必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.56.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15611
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.56.5.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:37:59 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 5.56.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.56.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.122.181.250 attackspambots
ssh failed login
2019-07-08 09:46:37
139.159.3.179 attackbots
port scan and connect, tcp 80 (http)
2019-07-08 10:02:47
85.128.142.17 attackspambots
xmlrpc attack
2019-07-08 09:50:33
188.192.77.46 attack
" "
2019-07-08 10:08:35
129.204.47.217 attackbotsspam
v+ssh-bruteforce
2019-07-08 10:03:10
84.254.10.227 attackspambots
" "
2019-07-08 10:28:34
139.59.78.236 attackspambots
Jul  7 23:06:28 thevastnessof sshd[9202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.78.236
...
2019-07-08 10:26:36
151.84.222.52 attackbots
Reported by AbuseIPDB proxy server.
2019-07-08 10:26:12
78.128.113.18 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-07 23:09:27,283 INFO [amun_request_handler] PortScan Detected on Port: 5000 (78.128.113.18)
2019-07-08 10:11:17
174.49.67.132 attack
port scan and connect, tcp 23 (telnet)
2019-07-08 10:09:46
92.241.66.138 attackbotsspam
SMTP Fraud Orders
2019-07-08 10:25:15
212.140.166.211 attack
Jul  8 04:02:56 lnxded64 sshd[5849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.140.166.211
Jul  8 04:02:58 lnxded64 sshd[5849]: Failed password for invalid user jboss from 212.140.166.211 port 35586 ssh2
Jul  8 04:06:01 lnxded64 sshd[6614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.140.166.211
2019-07-08 10:16:36
89.161.250.24 attackbotsspam
xmlrpc attack
2019-07-08 10:19:19
157.230.13.28 attack
Jul  8 01:07:42 vpn01 sshd\[3871\]: Invalid user synadmin from 157.230.13.28
Jul  8 01:07:42 vpn01 sshd\[3871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.13.28
Jul  8 01:07:44 vpn01 sshd\[3871\]: Failed password for invalid user synadmin from 157.230.13.28 port 45480 ssh2
2019-07-08 10:03:42
141.98.80.67 attack
Jul  8 04:07:41 mail postfix/smtpd\[11645\]: warning: unknown\[141.98.80.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 04:07:47 mail postfix/smtpd\[13785\]: warning: unknown\[141.98.80.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul  8 04:07:49 mail postfix/smtpd\[12744\]: warning: unknown\[141.98.80.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-08 10:13:31

最近上报的IP列表

104.21.56.54 104.21.56.63 104.21.56.62 104.21.56.70
104.21.56.75 104.21.56.76 104.21.56.82 104.21.56.9
104.21.56.90 104.21.56.93 104.21.7.6 157.230.131.25
104.21.56.98 104.21.57.101 104.21.56.99 104.21.57.104
104.21.57.100 104.21.57.108 104.21.57.106 104.21.57.110