必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.71.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.71.28.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:49:59 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 28.71.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 28.71.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.142.236.129 attackbots
Oct  4 05:45:36 km20725 sshd\[17684\]: Invalid user 123 from 185.142.236.129Oct  4 05:45:39 km20725 sshd\[17684\]: Failed password for invalid user 123 from 185.142.236.129 port 41416 ssh2Oct  4 05:49:47 km20725 sshd\[17857\]: Invalid user H0st@2017 from 185.142.236.129Oct  4 05:49:50 km20725 sshd\[17857\]: Failed password for invalid user H0st@2017 from 185.142.236.129 port 56250 ssh2
...
2019-10-04 19:04:42
222.186.15.204 attackbots
Oct  4 11:39:15 Ubuntu-1404-trusty-64-minimal sshd\[9865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.204  user=root
Oct  4 11:39:17 Ubuntu-1404-trusty-64-minimal sshd\[9865\]: Failed password for root from 222.186.15.204 port 54828 ssh2
Oct  4 11:39:20 Ubuntu-1404-trusty-64-minimal sshd\[9865\]: Failed password for root from 222.186.15.204 port 54828 ssh2
Oct  4 11:39:22 Ubuntu-1404-trusty-64-minimal sshd\[9865\]: Failed password for root from 222.186.15.204 port 54828 ssh2
Oct  4 12:29:44 Ubuntu-1404-trusty-64-minimal sshd\[23618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.204  user=root
2019-10-04 18:31:07
123.214.186.186 attackbotsspam
Oct  4 12:11:57 andromeda sshd\[7572\]: Invalid user admin from 123.214.186.186 port 36762
Oct  4 12:11:57 andromeda sshd\[7572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.214.186.186
Oct  4 12:12:00 andromeda sshd\[7572\]: Failed password for invalid user admin from 123.214.186.186 port 36762 ssh2
2019-10-04 18:26:00
177.37.98.242 attack
port scan and connect, tcp 8080 (http-proxy)
2019-10-04 18:52:42
154.236.162.48 attackspam
Chat Spam
2019-10-04 18:30:38
1.203.80.78 attack
Oct  4 10:16:26 microserver sshd[57143]: Invalid user Alaska2017 from 1.203.80.78 port 45827
Oct  4 10:16:26 microserver sshd[57143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.80.78
Oct  4 10:16:28 microserver sshd[57143]: Failed password for invalid user Alaska2017 from 1.203.80.78 port 45827 ssh2
Oct  4 10:22:14 microserver sshd[57868]: Invalid user P@$$word2019 from 1.203.80.78 port 35473
Oct  4 10:22:14 microserver sshd[57868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.80.78
Oct  4 10:33:42 microserver sshd[59293]: Invalid user Wachtwoord@123 from 1.203.80.78 port 43003
Oct  4 10:33:42 microserver sshd[59293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.203.80.78
Oct  4 10:33:44 microserver sshd[59293]: Failed password for invalid user Wachtwoord@123 from 1.203.80.78 port 43003 ssh2
Oct  4 10:39:31 microserver sshd[60038]: Invalid user Haslo@1234 from 1.203.
2019-10-04 18:52:03
180.167.233.252 attackbotsspam
Oct  4 12:01:02 dev0-dcde-rnet sshd[6630]: Failed password for root from 180.167.233.252 port 36642 ssh2
Oct  4 12:04:48 dev0-dcde-rnet sshd[6641]: Failed password for root from 180.167.233.252 port 45544 ssh2
2019-10-04 18:47:55
37.45.61.154 attack
" "
2019-10-04 18:24:46
216.244.66.195 attack
\[Fri Oct 04 12:34:26.177799 2019\] \[access_compat:error\] \[pid 2048:tid 140102521001728\] \[client 216.244.66.195:63318\] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/category
\[Fri Oct 04 12:34:57.089958 2019\] \[access_compat:error\] \[pid 3788:tid 140102638499584\] \[client 216.244.66.195:64530\] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/tiffany-brookes-sex-with-a-salesman
\[Fri Oct 04 12:36:57.829639 2019\] \[access_compat:error\] \[pid 2048:tid 140102604928768\] \[client 216.244.66.195:31208\] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/trina-michaels-is-back-milflessons
\[Fri Oct 04 12:38:58.545424 2019\] \[access_compat:error\] \[pid 2018:tid 140102630106880\] \[client 216.244.66.195:38178\] AH01797: client denied by server configuration: /var/www/vhosts/yourdailypornvideos.com/httpdocs/adriana-remy-hindsight-part-two
...
2019-10-04 18:39:30
172.81.243.232 attackbotsspam
Oct  4 07:51:59 vps691689 sshd[16618]: Failed password for root from 172.81.243.232 port 47388 ssh2
Oct  4 07:56:54 vps691689 sshd[16722]: Failed password for root from 172.81.243.232 port 59482 ssh2
...
2019-10-04 18:42:59
178.128.194.116 attackspambots
Invalid user bash from 178.128.194.116 port 55944
2019-10-04 18:41:09
79.21.59.9 attack
firewall-block, port(s): 23/tcp
2019-10-04 18:49:07
222.186.175.216 attack
Oct  4 12:31:25 nextcloud sshd\[21089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Oct  4 12:31:28 nextcloud sshd\[21089\]: Failed password for root from 222.186.175.216 port 45192 ssh2
Oct  4 12:31:32 nextcloud sshd\[21089\]: Failed password for root from 222.186.175.216 port 45192 ssh2
...
2019-10-04 18:32:24
110.49.70.241 attackbotsspam
Invalid user archive from 110.49.70.241 port 58288
2019-10-04 18:22:40
120.241.38.230 attackspam
Oct  4 06:36:14 TORMINT sshd\[13480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.241.38.230  user=root
Oct  4 06:36:17 TORMINT sshd\[13480\]: Failed password for root from 120.241.38.230 port 51382 ssh2
Oct  4 06:41:11 TORMINT sshd\[13859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.241.38.230  user=root
...
2019-10-04 18:43:33

最近上报的IP列表

104.21.71.32 104.21.71.33 104.21.71.36 104.21.71.37
104.21.71.38 104.21.71.41 104.21.71.44 104.21.71.40
104.21.71.43 104.21.71.47 104.21.71.48 104.21.71.49
104.21.71.45 104.21.71.5 104.21.71.53 104.21.71.52
104.21.71.51 104.21.71.54 104.21.71.55 104.21.71.56