必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.49.172
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.49.172.			IN	A

;; AUTHORITY SECTION:
.			520	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:33:56 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 172.49.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 172.49.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
170.150.155.102 attack
2019-10-07T20:06:09.151443shield sshd\[31478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.102.155.150.170.cps.com.ar  user=root
2019-10-07T20:06:11.626724shield sshd\[31478\]: Failed password for root from 170.150.155.102 port 57392 ssh2
2019-10-07T20:10:32.068064shield sshd\[32037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.102.155.150.170.cps.com.ar  user=root
2019-10-07T20:10:33.981672shield sshd\[32037\]: Failed password for root from 170.150.155.102 port 40002 ssh2
2019-10-07T20:14:59.971977shield sshd\[32489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=static.102.155.150.170.cps.com.ar  user=root
2019-10-08 04:31:23
138.68.106.62 attackbotsspam
Oct  7 22:40:40 core sshd[29574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.106.62  user=root
Oct  7 22:40:42 core sshd[29574]: Failed password for root from 138.68.106.62 port 55470 ssh2
...
2019-10-08 04:52:38
165.227.45.246 attackspambots
2019-10-07T20:24:19.050250abusebot-7.cloudsearch.cf sshd\[12213\]: Invalid user Caramel!23 from 165.227.45.246 port 44698
2019-10-08 04:24:55
50.225.152.178 attack
Oct  7 07:42:16 xb0 sshd[8911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.225.152.178  user=r.r
Oct  7 07:42:19 xb0 sshd[8911]: Failed password for r.r from 50.225.152.178 port 48340 ssh2
Oct  7 07:42:19 xb0 sshd[8911]: Received disconnect from 50.225.152.178: 11: Bye Bye [preauth]
Oct  7 07:54:56 xb0 sshd[16263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.225.152.178  user=r.r
Oct  7 07:54:58 xb0 sshd[16263]: Failed password for r.r from 50.225.152.178 port 37573 ssh2
Oct  7 07:54:58 xb0 sshd[16263]: Received disconnect from 50.225.152.178: 11: Bye Bye [preauth]
Oct  7 07:58:47 xb0 sshd[12657]: Failed password for invalid user 123 from 50.225.152.178 port 58281 ssh2
Oct  7 07:58:47 xb0 sshd[12657]: Received disconnect from 50.225.152.178: 11: Bye Bye [preauth]
Oct x@x
Oct  7 08:02:36 xb0 sshd[10758]: Received disconnect from 50.225.152.178: 11: Bye Bye [preauth]
Oct x@x
Oct........
-------------------------------
2019-10-08 04:59:56
94.191.87.254 attackspambots
Automatic report - Banned IP Access
2019-10-08 05:02:06
61.139.101.21 attackbots
Oct  5 23:35:34 liveconfig01 sshd[20392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.139.101.21  user=r.r
Oct  5 23:35:36 liveconfig01 sshd[20392]: Failed password for r.r from 61.139.101.21 port 60892 ssh2
Oct  5 23:35:36 liveconfig01 sshd[20392]: Received disconnect from 61.139.101.21 port 60892:11: Bye Bye [preauth]
Oct  5 23:35:36 liveconfig01 sshd[20392]: Disconnected from 61.139.101.21 port 60892 [preauth]
Oct  5 23:58:09 liveconfig01 sshd[21381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.139.101.21  user=r.r
Oct  5 23:58:11 liveconfig01 sshd[21381]: Failed password for r.r from 61.139.101.21 port 48964 ssh2
Oct  5 23:58:11 liveconfig01 sshd[21381]: Received disconnect from 61.139.101.21 port 48964:11: Bye Bye [preauth]
Oct  5 23:58:11 liveconfig01 sshd[21381]: Disconnected from 61.139.101.21 port 48964 [preauth]
Oct  6 00:02:06 liveconfig01 sshd[21556]: pam_unix(sshd:........
-------------------------------
2019-10-08 04:42:44
62.75.150.162 attackbots
Oct  7 01:18:42 kmh-wsh-001-nbg03 sshd[7355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.75.150.162  user=r.r
Oct  7 01:18:44 kmh-wsh-001-nbg03 sshd[7355]: Failed password for r.r from 62.75.150.162 port 37482 ssh2
Oct  7 01:18:44 kmh-wsh-001-nbg03 sshd[7355]: Received disconnect from 62.75.150.162 port 37482:11: Bye Bye [preauth]
Oct  7 01:18:44 kmh-wsh-001-nbg03 sshd[7355]: Disconnected from 62.75.150.162 port 37482 [preauth]
Oct  7 01:25:36 kmh-wsh-001-nbg03 sshd[7634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.75.150.162  user=r.r
Oct  7 01:25:38 kmh-wsh-001-nbg03 sshd[7634]: Failed password for r.r from 62.75.150.162 port 47640 ssh2
Oct  7 01:25:38 kmh-wsh-001-nbg03 sshd[7634]: Received disconnect from 62.75.150.162 port 47640:11: Bye Bye [preauth]
Oct  7 01:25:38 kmh-wsh-001-nbg03 sshd[7634]: Disconnected from 62.75.150.162 port 47640 [preauth]
Oct  7 01:29:10 kmh-wsh-........
-------------------------------
2019-10-08 04:50:01
222.186.31.144 attackbotsspam
07.10.2019 20:22:48 SSH access blocked by firewall
2019-10-08 04:25:08
62.210.162.99 attack
\[2019-10-07 15:50:42\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-07T15:50:42.578-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441259797380",SessionID="0x7fc3ac686538",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.162.99/5072",ACLName="no_extension_match"
\[2019-10-07 15:51:08\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-07T15:51:08.384-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00441259797380",SessionID="0x7fc3ac76b1b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.162.99/5072",ACLName="no_extension_match"
\[2019-10-07 15:52:35\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-07T15:52:35.538-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="000441259797380",SessionID="0x7fc3ad31f9e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.210.162.99/5070",ACLName="no_extensi
2019-10-08 04:50:34
118.27.13.207 attackspambots
Lines containing failures of 118.27.13.207
Oct  6 23:47:31 shared05 sshd[26703]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.13.207  user=r.r
Oct  6 23:47:32 shared05 sshd[26703]: Failed password for r.r from 118.27.13.207 port 36102 ssh2
Oct  6 23:47:33 shared05 sshd[26703]: Received disconnect from 118.27.13.207 port 36102:11: Bye Bye [preauth]
Oct  6 23:47:33 shared05 sshd[26703]: Disconnected from authenticating user r.r 118.27.13.207 port 36102 [preauth]
Oct  6 23:59:46 shared05 sshd[30426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.13.207  user=r.r
Oct  6 23:59:48 shared05 sshd[30426]: Failed password for r.r from 118.27.13.207 port 48610 ssh2
Oct  6 23:59:48 shared05 sshd[30426]: Received disconnect from 118.27.13.207 port 48610:11: Bye Bye [preauth]
Oct  6 23:59:48 shared05 sshd[30426]: Disconnected from authenticating user r.r 118.27.13.207 port 48610 [preauth........
------------------------------
2019-10-08 04:56:09
94.177.213.167 attackspambots
Oct  7 22:30:06 ovpn sshd\[3208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.213.167  user=root
Oct  7 22:30:08 ovpn sshd\[3208\]: Failed password for root from 94.177.213.167 port 57672 ssh2
Oct  7 22:51:52 ovpn sshd\[7253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.213.167  user=root
Oct  7 22:51:54 ovpn sshd\[7253\]: Failed password for root from 94.177.213.167 port 55130 ssh2
Oct  7 22:55:46 ovpn sshd\[8054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.213.167  user=root
2019-10-08 05:04:01
177.23.184.99 attackspambots
Oct  7 16:19:56 TORMINT sshd\[15102\]: Invalid user 123Remote from 177.23.184.99
Oct  7 16:19:56 TORMINT sshd\[15102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.23.184.99
Oct  7 16:19:57 TORMINT sshd\[15102\]: Failed password for invalid user 123Remote from 177.23.184.99 port 54412 ssh2
...
2019-10-08 04:44:38
118.163.149.163 attack
Oct  7 22:26:41 markkoudstaal sshd[28860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.149.163
Oct  7 22:26:43 markkoudstaal sshd[28860]: Failed password for invalid user P4$$w0rd@2018 from 118.163.149.163 port 44150 ssh2
Oct  7 22:31:27 markkoudstaal sshd[29323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.149.163
2019-10-08 05:02:59
45.40.194.129 attack
2019-10-07T15:54:45.4570361495-001 sshd\[62408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.194.129  user=root
2019-10-07T15:54:47.0272921495-001 sshd\[62408\]: Failed password for root from 45.40.194.129 port 46714 ssh2
2019-10-07T15:58:15.6804551495-001 sshd\[62715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.194.129  user=root
2019-10-07T15:58:17.4119881495-001 sshd\[62715\]: Failed password for root from 45.40.194.129 port 51556 ssh2
2019-10-07T16:01:53.7422141495-001 sshd\[63057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.194.129  user=root
2019-10-07T16:01:56.0702311495-001 sshd\[63057\]: Failed password for root from 45.40.194.129 port 56402 ssh2
...
2019-10-08 04:28:19
183.134.75.57 attack
07.10.2019 21:53:02 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-10-08 04:40:30

最近上报的IP列表

104.21.49.188 104.21.49.180 104.21.49.189 104.21.49.130
104.21.49.164 104.21.49.225 104.18.238.80 104.21.49.197
104.21.49.17 104.21.49.50 104.21.49.253 104.21.49.55
104.21.49.127 104.21.5.109 104.21.49.48 104.21.49.75
104.21.5.159 104.21.49.88 104.21.5.162 104.21.5.144