必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.79.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.79.50.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:59:08 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 50.79.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.79.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.62.28.79 attack
Aug 17 08:39:12 hcbbdb sshd\[31405\]: Invalid user joshua from 178.62.28.79
Aug 17 08:39:12 hcbbdb sshd\[31405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.28.79
Aug 17 08:39:13 hcbbdb sshd\[31405\]: Failed password for invalid user joshua from 178.62.28.79 port 52604 ssh2
Aug 17 08:43:23 hcbbdb sshd\[31925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.28.79  user=irc
Aug 17 08:43:25 hcbbdb sshd\[31925\]: Failed password for irc from 178.62.28.79 port 43026 ssh2
2019-08-17 17:01:43
98.246.48.95 attackspambots
Aug 17 10:59:29 OPSO sshd\[18097\]: Invalid user mauro from 98.246.48.95 port 58764
Aug 17 10:59:29 OPSO sshd\[18097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.246.48.95
Aug 17 10:59:32 OPSO sshd\[18097\]: Failed password for invalid user mauro from 98.246.48.95 port 58764 ssh2
Aug 17 11:03:48 OPSO sshd\[18554\]: Invalid user co from 98.246.48.95 port 48730
Aug 17 11:03:48 OPSO sshd\[18554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.246.48.95
2019-08-17 17:05:25
59.25.197.158 attack
Aug 17 09:21:44 ncomp sshd[18952]: Invalid user g from 59.25.197.158
Aug 17 09:21:44 ncomp sshd[18952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.158
Aug 17 09:21:44 ncomp sshd[18952]: Invalid user g from 59.25.197.158
Aug 17 09:21:46 ncomp sshd[18952]: Failed password for invalid user g from 59.25.197.158 port 45944 ssh2
2019-08-17 17:41:12
144.217.164.104 attack
Aug 17 07:06:04 mail sshd[31633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.164.104  user=root
Aug 17 07:06:07 mail sshd[31633]: Failed password for root from 144.217.164.104 port 35630 ssh2
Aug 17 07:06:10 mail sshd[31633]: Failed password for root from 144.217.164.104 port 35630 ssh2
Aug 17 07:06:04 mail sshd[31633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.164.104  user=root
Aug 17 07:06:07 mail sshd[31633]: Failed password for root from 144.217.164.104 port 35630 ssh2
Aug 17 07:06:10 mail sshd[31633]: Failed password for root from 144.217.164.104 port 35630 ssh2
Aug 17 07:06:04 mail sshd[31633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.164.104  user=root
Aug 17 07:06:07 mail sshd[31633]: Failed password for root from 144.217.164.104 port 35630 ssh2
Aug 17 07:06:10 mail sshd[31633]: Failed password for root from 144.217.164.104 port 35630 ssh2
A
2019-08-17 17:08:29
152.136.95.118 attack
Aug 16 23:29:52 kapalua sshd\[4854\]: Invalid user bob from 152.136.95.118
Aug 16 23:29:52 kapalua sshd\[4854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.95.118
Aug 16 23:29:54 kapalua sshd\[4854\]: Failed password for invalid user bob from 152.136.95.118 port 57516 ssh2
Aug 16 23:35:04 kapalua sshd\[5340\]: Invalid user ronjones from 152.136.95.118
Aug 16 23:35:04 kapalua sshd\[5340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.95.118
2019-08-17 17:39:29
222.186.15.101 attackspambots
Aug 17 11:51:34 server sshd\[10068\]: User root from 222.186.15.101 not allowed because listed in DenyUsers
Aug 17 11:51:35 server sshd\[10068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101  user=root
Aug 17 11:51:36 server sshd\[10068\]: Failed password for invalid user root from 222.186.15.101 port 29948 ssh2
Aug 17 11:51:39 server sshd\[10068\]: Failed password for invalid user root from 222.186.15.101 port 29948 ssh2
Aug 17 11:51:40 server sshd\[10068\]: Failed password for invalid user root from 222.186.15.101 port 29948 ssh2
2019-08-17 16:56:15
150.109.107.178 attack
Aug 16 23:27:44 hanapaa sshd\[5671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.107.178  user=mysql
Aug 16 23:27:46 hanapaa sshd\[5671\]: Failed password for mysql from 150.109.107.178 port 42544 ssh2
Aug 16 23:32:24 hanapaa sshd\[6102\]: Invalid user chi from 150.109.107.178
Aug 16 23:32:24 hanapaa sshd\[6102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.107.178
Aug 16 23:32:27 hanapaa sshd\[6102\]: Failed password for invalid user chi from 150.109.107.178 port 60334 ssh2
2019-08-17 17:42:27
185.176.27.166 attackspambots
Port scan on 3 port(s): 51504 56804 63404
2019-08-17 16:57:07
91.121.103.175 attack
2019-08-17T08:58:38.056150abusebot-2.cloudsearch.cf sshd\[9331\]: Invalid user uftp from 91.121.103.175 port 46750
2019-08-17 17:24:44
190.85.145.162 attack
Aug 17 10:18:19 debian sshd\[12519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.145.162  user=root
Aug 17 10:18:21 debian sshd\[12519\]: Failed password for root from 190.85.145.162 port 43052 ssh2
...
2019-08-17 17:20:53
66.249.64.2 attackspambots
Automatic report - Banned IP Access
2019-08-17 17:12:58
54.37.233.163 attack
Reported by AbuseIPDB proxy server.
2019-08-17 17:57:15
106.75.17.91 attackbotsspam
Aug 16 23:08:10 hiderm sshd\[12010\]: Invalid user shuai from 106.75.17.91
Aug 16 23:08:10 hiderm sshd\[12010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.17.91
Aug 16 23:08:12 hiderm sshd\[12010\]: Failed password for invalid user shuai from 106.75.17.91 port 59560 ssh2
Aug 16 23:14:16 hiderm sshd\[12639\]: Invalid user sales from 106.75.17.91
Aug 16 23:14:16 hiderm sshd\[12639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.17.91
2019-08-17 17:27:05
207.154.232.160 attackbotsspam
Aug 17 10:29:10 debian sshd\[12762\]: Invalid user setup from 207.154.232.160 port 42416
Aug 17 10:29:10 debian sshd\[12762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.232.160
...
2019-08-17 17:35:10
180.248.122.124 attackspambots
Aug 17 03:21:57 localhost kernel: [17270710.360052] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=180.248.122.124 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=50 ID=18354 DF PROTO=TCP SPT=45290 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 17 03:21:57 localhost kernel: [17270710.360063] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=180.248.122.124 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=50 ID=18354 DF PROTO=TCP SPT=45290 DPT=445 SEQ=2824154315 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405AC0103030201010402) 
Aug 17 03:22:00 localhost kernel: [17270713.468935] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=180.248.122.124 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=50 ID=19248 DF PROTO=TCP SPT=45290 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 17 03:22:00 localhost kernel: [17270713.468960] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=180.24
2019-08-17 17:28:14

最近上报的IP列表

104.21.79.49 104.21.79.52 104.21.79.6 104.21.79.55
104.21.79.60 104.21.79.59 104.21.79.58 104.21.79.61
104.21.79.62 104.21.79.63 104.21.79.64 104.21.79.65
104.21.79.75 104.21.79.76 104.21.79.73 104.21.79.8
104.21.79.70 104.21.79.71 104.21.79.68 104.21.79.82