.226 104.21.45.238 104.21.45.243 104.21.45.254
104.21.45.26 104.21.45.33 104.21.45.49 49.169.212.192