必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.77.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22471
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.77.7.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:56:58 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 7.77.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.77.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.249.143.33 attackbotsspam
Oct  2 06:56:52 apollo sshd\[9122\]: Invalid user ht from 92.249.143.33Oct  2 06:56:54 apollo sshd\[9122\]: Failed password for invalid user ht from 92.249.143.33 port 54096 ssh2Oct  2 07:03:21 apollo sshd\[9139\]: Invalid user guest from 92.249.143.33
...
2019-10-02 14:37:57
197.43.173.78 attackspambots
Chat Spam
2019-10-02 14:43:00
2.8.178.15 attack
Chat Spam
2019-10-02 15:11:57
195.140.227.93 attack
Automatic report - SSH Brute-Force Attack
2019-10-02 15:04:39
146.0.133.4 attackbotsspam
Oct  2 06:58:37 lnxded64 sshd[24707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.133.4
Oct  2 06:58:37 lnxded64 sshd[24707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.133.4
2019-10-02 14:49:12
69.90.16.116 attackbotsspam
Oct  2 11:59:23 webhost01 sshd[13429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.90.16.116
Oct  2 11:59:25 webhost01 sshd[13429]: Failed password for invalid user costin from 69.90.16.116 port 55758 ssh2
...
2019-10-02 14:51:40
158.181.40.1 attackbotsspam
Oct  2 05:33:35 mxgate1 postfix/postscreen[4705]: CONNECT from [158.181.40.1]:11923 to [176.31.12.44]:25
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5021]: addr 158.181.40.1 listed by domain zen.spamhaus.org as 127.0.0.3
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5005]: addr 158.181.40.1 listed by domain cbl.abuseat.org as 127.0.0.2
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5021]: addr 158.181.40.1 listed by domain zen.spamhaus.org as 127.0.0.4
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5021]: addr 158.181.40.1 listed by domain zen.spamhaus.org as 127.0.0.11
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5004]: addr 158.181.40.1 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Oct  2 05:33:35 mxgate1 postfix/dnsblog[5006]: addr 158.181.40.1 listed by domain b.barracudacentral.org as 127.0.0.2
Oct  2 05:33:41 mxgate1 postfix/postscreen[4705]: DNSBL rank 5 for [158.181.40.1]:11923
Oct x@x
Oct  2 05:33:42 mxgate1 postfix/postscreen[4705]: HANGUP after 0.71 from [158.181.40.1]:11923 in tests........
-------------------------------
2019-10-02 15:01:10
84.208.62.38 attackspambots
2019-10-02T09:39:20.226649tmaserv sshd\[3469\]: Invalid user uploader from 84.208.62.38 port 60896
2019-10-02T09:39:20.230148tmaserv sshd\[3469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cm-84.208.62.38.getinternet.no
2019-10-02T09:39:22.245980tmaserv sshd\[3469\]: Failed password for invalid user uploader from 84.208.62.38 port 60896 ssh2
2019-10-02T09:43:08.092831tmaserv sshd\[3786\]: Invalid user odroid from 84.208.62.38 port 45458
2019-10-02T09:43:08.096759tmaserv sshd\[3786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cm-84.208.62.38.getinternet.no
2019-10-02T09:43:09.747400tmaserv sshd\[3786\]: Failed password for invalid user odroid from 84.208.62.38 port 45458 ssh2
...
2019-10-02 14:46:05
1.55.17.162 attackspambots
Oct  2 07:05:18 site3 sshd\[204573\]: Invalid user git from 1.55.17.162
Oct  2 07:05:18 site3 sshd\[204573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.17.162
Oct  2 07:05:21 site3 sshd\[204573\]: Failed password for invalid user git from 1.55.17.162 port 54264 ssh2
Oct  2 07:10:02 site3 sshd\[204742\]: Invalid user varsha from 1.55.17.162
Oct  2 07:10:02 site3 sshd\[204742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.17.162
...
2019-10-02 14:53:45
173.239.37.152 attackbotsspam
Oct  2 08:31:29 dedicated sshd[15138]: Invalid user Jukka from 173.239.37.152 port 46518
2019-10-02 14:51:23
80.64.99.58 attackspam
[portscan] Port scan
2019-10-02 15:14:30
193.32.163.182 attackspam
Oct  2 07:04:54 localhost sshd\[3977\]: Invalid user admin from 193.32.163.182 port 55054
Oct  2 07:04:54 localhost sshd\[3977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182
Oct  2 07:04:57 localhost sshd\[3977\]: Failed password for invalid user admin from 193.32.163.182 port 55054 ssh2
2019-10-02 14:48:43
160.153.154.142 attackbotsspam
160.153.154.142 - - [01/Oct/2019:23:51:12 -0400] "GET /?action=view&manufacturerID=158&productID=29211&linkID=13000&redirect=1&page=products1111111111111'%20UNION%20SELECT%20CHAR(45,120,49,45,81,45)--%20%20 HTTP/1.1" 302 379 "-" "-"
160.153.154.142 - - [01/Oct/2019:23:51:13 -0400] "GET /?action=view&manufacturerID=158&productID=29211&linkID=13000&redirect=1&page=products1111111111111'%20UNION%20SELECT%20CHAR(45,120,49,45,81,45)--%20%20 HTTP/1.1" 200 56468 "-" "-"
...
2019-10-02 14:58:42
115.29.11.56 attackspambots
Oct  1 20:22:44 php1 sshd\[21302\]: Invalid user dst from 115.29.11.56
Oct  1 20:22:44 php1 sshd\[21302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.29.11.56
Oct  1 20:22:46 php1 sshd\[21302\]: Failed password for invalid user dst from 115.29.11.56 port 51231 ssh2
Oct  1 20:28:36 php1 sshd\[21871\]: Invalid user newbreak from 115.29.11.56
Oct  1 20:28:36 php1 sshd\[21871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.29.11.56
2019-10-02 14:38:58
209.97.161.46 attack
Jan 29 12:55:16 vtv3 sshd\[27684\]: Invalid user db2fenc1 from 209.97.161.46 port 60774
Jan 29 12:55:16 vtv3 sshd\[27684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.161.46
Jan 29 12:55:17 vtv3 sshd\[27684\]: Failed password for invalid user db2fenc1 from 209.97.161.46 port 60774 ssh2
Jan 29 13:00:15 vtv3 sshd\[29029\]: Invalid user ellie from 209.97.161.46 port 36526
Jan 29 13:00:15 vtv3 sshd\[29029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.161.46
Feb  2 19:52:59 vtv3 sshd\[23692\]: Invalid user kai from 209.97.161.46 port 45544
Feb  2 19:52:59 vtv3 sshd\[23692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.97.161.46
Feb  2 19:53:01 vtv3 sshd\[23692\]: Failed password for invalid user kai from 209.97.161.46 port 45544 ssh2
Feb  2 19:57:57 vtv3 sshd\[25069\]: Invalid user ts1 from 209.97.161.46 port 49484
Feb  2 19:57:57 vtv3 sshd\[25069\]: pam_u
2019-10-02 14:56:49

最近上报的IP列表

104.21.77.66 104.21.77.76 104.21.77.70 104.21.77.78
104.21.77.79 104.21.77.81 104.21.77.80 104.21.77.8
104.21.77.84 104.21.77.90 104.21.77.86 104.21.77.88
104.21.77.9 104.21.77.92 104.21.77.82 104.21.77.93
104.21.77.94 104.21.77.96 104.21.77.99 104.21.77.97