必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.80.174
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36430
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.80.174.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:01:03 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 174.80.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 174.80.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
150.95.83.78 attackspambots
$f2bV_matches
2019-09-18 02:32:59
112.33.16.34 attackspam
Sep 17 17:36:46 MainVPS sshd[14082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.16.34  user=root
Sep 17 17:36:48 MainVPS sshd[14082]: Failed password for root from 112.33.16.34 port 38578 ssh2
Sep 17 17:40:14 MainVPS sshd[14450]: Invalid user Miika from 112.33.16.34 port 60246
Sep 17 17:40:14 MainVPS sshd[14450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.33.16.34
Sep 17 17:40:14 MainVPS sshd[14450]: Invalid user Miika from 112.33.16.34 port 60246
Sep 17 17:40:16 MainVPS sshd[14450]: Failed password for invalid user Miika from 112.33.16.34 port 60246 ssh2
...
2019-09-18 02:45:59
201.201.150.18 attack
Unauthorized connection attempt from IP address 201.201.150.18 on Port 445(SMB)
2019-09-18 02:23:05
117.50.99.9 attack
Sep 17 06:48:41 tdfoods sshd\[24284\]: Invalid user liprod from 117.50.99.9
Sep 17 06:48:41 tdfoods sshd\[24284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.9
Sep 17 06:48:44 tdfoods sshd\[24284\]: Failed password for invalid user liprod from 117.50.99.9 port 42944 ssh2
Sep 17 06:51:36 tdfoods sshd\[24527\]: Invalid user sunset from 117.50.99.9
Sep 17 06:51:36 tdfoods sshd\[24527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.99.9
2019-09-18 02:27:04
51.75.247.13 attackbots
Sep 17 19:01:15 OPSO sshd\[16814\]: Invalid user kelda from 51.75.247.13 port 44098
Sep 17 19:01:15 OPSO sshd\[16814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.247.13
Sep 17 19:01:17 OPSO sshd\[16814\]: Failed password for invalid user kelda from 51.75.247.13 port 44098 ssh2
Sep 17 19:05:08 OPSO sshd\[17667\]: Invalid user rf from 51.75.247.13 port 36566
Sep 17 19:05:08 OPSO sshd\[17667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.247.13
2019-09-18 03:07:14
176.216.248.233 attackbotsspam
17.09.2019 15:31:22 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2019-09-18 02:59:30
188.11.67.165 attack
Sep 17 18:17:57 microserver sshd[26019]: Invalid user apache from 188.11.67.165 port 51432
Sep 17 18:17:57 microserver sshd[26019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.11.67.165
Sep 17 18:17:59 microserver sshd[26019]: Failed password for invalid user apache from 188.11.67.165 port 51432 ssh2
Sep 17 18:25:11 microserver sshd[26876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.11.67.165  user=postfix
Sep 17 18:25:12 microserver sshd[26876]: Failed password for postfix from 188.11.67.165 port 40694 ssh2
Sep 17 18:39:21 microserver sshd[28715]: Invalid user mumbleserver from 188.11.67.165 port 47923
Sep 17 18:39:21 microserver sshd[28715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.11.67.165
Sep 17 18:39:23 microserver sshd[28715]: Failed password for invalid user mumbleserver from 188.11.67.165 port 47923 ssh2
Sep 17 18:46:19 microserver sshd[29862]: pam_unix(s
2019-09-18 03:04:49
185.255.46.25 attack
proto=tcp  .  spt=36889  .  dpt=25  .     (listed on Blocklist de  Sep 16)     (640)
2019-09-18 03:01:54
51.255.234.209 attackbotsspam
Sep 17 08:38:32 kapalua sshd\[27039\]: Invalid user odoo from 51.255.234.209
Sep 17 08:38:32 kapalua sshd\[27039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.234.209
Sep 17 08:38:33 kapalua sshd\[27039\]: Failed password for invalid user odoo from 51.255.234.209 port 54466 ssh2
Sep 17 08:42:55 kapalua sshd\[27565\]: Invalid user lamer from 51.255.234.209
Sep 17 08:42:55 kapalua sshd\[27565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.234.209
2019-09-18 02:49:15
50.239.140.1 attack
Sep 17 04:19:02 hcbb sshd\[14486\]: Invalid user default from 50.239.140.1
Sep 17 04:19:02 hcbb sshd\[14486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1
Sep 17 04:19:05 hcbb sshd\[14486\]: Failed password for invalid user default from 50.239.140.1 port 50278 ssh2
Sep 17 04:23:16 hcbb sshd\[14837\]: Invalid user qn from 50.239.140.1
Sep 17 04:23:16 hcbb sshd\[14837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.140.1
2019-09-18 02:49:34
145.239.87.109 attackbots
Sep 17 03:44:41 web9 sshd\[6954\]: Invalid user postgres from 145.239.87.109
Sep 17 03:44:41 web9 sshd\[6954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.87.109
Sep 17 03:44:43 web9 sshd\[6954\]: Failed password for invalid user postgres from 145.239.87.109 port 36124 ssh2
Sep 17 03:49:20 web9 sshd\[7951\]: Invalid user user from 145.239.87.109
Sep 17 03:49:20 web9 sshd\[7951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.87.109
2019-09-18 03:05:24
51.68.46.156 attackspam
Sep 17 20:47:58 SilenceServices sshd[1926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.46.156
Sep 17 20:48:00 SilenceServices sshd[1926]: Failed password for invalid user Administrator from 51.68.46.156 port 37704 ssh2
Sep 17 20:51:52 SilenceServices sshd[3395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.46.156
2019-09-18 03:03:30
77.242.21.249 attackbotsspam
Unauthorized connection attempt from IP address 77.242.21.249 on Port 445(SMB)
2019-09-18 02:51:21
179.49.2.44 attackbotsspam
Unauthorized connection attempt from IP address 179.49.2.44 on Port 445(SMB)
2019-09-18 02:33:51
117.152.189.215 attackbots
Sep 17 15:31:17 mail kernel: [840024.526201] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=117.152.189.215 DST=91.205.173.180 LEN=52 TOS=0x04 PREC=0x00 TTL=109 ID=21505 DF PROTO=TCP SPT=9977 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
Sep 17 15:31:20 mail kernel: [840027.534865] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=117.152.189.215 DST=91.205.173.180 LEN=52 TOS=0x04 PREC=0x00 TTL=109 ID=22410 DF PROTO=TCP SPT=9977 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0 
Sep 17 15:31:26 mail kernel: [840033.529281] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=117.152.189.215 DST=91.205.173.180 LEN=48 TOS=0x04 PREC=0x00 TTL=109 ID=24261 DF PROTO=TCP SPT=11957 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2019-09-18 02:49:55

最近上报的IP列表

104.21.80.172 104.21.80.176 104.21.80.171 104.21.80.179
104.21.80.177 104.21.80.181 104.21.80.180 104.21.80.185
104.21.80.183 104.21.80.187 104.21.80.19 104.21.80.188
104.21.80.186 104.21.80.190 104.21.80.191 104.21.80.192
104.21.80.195 104.21.80.194 104.21.80.193 104.21.80.20