必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.52.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57635
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.52.143.			IN	A

;; AUTHORITY SECTION:
.			89	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 03:30:25 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 143.52.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.52.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
87.138.232.52 attackbotsspam
leo_www
2019-10-27 17:04:00
76.27.163.60 attackbots
invalid user
2019-10-27 16:32:39
58.211.166.170 attackspambots
Invalid user lu from 58.211.166.170 port 48544
2019-10-27 17:01:56
178.46.209.116 attackbotsspam
Unauthorised access (Oct 27) SRC=178.46.209.116 LEN=40 TTL=51 ID=1405 TCP DPT=23 WINDOW=60077 SYN
2019-10-27 16:41:30
54.37.136.87 attackspam
Oct 26 18:17:01 hanapaa sshd\[12151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.ip-54-37-136.eu  user=root
Oct 26 18:17:03 hanapaa sshd\[12151\]: Failed password for root from 54.37.136.87 port 47882 ssh2
Oct 26 18:20:50 hanapaa sshd\[12467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.ip-54-37-136.eu  user=root
Oct 26 18:20:52 hanapaa sshd\[12467\]: Failed password for root from 54.37.136.87 port 56720 ssh2
Oct 26 18:24:37 hanapaa sshd\[12784\]: Invalid user jyroda from 54.37.136.87
2019-10-27 16:33:42
221.7.175.12 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-10-27 16:59:11
178.128.55.52 attackspambots
2019-10-27T08:44:22.887321abusebot-5.cloudsearch.cf sshd\[31029\]: Invalid user robert from 178.128.55.52 port 48219
2019-10-27 16:54:17
193.31.24.113 attackspambots
10/27/2019-09:45:06.363403 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-27 16:48:20
69.162.68.54 attack
Oct 27 07:25:40 MK-Soft-Root2 sshd[27069]: Failed password for root from 69.162.68.54 port 42202 ssh2
...
2019-10-27 16:58:07
222.186.175.217 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
Failed password for root from 222.186.175.217 port 25878 ssh2
Failed password for root from 222.186.175.217 port 25878 ssh2
Failed password for root from 222.186.175.217 port 25878 ssh2
Failed password for root from 222.186.175.217 port 25878 ssh2
2019-10-27 16:37:37
185.86.164.110 attack
Automatic report - Banned IP Access
2019-10-27 16:38:31
133.130.90.174 attackbotsspam
Oct 27 08:46:02 ArkNodeAT sshd\[12503\]: Invalid user ve from 133.130.90.174
Oct 27 08:46:02 ArkNodeAT sshd\[12503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.90.174
Oct 27 08:46:03 ArkNodeAT sshd\[12503\]: Failed password for invalid user ve from 133.130.90.174 port 49028 ssh2
2019-10-27 16:44:32
124.165.207.150 attack
Lines containing failures of 124.165.207.150
Oct 23 21:37:40 shared09 sshd[27559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.165.207.150  user=r.r
Oct 23 21:37:42 shared09 sshd[27559]: Failed password for r.r from 124.165.207.150 port 57236 ssh2
Oct 23 21:37:43 shared09 sshd[27559]: Received disconnect from 124.165.207.150 port 57236:11: Bye Bye [preauth]
Oct 23 21:37:43 shared09 sshd[27559]: Disconnected from authenticating user r.r 124.165.207.150 port 57236 [preauth]
Oct 24 01:43:41 shared09 sshd[9314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.165.207.150  user=r.r
Oct 24 01:43:43 shared09 sshd[9314]: Failed password for r.r from 124.165.207.150 port 32966 ssh2
Oct 24 01:43:44 shared09 sshd[9314]: Received disconnect from 124.165.207.150 port 32966:11: Bye Bye [preauth]
Oct 24 01:43:44 shared09 sshd[9314]: Disconnected from authenticating user r.r 124.165.207.150 port ........
------------------------------
2019-10-27 17:05:18
139.59.84.55 attack
Invalid user teacher1 from 139.59.84.55 port 40828
2019-10-27 16:58:27
157.230.133.15 attackbotsspam
Oct 27 10:35:55 server sshd\[944\]: Invalid user minecraft from 157.230.133.15
Oct 27 10:35:55 server sshd\[944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.133.15 
Oct 27 10:35:57 server sshd\[944\]: Failed password for invalid user minecraft from 157.230.133.15 port 37050 ssh2
Oct 27 10:40:00 server sshd\[2146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.133.15  user=root
Oct 27 10:40:02 server sshd\[2146\]: Failed password for root from 157.230.133.15 port 50748 ssh2
...
2019-10-27 16:53:14

最近上报的IP列表

104.21.52.137 104.21.52.164 104.21.52.184 104.21.52.215
104.21.52.240 104.21.52.61 104.21.53.127 104.21.53.182
104.21.54.131 104.21.53.2 104.21.54.110 104.21.53.48
104.21.55.147 104.21.54.248 104.21.55.153 104.21.55.219
104.21.55.243 104.21.56.179 104.21.56.219 104.21.57.115