必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.75.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24111
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.75.217.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:54:23 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 217.75.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 217.75.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
67.231.21.21 attackbotsspam
SMB Server BruteForce Attack
2020-08-24 19:30:19
146.66.244.246 attackbotsspam
Time:     Mon Aug 24 10:03:07 2020 +0000
IP:       146.66.244.246 (ES/Spain/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 24 09:58:46 vps1 sshd[10149]: Invalid user fabien from 146.66.244.246 port 59804
Aug 24 09:58:49 vps1 sshd[10149]: Failed password for invalid user fabien from 146.66.244.246 port 59804 ssh2
Aug 24 10:01:26 vps1 sshd[10519]: Invalid user library from 146.66.244.246 port 41962
Aug 24 10:01:28 vps1 sshd[10519]: Failed password for invalid user library from 146.66.244.246 port 41962 ssh2
Aug 24 10:03:05 vps1 sshd[10656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.66.244.246  user=root
2020-08-24 19:28:56
49.234.18.158 attackspambots
Aug 24 08:47:52 melroy-server sshd[20701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158 
Aug 24 08:47:54 melroy-server sshd[20701]: Failed password for invalid user iov from 49.234.18.158 port 33300 ssh2
...
2020-08-24 19:53:21
192.42.116.18 attackspam
CMS (WordPress or Joomla) login attempt.
2020-08-24 19:14:21
193.112.123.100 attackspam
[ssh] SSH attack
2020-08-24 19:01:57
193.112.118.128 attack
Invalid user bfq from 193.112.118.128 port 55136
2020-08-24 19:02:13
78.42.135.89 attack
Aug 22 15:20:45 serwer sshd\[8655\]: Invalid user hadoop from 78.42.135.89 port 54346
Aug 22 15:20:45 serwer sshd\[8655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.42.135.89
Aug 22 15:20:46 serwer sshd\[8655\]: Failed password for invalid user hadoop from 78.42.135.89 port 54346 ssh2
...
2020-08-24 19:29:53
192.241.182.13 attack
"Unauthorized connection attempt on SSHD detected"
2020-08-24 19:15:58
191.8.187.245 attackspam
Aug 24 12:20:54 sigma sshd\[9555\]: Failed password for root from 191.8.187.245 port 49472 ssh2Aug 24 12:27:44 sigma sshd\[9618\]: Invalid user wcj from 191.8.187.245
...
2020-08-24 19:32:27
191.5.55.7 attackbotsspam
Aug 24 13:07:09 buvik sshd[6105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.5.55.7
Aug 24 13:07:10 buvik sshd[6105]: Failed password for invalid user rafal from 191.5.55.7 port 42379 ssh2
Aug 24 13:12:58 buvik sshd[6881]: Invalid user ad from 191.5.55.7
...
2020-08-24 19:32:53
179.43.156.126 attack
WebFormToEmail Comment SPAM
2020-08-24 19:26:33
192.144.227.36 attack
Unauthorized connection attempt detected from IP address 192.144.227.36 to port 6169 [T]
2020-08-24 19:24:10
122.224.237.234 attackspambots
2020-08-24T11:34:27.788330shield sshd\[30785\]: Invalid user scott from 122.224.237.234 port 56657
2020-08-24T11:34:27.810645shield sshd\[30785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.237.234
2020-08-24T11:34:29.061230shield sshd\[30785\]: Failed password for invalid user scott from 122.224.237.234 port 56657 ssh2
2020-08-24T11:39:41.992318shield sshd\[31370\]: Invalid user oracle from 122.224.237.234 port 57738
2020-08-24T11:39:42.005904shield sshd\[31370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.237.234
2020-08-24 19:52:50
190.66.3.92 attackspam
Aug 24 13:19:54 vmd26974 sshd[20326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.66.3.92
Aug 24 13:19:56 vmd26974 sshd[20326]: Failed password for invalid user prasad from 190.66.3.92 port 38406 ssh2
...
2020-08-24 19:47:20
193.112.127.245 attackspambots
$f2bV_matches
2020-08-24 19:01:17

最近上报的IP列表

104.21.75.216 104.21.75.215 104.21.75.213 104.21.75.22
104.21.75.221 104.21.75.222 104.21.75.223 104.21.75.224
104.21.75.214 104.21.75.225 104.21.75.218 104.21.75.227
104.21.75.228 104.21.75.229 104.21.75.232 104.21.75.238
104.21.75.236 104.21.75.239 104.21.75.24 104.21.75.240