必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.81.22
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35810
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.81.22.			IN	A

;; AUTHORITY SECTION:
.			538	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:02:39 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 22.81.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 22.81.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
221.122.73.130 attack
$f2bV_matches
2020-05-03 19:48:50
52.251.59.211 attackspambots
Repeated RDP login failures. Last user: motorola
2020-05-03 19:27:49
118.24.83.41 attackbots
May  3 03:13:24 dns1 sshd[13542]: Failed password for root from 118.24.83.41 port 52354 ssh2
May  3 03:17:46 dns1 sshd[13824]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.83.41 
May  3 03:17:48 dns1 sshd[13824]: Failed password for invalid user rolf from 118.24.83.41 port 45202 ssh2
2020-05-03 19:36:54
193.37.32.148 attackbotsspam
2020-05-03T03:41:56.696604abusebot-2.cloudsearch.cf sshd[12183]: Invalid user nginx from 193.37.32.148 port 59672
2020-05-03T03:41:56.703475abusebot-2.cloudsearch.cf sshd[12183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.37.32.148
2020-05-03T03:41:56.696604abusebot-2.cloudsearch.cf sshd[12183]: Invalid user nginx from 193.37.32.148 port 59672
2020-05-03T03:41:58.536727abusebot-2.cloudsearch.cf sshd[12183]: Failed password for invalid user nginx from 193.37.32.148 port 59672 ssh2
2020-05-03T03:46:37.575164abusebot-2.cloudsearch.cf sshd[12371]: Invalid user nz from 193.37.32.148 port 46834
2020-05-03T03:46:37.580720abusebot-2.cloudsearch.cf sshd[12371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.37.32.148
2020-05-03T03:46:37.575164abusebot-2.cloudsearch.cf sshd[12371]: Invalid user nz from 193.37.32.148 port 46834
2020-05-03T03:46:39.988572abusebot-2.cloudsearch.cf sshd[12371]: Failed passw
...
2020-05-03 20:00:05
192.241.202.169 attackbots
Invalid user appadmin from 192.241.202.169 port 35392
2020-05-03 19:17:13
104.248.182.179 attackbots
Invalid user ehsan from 104.248.182.179 port 49596
2020-05-03 19:32:28
60.13.230.199 attackspam
May  3 10:07:41 meumeu sshd[22814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.13.230.199 
May  3 10:07:42 meumeu sshd[22814]: Failed password for invalid user arjun from 60.13.230.199 port 59810 ssh2
May  3 10:10:28 meumeu sshd[23227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.13.230.199 
...
2020-05-03 19:15:20
80.82.70.138 attackspam
May  3 11:40:56 ns3042688 courier-pop3d: LOGIN FAILED, user=cs@sikla-systems.info, ip=\[::ffff:80.82.70.138\]
...
2020-05-03 19:35:54
120.92.72.190 attackbotsspam
(sshd) Failed SSH login from 120.92.72.190 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May  3 13:35:17 amsweb01 sshd[6429]: Invalid user trs from 120.92.72.190 port 26919
May  3 13:35:19 amsweb01 sshd[6429]: Failed password for invalid user trs from 120.92.72.190 port 26919 ssh2
May  3 13:37:44 amsweb01 sshd[6675]: Invalid user akhavan from 120.92.72.190 port 30664
May  3 13:37:46 amsweb01 sshd[6675]: Failed password for invalid user akhavan from 120.92.72.190 port 30664 ssh2
May  3 13:39:01 amsweb01 sshd[6774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.72.190  user=root
2020-05-03 19:42:17
3.17.109.212 attackbots
May  2 00:45:44 smtp sshd[15042]: Invalid user tia from 3.17.109.212
May  2 00:45:46 smtp sshd[15042]: Failed password for invalid user tia from 3.17.109.212 port 39532 ssh2
May  2 01:15:08 smtp sshd[19292]: Invalid user tabb from 3.17.109.212


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=3.17.109.212
2020-05-03 19:28:50
187.115.160.220 attackspam
Received: from 187.115.160.220.static.gvt.net.br
Received: from mx.reskind.net [183.149.184.71] by smtp-server1.cfdenselr.com with ASMTP
Received: from group21.345mail.com [129.102.144.95] by mmx09.tilkbans.com with ASMTP
From: "Laila" 
LINK: https://johr.page.link/S54t
2020-05-03 19:24:01
14.186.17.129 attackspam
2020-05-0305:45:061jV5YY-0007o4-Uh\<=info@whatsup2013.chH=\(localhost\)[222.179.125.77]:57850P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3112id=a2a214474c674d45d9dc6ac621d5ffe3a4c87f@whatsup2013.chT="Youareasstunningasasunlight"fortrod6856@gmail.comrudy7528@gmail.com2020-05-0305:47:371jV5bF-0007zO-SW\<=info@whatsup2013.chH=\(localhost\)[14.186.37.56]:40284P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3073id=24c19c515a71a457748a7c2f24f0c9e5c62c5748e7@whatsup2013.chT="Areyoucurrentlylonely\?"forsky071195@gmail.comalexanderwinstanley@live.com2020-05-0305:46:341jV5aM-0007vl-4u\<=info@whatsup2013.chH=\(localhost\)[186.226.14.50]:39549P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3174id=8fbd8dded5fe2b270045f3a054939995a60aed0e@whatsup2013.chT="fromElwyntojust.print4"forjust.print4@gmail.comjagveer735@gmail.com2020-05-0305:46:061jV5Zt-0007tc-PT\<=info@whatsup2013.chH=\(localh
2020-05-03 19:22:53
158.181.76.112 attack
1588477666 - 05/03/2020 05:47:46 Host: 158.181.76.112/158.181.76.112 Port: 445 TCP Blocked
2020-05-03 19:18:27
195.54.167.17 attack
May  3 12:08:25 [host] kernel: [5129401.601554] [U
May  3 12:08:45 [host] kernel: [5129420.809355] [U
May  3 12:22:40 [host] kernel: [5130256.502313] [U
May  3 12:49:46 [host] kernel: [5131881.890990] [U
May  3 12:51:42 [host] kernel: [5131997.829017] [U
May  3 12:55:42 [host] kernel: [5132237.226649] [U
2020-05-03 19:31:38
175.145.232.73 attackbotsspam
2020-05-03T11:06:57.475538randservbullet-proofcloud-66.localdomain sshd[20357]: Invalid user syhg from 175.145.232.73 port 43376
2020-05-03T11:06:57.480778randservbullet-proofcloud-66.localdomain sshd[20357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.232.73
2020-05-03T11:06:57.475538randservbullet-proofcloud-66.localdomain sshd[20357]: Invalid user syhg from 175.145.232.73 port 43376
2020-05-03T11:06:59.561825randservbullet-proofcloud-66.localdomain sshd[20357]: Failed password for invalid user syhg from 175.145.232.73 port 43376 ssh2
...
2020-05-03 19:43:22

最近上报的IP列表

104.21.81.21 104.21.81.220 104.21.81.222 104.21.81.225
104.21.81.228 104.21.81.223 104.21.81.229 104.21.81.227
104.21.81.233 104.21.81.230 104.21.81.234 104.21.81.235
104.21.81.238 104.21.81.236 104.21.81.242 104.21.81.243
104.21.81.244 104.21.81.239 104.21.81.245 104.21.81.246