必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.52.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42889
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.52.107.			IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 11:58:28 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 107.52.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.52.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.13.87.244 attack
16.07.2019 00:03:59 SSH access blocked by firewall
2019-07-16 08:08:39
46.18.205.211 attackspam
445/tcp 445/tcp 445/tcp...
[2019-05-29/07-15]22pkt,1pt.(tcp)
2019-07-16 08:24:24
46.101.119.15 attack
Jul 16 02:18:02 SilenceServices sshd[20627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.119.15
Jul 16 02:18:04 SilenceServices sshd[20627]: Failed password for invalid user david from 46.101.119.15 port 34305 ssh2
Jul 16 02:25:19 SilenceServices sshd[25195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.119.15
2019-07-16 08:34:44
121.130.88.44 attack
Jul 16 02:26:45 meumeu sshd[13884]: Failed password for root from 121.130.88.44 port 43574 ssh2
Jul 16 02:32:18 meumeu sshd[15059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.130.88.44 
Jul 16 02:32:19 meumeu sshd[15059]: Failed password for invalid user mauricio from 121.130.88.44 port 41642 ssh2
...
2019-07-16 08:34:14
46.105.124.52 attackbotsspam
Invalid user tushar from 46.105.124.52 port 41075
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.124.52
Failed password for invalid user tushar from 46.105.124.52 port 41075 ssh2
Invalid user ts2 from 46.105.124.52 port 38647
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.124.52
2019-07-16 08:29:06
177.92.73.226 attackspam
Jul 16 00:34:45 v22018076622670303 sshd\[993\]: Invalid user testing from 177.92.73.226 port 37892
Jul 16 00:34:45 v22018076622670303 sshd\[993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.73.226
Jul 16 00:34:47 v22018076622670303 sshd\[993\]: Failed password for invalid user testing from 177.92.73.226 port 37892 ssh2
...
2019-07-16 08:32:07
118.220.175.92 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-05-26/07-15]11pkt,1pt.(tcp)
2019-07-16 08:40:49
91.214.179.24 attack
Successfully logged into my email, I would have been screwed had I not set up the authentication to my phone..
2019-07-16 07:55:15
69.172.84.62 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-17/07-15]7pkt,1pt.(tcp)
2019-07-16 08:42:07
202.131.230.19 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-06-06/07-15]6pkt,1pt.(tcp)
2019-07-16 08:14:05
36.65.62.14 attack
21/tcp 21/tcp 21/tcp...
[2019-07-12/15]4pkt,1pt.(tcp)
2019-07-16 08:15:08
203.99.62.158 attack
Jul 16 05:39:56 vibhu-HP-Z238-Microtower-Workstation sshd\[23575\]: Invalid user release from 203.99.62.158
Jul 16 05:39:56 vibhu-HP-Z238-Microtower-Workstation sshd\[23575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158
Jul 16 05:39:58 vibhu-HP-Z238-Microtower-Workstation sshd\[23575\]: Failed password for invalid user release from 203.99.62.158 port 35749 ssh2
Jul 16 05:45:47 vibhu-HP-Z238-Microtower-Workstation sshd\[24739\]: Invalid user hk from 203.99.62.158
Jul 16 05:45:47 vibhu-HP-Z238-Microtower-Workstation sshd\[24739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158
...
2019-07-16 08:20:20
113.176.7.225 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-07-16 08:26:20
194.78.179.178 attack
Jul 16 02:29:09 dedicated sshd[5770]: Invalid user sysadmin from 194.78.179.178 port 53361
2019-07-16 08:30:27
196.221.207.173 attack
445/tcp 445/tcp
[2019-06-07/07-15]2pkt
2019-07-16 08:27:30

最近上报的IP列表

103.218.165.1 103.217.245.217 103.219.120.56 103.218.243.180
103.219.124.7 103.219.154.81 103.219.180.23 103.219.196.133
103.219.236.5 103.219.6.5 103.219.71.175 104.21.52.134
103.22.158.8 103.22.181.32 103.22.180.94 103.219.249.44
103.220.204.172 103.220.223.104 103.220.223.100 103.220.26.125