必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.48.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22714
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.48.151.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:32:51 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 151.48.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 151.48.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.202 attackspambots
Nov 30 08:16:34 h2177944 sshd\[29706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Nov 30 08:16:36 h2177944 sshd\[29706\]: Failed password for root from 222.186.175.202 port 22706 ssh2
Nov 30 08:16:40 h2177944 sshd\[29706\]: Failed password for root from 222.186.175.202 port 22706 ssh2
Nov 30 08:16:43 h2177944 sshd\[29706\]: Failed password for root from 222.186.175.202 port 22706 ssh2
...
2019-11-30 15:17:54
167.160.160.138 attackspam
Nov 30 08:28:05 elektron postfix/smtpd\[25141\]: NOQUEUE: reject: RCPT from unknown\[167.160.160.138\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[167.160.160.138\]\; from=\ to=\ proto=ESMTP helo=\
Nov 30 08:38:05 elektron postfix/smtpd\[28710\]: NOQUEUE: reject: RCPT from unknown\[167.160.160.138\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[167.160.160.138\]\; from=\ to=\ proto=ESMTP helo=\
Nov 30 08:39:38 elektron postfix/smtpd\[28710\]: NOQUEUE: reject: RCPT from unknown\[167.160.160.138\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[167.160.160.138\]\; from=\ to=\ proto=ESMTP helo=\
Nov 30 08:48:06 elektron postfix/smtpd\[28710\]: NOQUEUE: reject: RCPT from unknown\[167.160.160.138\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[167.160.160.138\]\; from=\ to=\
2019-11-30 15:35:03
51.89.148.180 attackspam
$f2bV_matches
2019-11-30 15:48:05
106.12.24.170 attackbotsspam
Nov 30 07:08:57 localhost sshd\[97095\]: Invalid user seda from 106.12.24.170 port 55998
Nov 30 07:08:57 localhost sshd\[97095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.170
Nov 30 07:08:59 localhost sshd\[97095\]: Failed password for invalid user seda from 106.12.24.170 port 55998 ssh2
Nov 30 07:13:21 localhost sshd\[97226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.170  user=root
Nov 30 07:13:23 localhost sshd\[97226\]: Failed password for root from 106.12.24.170 port 34326 ssh2
...
2019-11-30 15:23:47
117.50.11.205 attackspambots
2019-11-30T01:25:18.481436ns547587 sshd\[30187\]: Invalid user grasman from 117.50.11.205 port 59832
2019-11-30T01:25:18.488006ns547587 sshd\[30187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.11.205
2019-11-30T01:25:20.275245ns547587 sshd\[30187\]: Failed password for invalid user grasman from 117.50.11.205 port 59832 ssh2
2019-11-30T01:29:56.740503ns547587 sshd\[31838\]: Invalid user backup from 117.50.11.205 port 33390
...
2019-11-30 15:21:11
109.116.196.114 attack
firewall-block, port(s): 23/tcp
2019-11-30 15:10:56
42.157.129.158 attackbotsspam
Nov 29 21:17:31 php1 sshd\[29750\]: Invalid user guhl from 42.157.129.158
Nov 29 21:17:31 php1 sshd\[29750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.129.158
Nov 29 21:17:33 php1 sshd\[29750\]: Failed password for invalid user guhl from 42.157.129.158 port 52992 ssh2
Nov 29 21:22:01 php1 sshd\[30202\]: Invalid user yoyo from 42.157.129.158
Nov 29 21:22:01 php1 sshd\[30202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.157.129.158
2019-11-30 15:39:22
103.112.167.134 attackbotsspam
Nov 30 09:08:42 server sshd\[2480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.112.167.134  user=root
Nov 30 09:08:44 server sshd\[2480\]: Failed password for root from 103.112.167.134 port 54208 ssh2
Nov 30 09:27:16 server sshd\[7103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.112.167.134  user=mail
Nov 30 09:27:18 server sshd\[7103\]: Failed password for mail from 103.112.167.134 port 60244 ssh2
Nov 30 09:30:49 server sshd\[8101\]: Invalid user rinako from 103.112.167.134
Nov 30 09:30:49 server sshd\[8101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.112.167.134 
Nov 30 09:30:51 server sshd\[8101\]: Failed password for invalid user rinako from 103.112.167.134 port 38250 ssh2
...
2019-11-30 15:13:02
222.186.173.215 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Failed password for root from 222.186.173.215 port 25912 ssh2
Failed password for root from 222.186.173.215 port 25912 ssh2
Failed password for root from 222.186.173.215 port 25912 ssh2
Failed password for root from 222.186.173.215 port 25912 ssh2
2019-11-30 15:28:25
139.59.38.169 attackbotsspam
Nov 30 07:41:25 ns3042688 sshd\[5041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.38.169  user=root
Nov 30 07:41:28 ns3042688 sshd\[5041\]: Failed password for root from 139.59.38.169 port 47394 ssh2
Nov 30 07:46:47 ns3042688 sshd\[7552\]: Invalid user borgeson from 139.59.38.169
Nov 30 07:46:47 ns3042688 sshd\[7552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.38.169 
Nov 30 07:46:50 ns3042688 sshd\[7552\]: Failed password for invalid user borgeson from 139.59.38.169 port 54926 ssh2
...
2019-11-30 15:37:34
222.186.173.142 attack
Nov 30 02:00:24 TORMINT sshd\[23302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Nov 30 02:00:26 TORMINT sshd\[23302\]: Failed password for root from 222.186.173.142 port 41840 ssh2
Nov 30 02:00:44 TORMINT sshd\[23304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
...
2019-11-30 15:18:25
49.204.55.251 attackspambots
Nov 30 07:48:14 host sshd[28377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.204.55.251
Nov 30 07:48:14 host sshd[28377]: Invalid user admin from 49.204.55.251 port 49738
Nov 30 07:48:16 host sshd[28377]: Failed password for invalid user admin from 49.204.55.251 port 49738 ssh2
...
2019-11-30 15:30:27
200.46.103.162 attack
postfix
2019-11-30 15:22:25
222.186.175.181 attack
Nov 30 08:10:54 ns381471 sshd[14992]: Failed password for root from 222.186.175.181 port 48430 ssh2
Nov 30 08:11:06 ns381471 sshd[14992]: Failed password for root from 222.186.175.181 port 48430 ssh2
2019-11-30 15:19:53
34.200.250.113 attackbotsspam
Nov 29 22:43:03 pl2server sshd[9143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-34-200-250-113.compute-1.amazonaws.com  user=mysql
Nov 29 22:43:05 pl2server sshd[9143]: Failed password for mysql from 34.200.250.113 port 60242 ssh2
Nov 29 22:43:05 pl2server sshd[9143]: Received disconnect from 34.200.250.113: 11: Bye Bye [preauth]
Nov 29 22:54:48 pl2server sshd[11014]: Invalid user elena from 34.200.250.113
Nov 29 22:54:48 pl2server sshd[11014]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-34-200-250-113.compute-1.amazonaws.com
Nov 29 22:54:50 pl2server sshd[11014]: Failed password for invalid user elena from 34.200.250.113 port 39580 ssh2
Nov 29 22:54:50 pl2server sshd[11014]: Received disconnect from 34.200.250.113: 11: Bye Bye [preauth]
Nov 29 22:57:34 pl2server sshd[11690]: Invalid user ding from 34.200.250.113
Nov 29 22:57:34 pl2server sshd[11690]: pam_unix(sshd:auth): a........
-------------------------------
2019-11-30 15:16:36

最近上报的IP列表

104.21.48.124 104.21.48.149 104.21.48.156 104.21.48.16
104.21.48.163 104.21.48.176 104.21.48.171 104.21.48.167
104.21.48.159 104.21.48.175 104.21.7.154 104.21.48.155
104.21.48.178 104.21.48.180 104.21.48.182 104.21.48.186
104.21.48.185 104.21.48.192 104.21.48.191 104.21.48.19