必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.79.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.79.11.			IN	A

;; AUTHORITY SECTION:
.			249	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 19:37:31 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 11.79.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.79.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
153.127.52.17 attack
Lines containing failures of 153.127.52.17
Aug  5 19:13:46 neweola sshd[13793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.127.52.17  user=r.r
Aug  5 19:13:48 neweola sshd[13793]: Failed password for r.r from 153.127.52.17 port 39616 ssh2
Aug  5 19:13:50 neweola sshd[13793]: Received disconnect from 153.127.52.17 port 39616:11: Bye Bye [preauth]
Aug  5 19:13:50 neweola sshd[13793]: Disconnected from authenticating user r.r 153.127.52.17 port 39616 [preauth]
Aug  5 19:19:49 neweola sshd[14012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.127.52.17  user=r.r
Aug  5 19:19:50 neweola sshd[14012]: Failed password for r.r from 153.127.52.17 port 43534 ssh2
Aug  5 19:19:51 neweola sshd[14012]: Received disconnect from 153.127.52.17 port 43534:11: Bye Bye [preauth]
Aug  5 19:19:51 neweola sshd[14012]: Disconnected from authenticating user r.r 153.127.52.17 port 43534 [preauth]
Aug  5........
------------------------------
2020-08-09 07:20:26
216.218.206.68 attackspambots
harvesting idiots since EST 1986
2020-08-09 06:57:33
128.14.226.159 attackbots
20 attempts against mh-ssh on echoip
2020-08-09 07:04:04
35.202.81.44 attack
Aug  9 00:56:43 vpn01 sshd[10072]: Failed password for root from 35.202.81.44 port 50822 ssh2
...
2020-08-09 07:05:27
187.189.15.119 attackbots
*Port Scan* detected from 187.189.15.119 (MX/Mexico/Mexico City/Mexico City (Jardines del Pedregal)/fixed-187-189-15-119.totalplay.net). 4 hits in the last 80 seconds
2020-08-09 07:26:28
175.24.34.90 attackbots
Aug  5 16:43:43 ahost sshd[28602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.34.90  user=r.r
Aug  5 16:43:44 ahost sshd[28602]: Failed password for r.r from 175.24.34.90 port 33656 ssh2
Aug  5 16:43:45 ahost sshd[28602]: Received disconnect from 175.24.34.90: 11: Bye Bye [preauth]
Aug  5 16:53:22 ahost sshd[28742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.34.90  user=r.r
Aug  5 16:53:24 ahost sshd[28742]: Failed password for r.r from 175.24.34.90 port 33420 ssh2
Aug  5 16:53:25 ahost sshd[28742]: Received disconnect from 175.24.34.90: 11: Bye Bye [preauth]
Aug  5 16:58:35 ahost sshd[28857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.34.90  user=r.r
Aug  5 16:58:37 ahost sshd[28857]: Failed password for r.r from 175.24.34.90 port 54400 ssh2
Aug  5 16:58:37 ahost sshd[28857]: Received disconnect from 175.24.34.90: 11........
------------------------------
2020-08-09 07:02:00
45.78.43.205 attack
2020-08-09T00:13:46.429885vps773228.ovh.net sshd[4604]: Failed password for root from 45.78.43.205 port 50508 ssh2
2020-08-09T00:17:35.162745vps773228.ovh.net sshd[4630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.78.43.205  user=root
2020-08-09T00:17:36.763620vps773228.ovh.net sshd[4630]: Failed password for root from 45.78.43.205 port 34180 ssh2
2020-08-09T00:21:20.099388vps773228.ovh.net sshd[4676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.78.43.205  user=root
2020-08-09T00:21:22.588526vps773228.ovh.net sshd[4676]: Failed password for root from 45.78.43.205 port 46052 ssh2
...
2020-08-09 07:02:16
161.35.201.124 attack
Failed password for root from 161.35.201.124 port 40860 ssh2
2020-08-09 06:57:11
218.92.0.250 attackspambots
2020-08-08T11:13:25.770607correo.[domain] sshd[47227]: Failed password for root from 218.92.0.250 port 31059 ssh2 2020-08-08T11:13:29.452846correo.[domain] sshd[47227]: Failed password for root from 218.92.0.250 port 31059 ssh2 2020-08-08T11:13:32.210047correo.[domain] sshd[47227]: Failed password for root from 218.92.0.250 port 31059 ssh2 ...
2020-08-09 06:55:54
80.86.45.98 attackspambots
Port probing on unauthorized port 8080
2020-08-09 07:08:52
106.54.86.87 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-08-09 07:17:50
51.68.123.192 attack
Bruteforce detected by fail2ban
2020-08-09 07:20:47
51.77.210.17 attackbotsspam
Aug  8 18:36:22 ny01 sshd[7826]: Failed password for root from 51.77.210.17 port 56308 ssh2
Aug  8 18:40:21 ny01 sshd[8342]: Failed password for root from 51.77.210.17 port 39620 ssh2
2020-08-09 07:27:09
120.244.110.25 attackspam
Aug  5 16:31:47 cumulus sshd[8879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.244.110.25  user=r.r
Aug  5 16:31:49 cumulus sshd[8879]: Failed password for r.r from 120.244.110.25 port 3467 ssh2
Aug  5 16:31:49 cumulus sshd[8879]: Received disconnect from 120.244.110.25 port 3467:11: Bye Bye [preauth]
Aug  5 16:31:49 cumulus sshd[8879]: Disconnected from 120.244.110.25 port 3467 [preauth]
Aug  5 16:35:49 cumulus sshd[9150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.244.110.25  user=r.r
Aug  5 16:35:51 cumulus sshd[9150]: Failed password for r.r from 120.244.110.25 port 3174 ssh2
Aug  5 16:35:51 cumulus sshd[9150]: Received disconnect from 120.244.110.25 port 3174:11: Bye Bye [preauth]
Aug  5 16:35:51 cumulus sshd[9150]: Disconnected from 120.244.110.25 port 3174 [preauth]
Aug  5 16:39:49 cumulus sshd[9629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0........
-------------------------------
2020-08-09 07:11:59
36.155.115.227 attackspambots
Aug  8 22:24:06 vps639187 sshd\[14128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.227  user=root
Aug  8 22:24:08 vps639187 sshd\[14128\]: Failed password for root from 36.155.115.227 port 38622 ssh2
Aug  8 22:25:24 vps639187 sshd\[14155\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.227  user=root
...
2020-08-09 07:15:34

最近上报的IP列表

104.21.78.67 104.21.79.132 104.21.79.106 104.21.79.117
104.21.79.158 104.21.78.96 104.21.79.148 104.19.138.56
104.21.79.168 104.21.79.182 104.21.79.179 104.21.79.20
104.21.79.220 104.21.79.216 104.21.79.214 104.21.79.167
104.21.79.213 104.21.79.239 104.21.79.30 104.21.79.219