必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.67.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.67.160.			IN	A

;; AUTHORITY SECTION:
.			465	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:45:27 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 160.67.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 160.67.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.239.253.232 attackbotsspam
Nov  9 15:38:50 venus sshd\[7358\]: Invalid user 123456 from 115.239.253.232 port 55038
Nov  9 15:38:51 venus sshd\[7358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.239.253.232
Nov  9 15:38:52 venus sshd\[7358\]: Failed password for invalid user 123456 from 115.239.253.232 port 55038 ssh2
...
2019-11-09 23:51:14
117.50.38.202 attackbotsspam
Nov  9 17:14:08 server sshd\[26646\]: Invalid user dvcs from 117.50.38.202 port 44542
Nov  9 17:14:08 server sshd\[26646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.202
Nov  9 17:14:10 server sshd\[26646\]: Failed password for invalid user dvcs from 117.50.38.202 port 44542 ssh2
Nov  9 17:20:14 server sshd\[31771\]: User root from 117.50.38.202 not allowed because listed in DenyUsers
Nov  9 17:20:14 server sshd\[31771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.38.202  user=root
2019-11-09 23:50:12
92.118.38.54 attackbots
Nov  9 16:48:02 vmanager6029 postfix/smtpd\[19342\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  9 16:48:42 vmanager6029 postfix/smtpd\[19342\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-09 23:50:36
50.199.94.84 attackbots
2019-11-09T15:40:20.811328shield sshd\[2626\]: Invalid user P@\$\$w0rd from 50.199.94.84 port 44062
2019-11-09T15:40:20.817237shield sshd\[2626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.199.94.84
2019-11-09T15:40:23.204197shield sshd\[2626\]: Failed password for invalid user P@\$\$w0rd from 50.199.94.84 port 44062 ssh2
2019-11-09T15:44:18.434924shield sshd\[3051\]: Invalid user not from 50.199.94.84 port 53734
2019-11-09T15:44:18.440359shield sshd\[3051\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.199.94.84
2019-11-09 23:47:40
185.220.101.65 attackspam
Automatic report - XMLRPC Attack
2019-11-09 23:16:50
103.242.13.70 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.13.70  user=root
Failed password for root from 103.242.13.70 port 37324 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.242.13.70  user=root
Failed password for root from 103.242.13.70 port 47646 ssh2
Invalid user Kaisu from 103.242.13.70 port 57988
2019-11-09 23:17:07
88.227.178.225 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/88.227.178.225/ 
 
 TR - 1H : (47)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TR 
 NAME ASN : ASN9121 
 
 IP : 88.227.178.225 
 
 CIDR : 88.227.176.0/22 
 
 PREFIX COUNT : 4577 
 
 UNIQUE IP COUNT : 6868736 
 
 
 ATTACKS DETECTED ASN9121 :  
  1H - 2 
  3H - 4 
  6H - 5 
 12H - 7 
 24H - 23 
 
 DateTime : 2019-11-09 15:56:54 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-09 23:31:04
212.69.18.234 attackspambots
Automatic report - Port Scan Attack
2019-11-09 23:55:05
195.91.136.58 attack
Nov  9 08:54:05 mailman postfix/smtpd[25900]: NOQUEUE: reject: RCPT from unknown[195.91.136.58]: 554 5.7.1 Service unavailable; Client host [195.91.136.58] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/195.91.136.58; from= to= proto=ESMTP helo=<[195.91.136.58]>
Nov  9 08:57:10 mailman postfix/smtpd[25914]: NOQUEUE: reject: RCPT from unknown[195.91.136.58]: 554 5.7.1 Service unavailable; Client host [195.91.136.58] blocked using sbl-xbl.spamhaus.org; https://www.spamhaus.org/query/ip/195.91.136.58; from= to= proto=ESMTP helo=<[195.91.136.58]>
2019-11-09 23:22:39
202.54.157.6 attack
Automatic report - Banned IP Access
2019-11-09 23:41:16
201.150.5.14 attackbots
Nov  9 04:52:14 tdfoods sshd\[25806\]: Invalid user aq1sw2de3fr4 from 201.150.5.14
Nov  9 04:52:14 tdfoods sshd\[25806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.150.5.14
Nov  9 04:52:16 tdfoods sshd\[25806\]: Failed password for invalid user aq1sw2de3fr4 from 201.150.5.14 port 60396 ssh2
Nov  9 04:56:33 tdfoods sshd\[26190\]: Invalid user 123jyq!@\# from 201.150.5.14
Nov  9 04:56:33 tdfoods sshd\[26190\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.150.5.14
2019-11-09 23:44:03
49.68.39.23 attackspambots
port 23 attempt blocked
2019-11-09 23:36:55
206.189.89.28 attackspambots
Nov  9 21:57:30 webhost01 sshd[31846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.89.28
Nov  9 21:57:32 webhost01 sshd[31846]: Failed password for invalid user admin from 206.189.89.28 port 54533 ssh2
...
2019-11-09 23:23:54
72.139.96.214 attack
RDP Bruteforce
2019-11-09 23:30:30
74.15.104.56 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/74.15.104.56/ 
 
 CA - 1H : (22)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CA 
 NAME ASN : ASN577 
 
 IP : 74.15.104.56 
 
 CIDR : 74.15.0.0/16 
 
 PREFIX COUNT : 1418 
 
 UNIQUE IP COUNT : 5509888 
 
 
 ATTACKS DETECTED ASN577 :  
  1H - 1 
  3H - 1 
  6H - 2 
 12H - 2 
 24H - 7 
 
 DateTime : 2019-11-09 15:56:54 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-09 23:31:32

最近上报的IP列表

104.21.67.156 104.21.67.158 104.21.67.157 104.21.67.164
104.21.67.167 104.21.70.61 104.21.67.17 104.21.67.171
104.21.67.180 104.21.67.186 104.21.67.185 104.21.67.190
104.21.67.193 104.21.67.198 104.21.70.62 104.21.67.196
104.21.67.202 104.21.67.205 104.21.67.20 104.21.67.2