必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.80.183
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.80.183.			IN	A

;; AUTHORITY SECTION:
.			281	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:01:06 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 183.80.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 183.80.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.108.67.133 attack
" "
2019-10-21 20:35:16
202.70.89.55 attackspambots
Oct 21 13:45:07 lnxweb62 sshd[15690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.70.89.55
2019-10-21 20:46:21
222.186.175.215 attackspambots
F2B jail: sshd. Time: 2019-10-21 14:00:24, Reported by: VKReport
2019-10-21 20:21:17
113.23.50.30 attackspam
2019-10-21 x@x
2019-10-21 13:10:45 unexpected disconnection while reading SMTP command from ([113.23.50.30]) [113.23.50.30]:23780 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.23.50.30
2019-10-21 20:49:41
182.61.46.191 attack
Oct 21 13:45:12 MK-Soft-VM7 sshd[3411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.46.191 
Oct 21 13:45:14 MK-Soft-VM7 sshd[3411]: Failed password for invalid user ce from 182.61.46.191 port 57000 ssh2
...
2019-10-21 20:41:21
59.13.94.184 attackbotsspam
2019-10-21 x@x
2019-10-21 12:52:40 unexpected disconnection while reading SMTP command from ([59.13.94.184]) [59.13.94.184]:37752 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-10-21 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=59.13.94.184
2019-10-21 20:45:26
54.37.69.74 attack
2019-10-21T14:28:02.658824scmdmz1 sshd\[9293\]: Invalid user daegu from 54.37.69.74 port 59996
2019-10-21T14:28:02.661490scmdmz1 sshd\[9293\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.extrakhalifa.com
2019-10-21T14:28:04.994952scmdmz1 sshd\[9293\]: Failed password for invalid user daegu from 54.37.69.74 port 59996 ssh2
...
2019-10-21 20:30:38
198.199.72.42 attackbotsspam
Port Scan
2019-10-21 20:38:56
46.229.213.242 attack
Oct 21 02:20:59 php1 sshd\[26832\]: Invalid user raspberry123 from 46.229.213.242
Oct 21 02:20:59 php1 sshd\[26832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.229.213.242
Oct 21 02:21:01 php1 sshd\[26832\]: Failed password for invalid user raspberry123 from 46.229.213.242 port 53104 ssh2
Oct 21 02:25:11 php1 sshd\[27192\]: Invalid user POIU0987 from 46.229.213.242
Oct 21 02:25:11 php1 sshd\[27192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.229.213.242
2019-10-21 20:33:08
211.159.152.252 attackspam
2019-10-21T12:32:40.458673abusebot-5.cloudsearch.cf sshd\[4287\]: Invalid user fuckyou from 211.159.152.252 port 36760
2019-10-21 20:39:25
188.77.179.84 attackspambots
Oct 21 02:15:05 php1 sshd\[4245\]: Invalid user tony45 from 188.77.179.84
Oct 21 02:15:05 php1 sshd\[4245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mjs.ddns.jazztel.es
Oct 21 02:15:07 php1 sshd\[4245\]: Failed password for invalid user tony45 from 188.77.179.84 port 55902 ssh2
Oct 21 02:19:24 php1 sshd\[4642\]: Invalid user dhidy from 188.77.179.84
Oct 21 02:19:24 php1 sshd\[4642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mjs.ddns.jazztel.es
2019-10-21 20:35:32
81.12.159.146 attackbotsspam
Oct 21 14:03:44 MK-Soft-VM3 sshd[25340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.12.159.146 
Oct 21 14:03:46 MK-Soft-VM3 sshd[25340]: Failed password for invalid user www from 81.12.159.146 port 49494 ssh2
...
2019-10-21 20:25:59
167.71.241.174 attack
Wordpress bruteforce
2019-10-21 20:52:03
49.88.112.114 attack
Oct 21 02:47:56 php1 sshd\[29141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Oct 21 02:47:58 php1 sshd\[29141\]: Failed password for root from 49.88.112.114 port 46769 ssh2
Oct 21 02:49:00 php1 sshd\[29234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Oct 21 02:49:01 php1 sshd\[29234\]: Failed password for root from 49.88.112.114 port 34745 ssh2
Oct 21 02:50:04 php1 sshd\[29305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2019-10-21 20:51:35
103.88.129.21 attackspambots
Unauthorised access (Oct 21) SRC=103.88.129.21 LEN=52 TTL=117 ID=22132 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-21 20:24:51

最近上报的IP列表

104.21.80.185 104.21.80.187 104.21.80.19 104.21.80.188
104.21.80.186 104.21.80.190 104.21.80.191 104.21.80.192
104.21.80.195 104.21.80.194 104.21.80.193 104.21.80.20
104.21.80.197 241.171.24.92 104.21.80.201 104.21.80.202
104.21.80.205 104.21.80.203 104.21.80.207 104.21.80.204