必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.82.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.82.106.			IN	A

;; AUTHORITY SECTION:
.			419	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:03:15 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 106.82.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.82.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.85.42.237 attack
Apr 12 04:42:12 NPSTNNYC01T sshd[9255]: Failed password for root from 112.85.42.237 port 58266 ssh2
Apr 12 04:43:20 NPSTNNYC01T sshd[9442]: Failed password for root from 112.85.42.237 port 24873 ssh2
...
2020-04-12 16:56:14
23.253.73.217 attack
Apr  6 22:31:56 sundrops sshd[28978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.253.73.217  user=root
Apr  6 22:31:59 sundrops sshd[28978]: Failed password for root from 23.253.73.217 port 41182 ssh2
Apr  6 22:43:48 sundrops sshd[30806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.253.73.217  user=root
Apr  6 22:43:49 sundrops sshd[30806]: Failed password for root from 23.253.73.217 port 35044 ssh2
Apr  6 22:49:25 sundrops sshd[31633]: Invalid user postgres from 23.253.73.217
2020-04-12 16:13:39
205.206.50.222 attack
Wordpress malicious attack:[sshd]
2020-04-12 16:25:11
163.172.230.4 attackbotsspam
[2020-04-12 04:13:58] NOTICE[12114][C-00004c3a] chan_sip.c: Call from '' (163.172.230.4:59791) to extension '-011972592277524' rejected because extension not found in context 'public'.
[2020-04-12 04:13:58] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-12T04:13:58.300-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="-011972592277524",SessionID="0x7f020c167898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.230.4/59791",ACLName="no_extension_match"
[2020-04-12 04:18:08] NOTICE[12114][C-00004c40] chan_sip.c: Call from '' (163.172.230.4:51698) to extension '61011972592277524' rejected because extension not found in context 'public'.
[2020-04-12 04:18:08] SECURITY[12128] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-12T04:18:08.121-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="61011972592277524",SessionID="0x7f020c167898",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress=
...
2020-04-12 16:28:20
222.186.30.112 attack
2020-04-12T09:31:37.294091vps773228.ovh.net sshd[31792]: Failed password for root from 222.186.30.112 port 21880 ssh2
2020-04-12T09:31:40.033588vps773228.ovh.net sshd[31792]: Failed password for root from 222.186.30.112 port 21880 ssh2
2020-04-12T09:31:41.871129vps773228.ovh.net sshd[31792]: Failed password for root from 222.186.30.112 port 21880 ssh2
2020-04-12T10:43:49.231503vps773228.ovh.net sshd[26320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.112  user=root
2020-04-12T10:43:51.144652vps773228.ovh.net sshd[26320]: Failed password for root from 222.186.30.112 port 60641 ssh2
...
2020-04-12 16:57:40
185.234.217.64 attackspambots
Brute Force
2020-04-12 16:40:57
129.204.108.149 attack
Apr 12 07:50:25  sshd[14954]: Failed password for invalid user chenf from 129.204.108.149 port 43954 ssh2
2020-04-12 16:18:17
217.92.142.223 attackbots
Apr 12 03:47:53 lamijardin sshd[27787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.92.142.223  user=r.r
Apr 12 03:47:55 lamijardin sshd[27787]: Failed password for r.r from 217.92.142.223 port 54312 ssh2
Apr 12 03:47:55 lamijardin sshd[27787]: Received disconnect from 217.92.142.223 port 54312:11: Bye Bye [preauth]
Apr 12 03:47:55 lamijardin sshd[27787]: Disconnected from 217.92.142.223 port 54312 [preauth]
Apr 12 03:57:37 lamijardin sshd[27927]: Invalid user vcsa from 217.92.142.223
Apr 12 03:57:37 lamijardin sshd[27927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.92.142.223
Apr 12 03:57:39 lamijardin sshd[27927]: Failed password for invalid user vcsa from 217.92.142.223 port 46702 ssh2
Apr 12 03:57:39 lamijardin sshd[27927]: Received disconnect from 217.92.142.223 port 46702:11: Bye Bye [preauth]
Apr 12 03:57:39 lamijardin sshd[27927]: Disconnected from 217.92.142.223 por........
-------------------------------
2020-04-12 16:32:56
193.142.146.21 attackbotsspam
Apr 12 11:41:02 server2 sshd\[7765\]: User root from 193.142.146.21 not allowed because not listed in AllowUsers
Apr 12 11:41:02 server2 sshd\[7767\]: User root from 193.142.146.21 not allowed because not listed in AllowUsers
Apr 12 11:41:02 server2 sshd\[7769\]: Invalid user administrator from 193.142.146.21
Apr 12 11:41:03 server2 sshd\[7771\]: Invalid user amx from 193.142.146.21
Apr 12 11:41:03 server2 sshd\[7773\]: Invalid user admin from 193.142.146.21
Apr 12 11:41:03 server2 sshd\[7775\]: Invalid user cisco from 193.142.146.21
2020-04-12 16:52:23
89.229.128.21 attackbots
Apr 12 07:02:31 sip sshd[32092]: Failed password for root from 89.229.128.21 port 50971 ssh2
Apr 12 10:06:08 sip sshd[3001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.229.128.21
Apr 12 10:06:09 sip sshd[3001]: Failed password for invalid user ghost from 89.229.128.21 port 51820 ssh2
2020-04-12 16:34:57
91.132.0.203 attack
(sshd) Failed SSH login from 91.132.0.203 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 12 09:21:50 amsweb01 sshd[8686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.132.0.203  user=root
Apr 12 09:21:52 amsweb01 sshd[8686]: Failed password for root from 91.132.0.203 port 39274 ssh2
Apr 12 09:29:31 amsweb01 sshd[9462]: Invalid user supervisor from 91.132.0.203 port 31714
Apr 12 09:29:33 amsweb01 sshd[9462]: Failed password for invalid user supervisor from 91.132.0.203 port 31714 ssh2
Apr 12 09:32:33 amsweb01 sshd[9709]: Invalid user marek from 91.132.0.203 port 33158
2020-04-12 16:38:01
156.201.144.164 attack
(smtpauth) Failed SMTP AUTH login from 156.201.144.164 (EG/Egypt/host-156.201.164.144-static.tedata.net): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-04-12 08:22:51 plain authenticator failed for ([127.0.0.1]) [156.201.144.164]: 535 Incorrect authentication data (set_id=fd2302@nazeranyekta.com)
2020-04-12 16:27:05
2.185.187.135 attackbots
1586673237 - 04/12/2020 08:33:57 Host: 2.185.187.135/2.185.187.135 Port: 445 TCP Blocked
2020-04-12 16:53:34
49.255.93.10 attackspambots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-12 16:53:13
88.152.29.204 attackspam
Apr 12 03:52:10 shared-1 sshd\[23160\]: Invalid user pi from 88.152.29.204Apr 12 03:52:10 shared-1 sshd\[23159\]: Invalid user pi from 88.152.29.204
...
2020-04-12 16:55:24

最近上报的IP列表

104.21.82.112 104.21.82.108 104.21.82.117 104.21.82.118
104.21.82.119 104.21.82.115 104.21.82.113 104.21.82.12
104.21.82.120 104.21.82.121 104.21.82.123 104.21.82.128
104.21.82.132 104.21.82.127 104.21.82.130 104.21.82.134
104.21.82.124 104.21.82.137 104.21.82.138 104.21.82.133