必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.82.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.82.240.			IN	A

;; AUTHORITY SECTION:
.			160	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 20:54:47 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 240.82.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 240.82.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.38.2.14 attackspambots
Unauthorized connection attempt from IP address 114.38.2.14 on Port 445(SMB)
2020-05-02 20:49:31
186.179.103.107 attack
May  2 12:45:13 game-panel sshd[31452]: Failed password for root from 186.179.103.107 port 60692 ssh2
May  2 12:49:32 game-panel sshd[31617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.179.103.107
May  2 12:49:34 game-panel sshd[31617]: Failed password for invalid user bc from 186.179.103.107 port 37825 ssh2
2020-05-02 20:57:45
176.222.56.96 spam
Steam account hacking
2020-05-02 20:28:30
115.74.205.18 attack
1588421716 - 05/02/2020 14:15:16 Host: 115.74.205.18/115.74.205.18 Port: 445 TCP Blocked
2020-05-02 20:56:40
223.152.73.155 attack
Netgear Routers Arbitrary Command Injection Vulnerability
2020-05-02 20:38:07
88.254.66.134 attackbotsspam
Unauthorized connection attempt from IP address 88.254.66.134 on Port 445(SMB)
2020-05-02 20:48:18
170.33.14.152 attackbots
Port scanning
2020-05-02 20:25:47
206.253.224.75 attackspam
Automated report (2020-05-02T12:01:35+00:00). Probe detected.
2020-05-02 20:36:38
27.224.145.98 attackspambots
(ftpd) Failed FTP login from 27.224.145.98 (CN/China/-): 10 in the last 3600 secs
2020-05-02 20:26:23
114.44.184.70 attackbots
Unauthorized connection attempt from IP address 114.44.184.70 on Port 445(SMB)
2020-05-02 20:55:33
162.243.139.239 attackbotsspam
Metasploit VxWorks WDB Agent Scanner Detection
2020-05-02 20:40:59
211.159.165.83 attack
May  2 19:15:20 webhost01 sshd[27372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.165.83
May  2 19:15:22 webhost01 sshd[27372]: Failed password for invalid user ronak from 211.159.165.83 port 46278 ssh2
...
2020-05-02 20:51:15
46.105.255.31 attackspambots
[2020-05-02 08:39:28] NOTICE[1170][C-000098d3] chan_sip.c: Call from '' (46.105.255.31:54244) to extension '5011441528628300' rejected because extension not found in context 'public'.
[2020-05-02 08:39:28] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-02T08:39:28.760-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="5011441528628300",SessionID="0x7f6c08674948",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.105.255.31/54244",ACLName="no_extension_match"
[2020-05-02 08:41:37] NOTICE[1170][C-000098d9] chan_sip.c: Call from '' (46.105.255.31:57330) to extension '1011441528628300' rejected because extension not found in context 'public'.
[2020-05-02 08:41:37] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-02T08:41:37.973-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="1011441528628300",SessionID="0x7f6c08674948",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/
...
2020-05-02 20:48:45
51.254.32.133 attackbots
May  2 14:25:19 ns382633 sshd\[5309\]: Invalid user hugo from 51.254.32.133 port 54370
May  2 14:25:19 ns382633 sshd\[5309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.32.133
May  2 14:25:21 ns382633 sshd\[5309\]: Failed password for invalid user hugo from 51.254.32.133 port 54370 ssh2
May  2 14:30:17 ns382633 sshd\[6221\]: Invalid user tutor from 51.254.32.133 port 39371
May  2 14:30:17 ns382633 sshd\[6221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.32.133
2020-05-02 20:46:50
181.30.68.76 attackbots
Unauthorized connection attempt from IP address 181.30.68.76 on Port 445(SMB)
2020-05-02 20:32:56

最近上报的IP列表

104.21.82.220 104.21.82.253 104.21.82.30 13.76.245.96
13.75.212.251 13.76.80.83 13.75.34.167 13.75.212.52
13.76.249.108 13.77.1.195 13.75.34.171 13.77.105.125
13.77.100.44 13.77.150.221 13.77.171.173 13.77.138.42
13.75.34.162 13.77.122.58 104.21.82.31 13.77.182.13