必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.21.64.248 spam
Spammer Website using 104.21.64.248
2022-09-19 03:38:20
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.6.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60603
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.6.93.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 79 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:40:24 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 93.6.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 93.6.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.184.218 attackspambots
Jul 19 23:08:26 webhost01 sshd[18368]: Failed password for root from 106.12.184.218 port 44514 ssh2
...
2020-07-20 01:15:48
220.135.232.140 attackbotsspam
Port Scan
...
2020-07-20 00:48:19
195.24.129.234 attackspam
Jul 19 10:03:52 dignus sshd[29976]: Failed password for invalid user simona from 195.24.129.234 port 43006 ssh2
Jul 19 10:08:08 dignus sshd[30505]: Invalid user sdi from 195.24.129.234 port 58484
Jul 19 10:08:08 dignus sshd[30505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.129.234
Jul 19 10:08:10 dignus sshd[30505]: Failed password for invalid user sdi from 195.24.129.234 port 58484 ssh2
Jul 19 10:12:30 dignus sshd[31066]: Invalid user khim from 195.24.129.234 port 45746
...
2020-07-20 01:12:46
222.186.175.215 attackbotsspam
2020-07-19T16:36:20.922369server.espacesoutien.com sshd[16312]: Failed password for root from 222.186.175.215 port 20670 ssh2
2020-07-19T16:36:23.885330server.espacesoutien.com sshd[16312]: Failed password for root from 222.186.175.215 port 20670 ssh2
2020-07-19T16:36:27.258766server.espacesoutien.com sshd[16312]: Failed password for root from 222.186.175.215 port 20670 ssh2
2020-07-19T16:36:30.379519server.espacesoutien.com sshd[16312]: Failed password for root from 222.186.175.215 port 20670 ssh2
...
2020-07-20 00:52:47
94.102.56.130 attackbotsspam
 UDP 94.102.56.130:45574 -> port 520, len 37
2020-07-20 00:41:04
176.74.13.170 attackspam
Jul 19 18:22:31 meumeu sshd[1039656]: Invalid user old from 176.74.13.170 port 50552
Jul 19 18:22:31 meumeu sshd[1039656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.74.13.170 
Jul 19 18:22:31 meumeu sshd[1039656]: Invalid user old from 176.74.13.170 port 50552
Jul 19 18:22:33 meumeu sshd[1039656]: Failed password for invalid user old from 176.74.13.170 port 50552 ssh2
Jul 19 18:25:44 meumeu sshd[1039799]: Invalid user farhad from 176.74.13.170 port 45630
Jul 19 18:25:44 meumeu sshd[1039799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.74.13.170 
Jul 19 18:25:44 meumeu sshd[1039799]: Invalid user farhad from 176.74.13.170 port 45630
Jul 19 18:25:45 meumeu sshd[1039799]: Failed password for invalid user farhad from 176.74.13.170 port 45630 ssh2
Jul 19 18:29:16 meumeu sshd[1039910]: Invalid user mm from 176.74.13.170 port 40706
...
2020-07-20 00:42:53
104.145.220.178 attackspam
Jul 19 18:02:05 www sshd[8959]: Invalid user admin from 104.145.220.178
Jul 19 18:02:05 www sshd[8959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.145.220.178 
Jul 19 18:02:07 www sshd[8959]: Failed password for invalid user admin from 104.145.220.178 port 50366 ssh2
Jul 19 18:02:07 www sshd[8959]: Received disconnect from 104.145.220.178: 11: Bye Bye [preauth]
Jul 19 18:02:08 www sshd[8961]: Invalid user admin from 104.145.220.178
Jul 19 18:02:08 www sshd[8961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.145.220.178 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.145.220.178
2020-07-20 00:56:34
49.69.128.166 attack
20 attempts against mh-ssh on ice
2020-07-20 00:57:00
78.188.11.246 attackbots
Jul 19 18:08:26 mellenthin postfix/smtpd[27931]: NOQUEUE: reject: RCPT from unknown[78.188.11.246]: 554 5.7.1 Service unavailable; Client host [78.188.11.246] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/78.188.11.246; from= to= proto=ESMTP helo=<78.188.11.246.static.ttnet.com.tr>
2020-07-20 01:16:50
138.197.98.251 attackbots
Jul 19 18:00:23 rocket sshd[19168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.98.251
Jul 19 18:00:25 rocket sshd[19168]: Failed password for invalid user markus from 138.197.98.251 port 42836 ssh2
Jul 19 18:05:08 rocket sshd[20016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.98.251
...
2020-07-20 01:10:12
58.87.84.31 attackspam
Jul 19 22:19:42 dhoomketu sshd[1665962]: Invalid user boost from 58.87.84.31 port 32824
Jul 19 22:19:42 dhoomketu sshd[1665962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.84.31 
Jul 19 22:19:42 dhoomketu sshd[1665962]: Invalid user boost from 58.87.84.31 port 32824
Jul 19 22:19:44 dhoomketu sshd[1665962]: Failed password for invalid user boost from 58.87.84.31 port 32824 ssh2
Jul 19 22:22:33 dhoomketu sshd[1666037]: Invalid user etluser from 58.87.84.31 port 41522
...
2020-07-20 01:16:07
112.85.42.188 attack
07/19/2020-12:54:04.263371 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-07-20 00:56:09
222.186.173.238 attackbots
Jul 19 18:59:03 amit sshd\[23017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Jul 19 18:59:05 amit sshd\[23017\]: Failed password for root from 222.186.173.238 port 5248 ssh2
Jul 19 18:59:24 amit sshd\[23019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
...
2020-07-20 01:06:22
141.138.201.200 attackspambots
" "
2020-07-20 00:37:59
138.255.0.27 attackbots
Jul 19 18:40:15 [host] sshd[3899]: Invalid user jo
Jul 19 18:40:15 [host] sshd[3899]: pam_unix(sshd:a
Jul 19 18:40:18 [host] sshd[3899]: Failed password
2020-07-20 01:08:53

最近上报的IP列表

251.46.112.12 104.21.6.94 104.21.6.98 104.21.6.99
104.21.60.101 104.21.70.131 104.21.60.11 104.21.60.103
104.21.60.111 104.21.60.106 104.21.60.113 104.21.60.108
104.21.60.112 104.21.60.119 104.21.60.122 104.21.70.136
104.21.60.126 104.21.60.129 104.21.60.120 104.21.60.127