必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.83.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41064
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.83.144.			IN	A

;; AUTHORITY SECTION:
.			462	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:04:35 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 144.83.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.83.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
207.154.192.152 attackbots
Aug 26 14:42:17 kapalua sshd\[3538\]: Invalid user web-admin from 207.154.192.152
Aug 26 14:42:17 kapalua sshd\[3538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.192.152
Aug 26 14:42:19 kapalua sshd\[3538\]: Failed password for invalid user web-admin from 207.154.192.152 port 38494 ssh2
Aug 26 14:46:25 kapalua sshd\[3927\]: Invalid user craig2 from 207.154.192.152
Aug 26 14:46:25 kapalua sshd\[3927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.192.152
2019-08-27 09:06:45
167.71.80.101 attackspam
Aug 26 15:34:45 eddieflores sshd\[11689\]: Invalid user angelo from 167.71.80.101
Aug 26 15:34:45 eddieflores sshd\[11689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.80.101
Aug 26 15:34:47 eddieflores sshd\[11689\]: Failed password for invalid user angelo from 167.71.80.101 port 46738 ssh2
Aug 26 15:38:46 eddieflores sshd\[12110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.80.101  user=root
Aug 26 15:38:49 eddieflores sshd\[12110\]: Failed password for root from 167.71.80.101 port 35276 ssh2
2019-08-27 09:39:07
181.143.72.66 attackspambots
Aug 26 14:48:40 tdfoods sshd\[27836\]: Invalid user csserver from 181.143.72.66
Aug 26 14:48:40 tdfoods sshd\[27836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.72.66
Aug 26 14:48:42 tdfoods sshd\[27836\]: Failed password for invalid user csserver from 181.143.72.66 port 35712 ssh2
Aug 26 14:53:16 tdfoods sshd\[28210\]: Invalid user adelin from 181.143.72.66
Aug 26 14:53:16 tdfoods sshd\[28210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.72.66
2019-08-27 09:06:22
111.59.184.141 attackspam
Aug 26 13:41:23 auw2 sshd\[1841\]: Invalid user admin from 111.59.184.141
Aug 26 13:41:23 auw2 sshd\[1841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.59.184.141
Aug 26 13:41:25 auw2 sshd\[1841\]: Failed password for invalid user admin from 111.59.184.141 port 42437 ssh2
Aug 26 13:41:27 auw2 sshd\[1841\]: Failed password for invalid user admin from 111.59.184.141 port 42437 ssh2
Aug 26 13:41:29 auw2 sshd\[1841\]: Failed password for invalid user admin from 111.59.184.141 port 42437 ssh2
2019-08-27 09:18:49
112.85.42.237 attackspambots
Aug 26 20:03:06 aat-srv002 sshd[31287]: Failed password for root from 112.85.42.237 port 41699 ssh2
Aug 26 20:18:29 aat-srv002 sshd[31838]: Failed password for root from 112.85.42.237 port 37486 ssh2
Aug 26 20:19:15 aat-srv002 sshd[31878]: Failed password for root from 112.85.42.237 port 32339 ssh2
Aug 26 20:19:17 aat-srv002 sshd[31878]: Failed password for root from 112.85.42.237 port 32339 ssh2
...
2019-08-27 09:30:43
148.66.142.135 attackbotsspam
Aug 27 03:36:19 pkdns2 sshd\[35051\]: Invalid user nfs123 from 148.66.142.135Aug 27 03:36:22 pkdns2 sshd\[35051\]: Failed password for invalid user nfs123 from 148.66.142.135 port 59910 ssh2Aug 27 03:41:10 pkdns2 sshd\[35262\]: Invalid user long123 from 148.66.142.135Aug 27 03:41:12 pkdns2 sshd\[35262\]: Failed password for invalid user long123 from 148.66.142.135 port 49542 ssh2Aug 27 03:45:54 pkdns2 sshd\[35448\]: Invalid user 123456 from 148.66.142.135Aug 27 03:45:55 pkdns2 sshd\[35448\]: Failed password for invalid user 123456 from 148.66.142.135 port 39178 ssh2
...
2019-08-27 09:18:21
114.207.139.203 attack
Invalid user share from 114.207.139.203 port 36244
2019-08-27 09:44:02
78.194.237.128 attackbots
Unauthorised access (Aug 27) SRC=78.194.237.128 LEN=44 TOS=0x10 PREC=0x40 TTL=51 ID=21522 TCP DPT=8080 WINDOW=33689 SYN 
Unauthorised access (Aug 26) SRC=78.194.237.128 LEN=44 TOS=0x10 PREC=0x40 TTL=51 ID=59872 TCP DPT=8080 WINDOW=33689 SYN 
Unauthorised access (Aug 25) SRC=78.194.237.128 LEN=44 TOS=0x10 PREC=0x40 TTL=51 ID=17769 TCP DPT=8080 WINDOW=33689 SYN
2019-08-27 09:20:39
180.76.110.14 attackbots
Aug 27 03:03:58 lnxmysql61 sshd[11885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.110.14
2019-08-27 09:38:42
41.138.88.3 attack
Aug 27 00:57:41 web8 sshd\[654\]: Invalid user nexus from 41.138.88.3
Aug 27 00:57:41 web8 sshd\[654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.88.3
Aug 27 00:57:43 web8 sshd\[654\]: Failed password for invalid user nexus from 41.138.88.3 port 58426 ssh2
Aug 27 01:02:25 web8 sshd\[3540\]: Invalid user student from 41.138.88.3
Aug 27 01:02:25 web8 sshd\[3540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.138.88.3
2019-08-27 09:12:41
188.226.129.78 attackspam
scan z
2019-08-27 09:25:23
98.143.148.45 attack
Aug 27 03:22:45 plex sshd[7898]: Invalid user admin1 from 98.143.148.45 port 40032
2019-08-27 09:46:22
49.89.168.167 attackspambots
Aug 26 19:28:56 eola postfix/smtpd[4460]: connect from unknown[49.89.168.167]
Aug 26 19:28:56 eola postfix/smtpd[4458]: connect from unknown[49.89.168.167]
Aug 26 19:28:57 eola postfix/smtpd[4458]: lost connection after CONNECT from unknown[49.89.168.167]
Aug 26 19:28:57 eola postfix/smtpd[4458]: disconnect from unknown[49.89.168.167] commands=0/0
Aug 26 19:29:01 eola postfix/smtpd[4460]: lost connection after AUTH from unknown[49.89.168.167]
Aug 26 19:29:01 eola postfix/smtpd[4460]: disconnect from unknown[49.89.168.167] ehlo=1 auth=0/1 commands=1/2
Aug 26 19:29:42 eola postfix/smtpd[4458]: connect from unknown[49.89.168.167]
Aug 26 19:29:42 eola postfix/smtpd[4460]: connect from unknown[49.89.168.167]
Aug 26 19:29:43 eola postfix/smtpd[4460]: lost connection after AUTH from unknown[49.89.168.167]
Aug 26 19:29:43 eola postfix/smtpd[4460]: disconnect from unknown[49.89.168.167] ehlo=1 auth=0/1 commands=1/2
Aug 26 19:29:43 eola postfix/smtpd[4458]: lost connection after ........
-------------------------------
2019-08-27 09:08:03
95.42.150.116 attackspambots
Aug 26 14:53:07 aiointranet sshd\[10333\]: Invalid user apples from 95.42.150.116
Aug 26 14:53:07 aiointranet sshd\[10333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95-42-150-116.ip.btc-net.bg
Aug 26 14:53:09 aiointranet sshd\[10333\]: Failed password for invalid user apples from 95.42.150.116 port 52672 ssh2
Aug 26 14:57:27 aiointranet sshd\[10739\]: Invalid user git from 95.42.150.116
Aug 26 14:57:27 aiointranet sshd\[10739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95-42-150-116.ip.btc-net.bg
2019-08-27 09:27:25
67.205.152.231 attack
Aug 26 15:23:10 sachi sshd\[9712\]: Invalid user Huawei123 from 67.205.152.231
Aug 26 15:23:10 sachi sshd\[9712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.152.231
Aug 26 15:23:12 sachi sshd\[9712\]: Failed password for invalid user Huawei123 from 67.205.152.231 port 38004 ssh2
Aug 26 15:26:55 sachi sshd\[10018\]: Invalid user danb from 67.205.152.231
Aug 26 15:26:55 sachi sshd\[10018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.152.231
2019-08-27 09:39:32

最近上报的IP列表

104.21.83.140 104.21.83.146 104.21.83.148 104.21.83.137
104.21.83.149 104.21.83.145 104.21.83.150 104.21.83.152
104.21.83.151 104.21.83.154 104.21.83.155 104.21.83.158
104.21.83.160 104.21.83.159 104.21.83.16 104.21.83.161
104.21.83.162 104.21.83.163 104.21.83.166 104.21.83.165