必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.46.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59378
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.46.13.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:31:41 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 13.46.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.46.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.180.9 attack
Oct 23 22:28:39 dedicated sshd[29580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Oct 23 22:28:40 dedicated sshd[29580]: Failed password for root from 222.186.180.9 port 19952 ssh2
2019-10-24 04:35:07
177.232.137.141 attackbotsspam
Automatic report - Port Scan Attack
2019-10-24 04:48:08
121.46.29.116 attackbots
Oct 23 14:05:58 odroid64 sshd\[18214\]: User root from 121.46.29.116 not allowed because not listed in AllowUsers
Oct 23 14:05:58 odroid64 sshd\[18214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.29.116  user=root
Oct 23 14:06:00 odroid64 sshd\[18214\]: Failed password for invalid user root from 121.46.29.116 port 35056 ssh2
...
2019-10-24 04:59:17
119.42.175.200 attackspambots
Invalid user zabbix from 119.42.175.200 port 41886
2019-10-24 05:06:23
106.75.141.91 attackbots
Oct 23 16:29:40 xtremcommunity sshd\[37480\]: Invalid user mnbjhguyt765 from 106.75.141.91 port 39840
Oct 23 16:29:40 xtremcommunity sshd\[37480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.91
Oct 23 16:29:42 xtremcommunity sshd\[37480\]: Failed password for invalid user mnbjhguyt765 from 106.75.141.91 port 39840 ssh2
Oct 23 16:33:43 xtremcommunity sshd\[37570\]: Invalid user test1 from 106.75.141.91 port 45738
Oct 23 16:33:43 xtremcommunity sshd\[37570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.91
...
2019-10-24 04:37:58
45.64.105.37 attackspambots
10/23/2019-16:16:41.058724 45.64.105.37 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-24 05:07:01
106.12.201.101 attack
Oct 23 20:48:59 game-panel sshd[30134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.201.101
Oct 23 20:49:00 game-panel sshd[30134]: Failed password for invalid user neil from 106.12.201.101 port 55624 ssh2
Oct 23 20:53:10 game-panel sshd[30294]: Failed password for root from 106.12.201.101 port 37574 ssh2
2019-10-24 04:59:31
5.249.145.245 attack
Oct 23 22:41:51 vps691689 sshd[19588]: Failed password for root from 5.249.145.245 port 39375 ssh2
Oct 23 22:45:22 vps691689 sshd[19628]: Failed password for root from 5.249.145.245 port 58103 ssh2
...
2019-10-24 05:02:47
138.68.93.14 attack
Oct 23 23:17:38 sauna sshd[184901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14
Oct 23 23:17:40 sauna sshd[184901]: Failed password for invalid user !QAZzaq1@ from 138.68.93.14 port 50558 ssh2
...
2019-10-24 04:29:21
24.127.191.38 attackspam
Fail2Ban Ban Triggered
2019-10-24 04:30:14
121.14.70.29 attackbotsspam
Oct  6 01:42:19 microserver sshd[58689]: Failed password for invalid user 123 from 121.14.70.29 port 53472 ssh2
Oct  6 01:45:47 microserver sshd[59106]: Invalid user P@$$w0rt1! from 121.14.70.29 port 41740
Oct  6 01:45:48 microserver sshd[59106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.14.70.29
Oct  6 01:45:49 microserver sshd[59106]: Failed password for invalid user P@$$w0rt1! from 121.14.70.29 port 41740 ssh2
Oct  6 01:56:04 microserver sshd[60454]: Invalid user P@ssw0rt321 from 121.14.70.29 port 34695
Oct  6 01:56:04 microserver sshd[60454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.14.70.29
Oct  6 01:56:07 microserver sshd[60454]: Failed password for invalid user P@ssw0rt321 from 121.14.70.29 port 34695 ssh2
Oct  6 01:59:33 microserver sshd[60775]: Invalid user 123Admin from 121.14.70.29 port 51197
Oct  6 01:59:33 microserver sshd[60775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0
2019-10-24 04:56:51
118.25.101.161 attack
Oct 22 20:51:24 odroid64 sshd\[32069\]: User root from 118.25.101.161 not allowed because not listed in AllowUsers
Oct 22 20:51:24 odroid64 sshd\[32069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.101.161  user=root
Oct 22 20:51:26 odroid64 sshd\[32069\]: Failed password for invalid user root from 118.25.101.161 port 47454 ssh2
...
2019-10-24 05:03:06
51.68.70.175 attackspambots
Oct 23 22:35:37 SilenceServices sshd[32276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.175
Oct 23 22:35:39 SilenceServices sshd[32276]: Failed password for invalid user end from 51.68.70.175 port 58422 ssh2
Oct 23 22:39:26 SilenceServices sshd[2365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.70.175
2019-10-24 04:53:15
216.70.123.27 attackbotsspam
[WedOct2322:16:45.5510342019][:error][pid25722:tid139811880941312][client216.70.123.27:36754][client216.70.123.27]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:https\?\|fromcharcode\|script\)"atARGS:editionarea.[file"/usr/local/apache.ea3/conf/modsec_rules/99_asl_jitp.conf"][line"423"][id"347159"][rev"1"][msg"Atomicorp.comWAFRules:WordPressAdminAjaxunauthenticatedplugin/extensionexploitblocked"][data"admin-post.php"][severity"CRITICAL"][hostname"giocheriamagic.ch"][uri"/wp-admin/admin-post.php"][unique_id"XbC1Lb7bfo0RUqR-MvKqUwAAAIk"][WedOct2322:17:00.6702082019][:error][pid25722:tid139812028155648][client216.70.123.27:46254][client216.70.123.27]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"\(\?:https\?\|fromcharcode\|script\)"atARGS:width.[file"/usr/local/apache.ea3/conf/modsec_rules/99_asl_jitp.conf"][line"429"][id"347160"][rev"1"][msg"Atomicorp.comWAFRules:WordPressAdminAjaxunauthenticatedplugin/extensionexploitblocked"][data"admin-ajax.php\
2019-10-24 04:51:48
176.252.156.168 attack
Automatic report - Port Scan Attack
2019-10-24 04:41:41

最近上报的IP列表

104.21.7.128 104.21.46.124 104.21.46.133 104.21.46.123
104.21.46.127 104.21.46.140 104.21.46.143 104.21.46.151
104.21.46.149 104.21.46.139 104.21.7.129 104.21.46.142
104.21.46.153 104.21.46.154 104.21.46.159 104.21.46.158
104.21.46.16 104.21.46.155 104.21.46.163 104.21.46.164