必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.57.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.57.134.			IN	A

;; AUTHORITY SECTION:
.			409	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:38:08 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 134.57.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.57.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.99.219.208 attackbotsspam
SSH login attempts.
2020-09-07 04:17:23
193.228.135.144 attack
DATE:2020-09-05 18:39:43, IP:193.228.135.144, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-07 04:21:34
89.244.180.31 attackbotsspam
Sep  5 09:40:41 mockhub sshd[913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.244.180.31
Sep  5 09:40:43 mockhub sshd[913]: Failed password for invalid user pi from 89.244.180.31 port 48290 ssh2
...
2020-09-07 04:24:25
13.89.24.13 attackspambots
Unauthorised login to NAS
2020-09-07 04:45:15
190.21.44.202 attack
Sep  6 04:45:59 sshgateway sshd\[27681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190-21-44-202.baf.movistar.cl  user=root
Sep  6 04:46:01 sshgateway sshd\[27681\]: Failed password for root from 190.21.44.202 port 58770 ssh2
Sep  6 04:53:54 sshgateway sshd\[28654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190-21-44-202.baf.movistar.cl  user=root
2020-09-07 04:38:39
193.169.254.91 attack
2020-09-06T16:05:56.811194shield sshd\[28322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.169.254.91  user=root
2020-09-06T16:05:59.056191shield sshd\[28322\]: Failed password for root from 193.169.254.91 port 39211 ssh2
2020-09-06T16:06:01.684377shield sshd\[28322\]: Failed password for root from 193.169.254.91 port 39211 ssh2
2020-09-06T16:06:04.694599shield sshd\[28322\]: Failed password for root from 193.169.254.91 port 39211 ssh2
2020-09-06T16:06:07.102330shield sshd\[28322\]: Failed password for root from 193.169.254.91 port 39211 ssh2
2020-09-07 04:40:26
218.50.223.112 attackspam
2020-09-05 16:12:19 server sshd[64983]: Failed password for invalid user root from 218.50.223.112 port 59006 ssh2
2020-09-07 04:23:42
62.173.139.193 attackspambots
[2020-09-05 13:02:50] NOTICE[1194][C-00000df2] chan_sip.c: Call from '' (62.173.139.193:58778) to extension '00013614234051349' rejected because extension not found in context 'public'.
[2020-09-05 13:02:50] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-05T13:02:50.171-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00013614234051349",SessionID="0x7f2ddc1b7848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.173.139.193/58778",ACLName="no_extension_match"
[2020-09-05 13:03:42] NOTICE[1194][C-00000df4] chan_sip.c: Call from '' (62.173.139.193:58664) to extension '00013714234051349' rejected because extension not found in context 'public'.
[2020-09-05 13:03:42] SECURITY[1233] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-09-05T13:03:42.568-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00013714234051349",SessionID="0x7f2ddc04e988",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress
...
2020-09-07 04:13:18
185.147.215.8 attackbots
[2020-09-06 16:00:17] NOTICE[1194] chan_sip.c: Registration from '' failed for '185.147.215.8:56435' - Wrong password
[2020-09-06 16:00:17] SECURITY[1233] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-06T16:00:17.190-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="5029",SessionID="0x7f2ddc1b7848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.215.8/56435",Challenge="56172685",ReceivedChallenge="56172685",ReceivedHash="dce38353b6eff91298fd1d16c0f1fb2e"
[2020-09-06 16:01:01] NOTICE[1194] chan_sip.c: Registration from '' failed for '185.147.215.8:52061' - Wrong password
[2020-09-06 16:01:01] SECURITY[1233] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-06T16:01:01.239-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="6134",SessionID="0x7f2ddc1b7848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.215.8
...
2020-09-07 04:16:03
109.162.248.175 attackspambots
Unauthorized IMAP connection attempt
2020-09-07 04:44:01
199.241.138.126 attackspam
firewall-block, port(s): 22/tcp
2020-09-07 04:30:05
103.225.244.58 attack
Telnet Honeypot -> Telnet Bruteforce / Login
2020-09-07 04:19:59
118.166.206.11 attackbotsspam
Port probing on unauthorized port 445
2020-09-07 04:32:24
37.139.12.87 attack
ZGrab Application Layer Scanner Detection , PTR: PTR record not found
2020-09-07 04:33:12
103.83.7.173 attack
Sep  5 07:54:27 tux postfix/smtpd[30611]: connect from mail.antara.co.id[103.83.7.173]
Sep  5 07:54:28 tux postfix/smtpd[30611]: Anonymous TLS connection established from mail.antara.co.id[103.83.7.173]: TLSv1.2 whostnameh cipher AECDH-AES256-SHA (256/256 bhostnames)
Sep x@x
Sep  5 07:54:29 tux postfix/smtpd[30611]: disconnect from mail.antara.co.id[103.83.7.173]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.83.7.173
2020-09-07 04:15:19

最近上报的IP列表

104.21.57.13 104.21.57.143 104.21.57.147 104.21.57.141
104.21.57.145 104.21.57.16 104.21.57.132 104.21.57.149
104.21.7.65 104.21.57.162 104.21.57.157 104.21.57.170
104.21.57.173 104.21.57.171 104.21.57.169 104.21.57.182
104.21.57.176 104.21.57.19 104.21.57.194 104.21.7.7