必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.8.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41850
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.8.156.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 02:59:39 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 156.8.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 156.8.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.5.209.220 attack
Unauthorized connection attempt from IP address 114.5.209.220 on Port 445(SMB)
2020-08-27 18:07:23
46.182.21.251 attackspambots
Aug 25 11:58:00 rudra sshd[180346]: Address 46.182.21.251 maps to tor-exhostname-relay-1.anonymizing-proxy.dighostnamealcourage.de, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Aug 25 11:58:00 rudra sshd[180346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.182.21.251  user=r.r
Aug 25 11:58:02 rudra sshd[180346]: Failed password for r.r from 46.182.21.251 port 36817 ssh2
Aug 25 11:58:04 rudra sshd[180346]: Failed password for r.r from 46.182.21.251 port 36817 ssh2
Aug 25 11:58:06 rudra sshd[180346]: Failed password for r.r from 46.182.21.251 port 36817 ssh2
Aug 25 11:58:09 rudra sshd[180346]: Failed password for r.r from 46.182.21.251 port 36817 ssh2
Aug 25 11:58:12 rudra sshd[180346]: Failed password for r.r from 46.182.21.251 port 36817 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.182.21.251
2020-08-27 18:22:29
217.61.104.25 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-08-27 18:30:29
193.112.126.64 attackbots
Failed password for invalid user ftpuser from 193.112.126.64 port 43896 ssh2
2020-08-27 18:14:25
14.247.241.12 attackbotsspam
Attempted connection to port 445.
2020-08-27 17:53:59
114.4.240.54 attackspam
Unauthorised access (Aug 27) SRC=114.4.240.54 LEN=52 TTL=115 ID=32168 DF TCP DPT=445 WINDOW=8192 SYN
2020-08-27 18:02:12
177.200.76.69 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 177.200.76.69 (BR/Brazil/177-200-76-69.dynamic.skysever.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-27 08:14:05 plain authenticator failed for 177-200-76-69.dynamic.skysever.com.br [177.200.76.69]: 535 Incorrect authentication data (set_id=fd2302@nazeranyekta.com)
2020-08-27 18:42:02
142.93.242.246 attackspam
$f2bV_matches
2020-08-27 18:21:15
49.159.21.3 attackspam
DATE:2020-08-27 05:44:10, IP:49.159.21.3, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-08-27 18:26:56
40.113.232.40 attack
Aug x@x
Aug x@x
Aug x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=40.113.232.40
2020-08-27 18:31:41
185.234.219.11 attackspambots
Aug 27 08:56:46 srv01 postfix/smtpd\[27657\]: warning: unknown\[185.234.219.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 08:57:20 srv01 postfix/smtpd\[2236\]: warning: unknown\[185.234.219.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 09:04:49 srv01 postfix/smtpd\[10571\]: warning: unknown\[185.234.219.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 09:06:59 srv01 postfix/smtpd\[27006\]: warning: unknown\[185.234.219.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 09:07:34 srv01 postfix/smtpd\[10571\]: warning: unknown\[185.234.219.11\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-27 18:32:32
52.231.78.9 attack
24-8-2020 18:42:23	Unauthorized connection attempt (Brute-Force).
24-8-2020 18:42:23	Connection from IP address: 52.231.78.9 on port: 465


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=52.231.78.9
2020-08-27 18:41:39
218.4.172.234 attackspam
Aug 24 13:06:07 s5 sshd[13957]: Invalid user chs from 218.4.172.234 port 31828
Aug 24 13:06:07 s5 sshd[13957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.172.234
Aug 24 13:06:09 s5 sshd[13957]: Failed password for invalid user chs from 218.4.172.234 port 31828 ssh2
Aug 24 13:14:51 s5 sshd[14914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.172.234  user=r.r
Aug 24 13:14:53 s5 sshd[14914]: Failed password for r.r from 218.4.172.234 port 52696 ssh2
Aug 24 13:17:17 s5 sshd[15214]: Invalid user rupesh from 218.4.172.234 port 28864
Aug 24 13:17:17 s5 sshd[15214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.4.172.234
Aug 24 13:17:20 s5 sshd[15214]: Failed password for invalid user rupesh from 218.4.172.234 port 28864 ssh2
Aug 24 13:19:38 s5 sshd[15291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh rus........
------------------------------
2020-08-27 18:30:55
14.232.244.126 attack
Unauthorized connection attempt from IP address 14.232.244.126 on Port 445(SMB)
2020-08-27 18:03:02
183.89.214.156 attackspam
(imapd) Failed IMAP login from 183.89.214.156 (TH/Thailand/mx-ll-183.89.214-156.dynamic.3bb.co.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 27 08:15:05 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 11 secs): user=, method=PLAIN, rip=183.89.214.156, lip=5.63.12.44, TLS: Connection closed, session=<9PZhwtOtRMO3Wdac>
2020-08-27 18:05:52

最近上报的IP列表

104.21.8.155 104.21.8.154 104.21.8.152 104.21.8.157
104.21.8.149 104.21.8.159 104.21.8.158 104.21.8.160
104.21.8.16 104.21.8.161 104.21.8.162 104.21.8.163
104.21.8.164 104.21.8.166 104.21.8.168 104.21.8.165
104.21.8.17 104.21.8.170 104.21.8.169 104.21.8.178