必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.75.182
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.75.182.			IN	A

;; AUTHORITY SECTION:
.			200	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:54:11 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 182.75.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 182.75.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.177.216.68 attack
2020-03-05T05:53:44.116016vps773228.ovh.net sshd[8962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.216.68
2020-03-05T05:53:44.099374vps773228.ovh.net sshd[8962]: Invalid user testsite from 94.177.216.68 port 37376
2020-03-05T05:53:45.665426vps773228.ovh.net sshd[8962]: Failed password for invalid user testsite from 94.177.216.68 port 37376 ssh2
2020-03-05T07:00:13.964972vps773228.ovh.net sshd[10182]: Invalid user superman from 94.177.216.68 port 45804
2020-03-05T07:00:13.980775vps773228.ovh.net sshd[10182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.216.68
2020-03-05T07:00:13.964972vps773228.ovh.net sshd[10182]: Invalid user superman from 94.177.216.68 port 45804
2020-03-05T07:00:16.151759vps773228.ovh.net sshd[10182]: Failed password for invalid user superman from 94.177.216.68 port 45804 ssh2
2020-03-05T07:08:32.120972vps773228.ovh.net sshd[10374]: Invalid user uftp from 94.177.216
...
2020-03-05 14:11:40
61.187.53.119 attackbotsspam
Mar  4 19:57:20 tdfoods sshd\[21616\]: Invalid user user from 61.187.53.119
Mar  4 19:57:20 tdfoods sshd\[21616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.187.53.119
Mar  4 19:57:23 tdfoods sshd\[21616\]: Failed password for invalid user user from 61.187.53.119 port 7514 ssh2
Mar  4 20:05:30 tdfoods sshd\[22390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.187.53.119  user=root
Mar  4 20:05:32 tdfoods sshd\[22390\]: Failed password for root from 61.187.53.119 port 7516 ssh2
2020-03-05 14:07:06
37.49.229.180 attackspam
37.49.229.180 was recorded 10 times by 4 hosts attempting to connect to the following ports: 3980,1918,2819,4980. Incident counter (4h, 24h, all-time): 10, 16, 355
2020-03-05 14:16:01
185.53.88.59 attackspambots
[2020-03-05 00:57:15] NOTICE[1148][C-0000e2bf] chan_sip.c: Call from '' (185.53.88.59:62669) to extension '01146262229924' rejected because extension not found in context 'public'.
[2020-03-05 00:57:15] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-05T00:57:15.584-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146262229924",SessionID="0x7fd82c62bef8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.59/62669",ACLName="no_extension_match"
[2020-03-05 00:57:38] NOTICE[1148][C-0000e2c0] chan_sip.c: Call from '' (185.53.88.59:64034) to extension '01146346778565' rejected because extension not found in context 'public'.
[2020-03-05 00:57:38] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-05T00:57:38.614-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146346778565",SessionID="0x7fd82cb29a68",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.
...
2020-03-05 13:59:53
180.214.236.80 attack
Mar  4 23:53:46 Tower sshd[16883]: Connection from 180.214.236.80 port 50068 on 192.168.10.220 port 22 rdomain ""
Mar  4 23:53:48 Tower sshd[16883]: Invalid user user from 180.214.236.80 port 50068
2020-03-05 14:09:54
148.70.192.84 attackbots
port
2020-03-05 14:53:23
185.176.27.110 attack
03/05/2020-00:34:39.943956 185.176.27.110 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-05 14:48:41
156.96.56.102 attack
试图登陆别人网站邮箱等
2020-03-05 14:41:13
181.129.14.218 attackbots
Mar  5 11:22:39 areeb-Workstation sshd[19422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.14.218 
Mar  5 11:22:41 areeb-Workstation sshd[19422]: Failed password for invalid user pengcan from 181.129.14.218 port 11415 ssh2
...
2020-03-05 14:05:51
47.74.152.79 attackbotsspam
Automatic report - Banned IP Access
2020-03-05 14:17:26
181.111.224.34 attack
Mar  4 19:53:21 wbs sshd\[26852\]: Invalid user umbrella-finder@1234 from 181.111.224.34
Mar  4 19:53:21 wbs sshd\[26852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.111.224.34
Mar  4 19:53:23 wbs sshd\[26852\]: Failed password for invalid user umbrella-finder@1234 from 181.111.224.34 port 54686 ssh2
Mar  4 19:57:54 wbs sshd\[27259\]: Invalid user test from 181.111.224.34
Mar  4 19:57:54 wbs sshd\[27259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.111.224.34
2020-03-05 14:26:08
112.3.30.37 attackbots
Mar  4 08:41:00 server sshd\[30790\]: Failed password for root from 112.3.30.37 port 47404 ssh2
Mar  5 08:18:21 server sshd\[15868\]: Invalid user jocelyn from 112.3.30.37
Mar  5 08:18:21 server sshd\[15868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.37 
Mar  5 08:18:24 server sshd\[15868\]: Failed password for invalid user jocelyn from 112.3.30.37 port 36540 ssh2
Mar  5 08:25:15 server sshd\[17503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.3.30.37  user=root
...
2020-03-05 13:56:11
51.91.151.69 attackspam
Potential Directory Traversal Attempt.
2020-03-05 14:44:33
165.22.35.26 attackspam
[portscan] Port scan
2020-03-05 14:48:14
180.167.137.103 attackbots
Total attacks: 6
2020-03-05 14:46:50

最近上报的IP列表

104.21.75.181 104.21.75.178 104.21.75.184 104.21.75.187
104.21.75.185 104.21.75.183 104.21.75.192 104.21.75.19
104.21.75.193 104.21.75.190 104.21.75.186 104.21.75.188
104.21.75.194 104.21.75.195 104.21.75.199 104.21.75.198
104.21.75.196 104.21.75.20 104.21.75.200 104.21.75.208