必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.83.202
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.83.202.			IN	A

;; AUTHORITY SECTION:
.			576	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022201 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 04:05:43 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 202.83.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 202.83.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
153.36.242.143 attackbotsspam
2019-09-23T14:57:52.264778enmeeting.mahidol.ac.th sshd\[8418\]: User root from 153.36.242.143 not allowed because not listed in AllowUsers
2019-09-23T14:57:52.471439enmeeting.mahidol.ac.th sshd\[8418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
2019-09-23T14:57:54.426715enmeeting.mahidol.ac.th sshd\[8418\]: Failed password for invalid user root from 153.36.242.143 port 33161 ssh2
...
2019-09-23 16:00:04
81.22.45.165 attackbotsspam
Sep 23 09:52:11 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.165 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=16825 PROTO=TCP SPT=57112 DPT=7230 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-23 16:06:17
222.186.175.147 attackspambots
web-1 [ssh_2] SSH Attack
2019-09-23 16:16:33
212.87.9.141 attackspambots
Sep 23 03:53:25 debian sshd\[19640\]: Invalid user tijah from 212.87.9.141 port 46960
Sep 23 03:53:25 debian sshd\[19640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.87.9.141
Sep 23 03:53:28 debian sshd\[19640\]: Failed password for invalid user tijah from 212.87.9.141 port 46960 ssh2
...
2019-09-23 15:57:34
218.78.44.63 attackspambots
SSH invalid-user multiple login try
2019-09-23 16:22:13
176.20.231.51 attackspam
Sep 23 06:53:22 www4 sshd\[34470\]: Invalid user admin from 176.20.231.51
Sep 23 06:53:22 www4 sshd\[34470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.20.231.51
Sep 23 06:53:24 www4 sshd\[34470\]: Failed password for invalid user admin from 176.20.231.51 port 49210 ssh2
...
2019-09-23 16:07:50
134.209.176.128 attackbotsspam
Sep 22 20:41:42 aiointranet sshd\[12757\]: Invalid user pi from 134.209.176.128
Sep 22 20:41:42 aiointranet sshd\[12757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.176.128
Sep 22 20:41:44 aiointranet sshd\[12757\]: Failed password for invalid user pi from 134.209.176.128 port 50416 ssh2
Sep 22 20:47:58 aiointranet sshd\[13321\]: Invalid user nr from 134.209.176.128
Sep 22 20:47:58 aiointranet sshd\[13321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.176.128
2019-09-23 16:24:35
217.182.74.125 attack
Sep 23 10:04:30 ArkNodeAT sshd\[29108\]: Invalid user lh from 217.182.74.125
Sep 23 10:04:30 ArkNodeAT sshd\[29108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.74.125
Sep 23 10:04:33 ArkNodeAT sshd\[29108\]: Failed password for invalid user lh from 217.182.74.125 port 33920 ssh2
2019-09-23 16:31:32
43.227.68.27 attack
$f2bV_matches
2019-09-23 16:22:01
118.25.92.221 attackspam
Sep 22 21:46:07 web1 sshd\[21591\]: Invalid user wangzc from 118.25.92.221
Sep 22 21:46:07 web1 sshd\[21591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.92.221
Sep 22 21:46:09 web1 sshd\[21591\]: Failed password for invalid user wangzc from 118.25.92.221 port 49934 ssh2
Sep 22 21:51:36 web1 sshd\[22087\]: Invalid user kave from 118.25.92.221
Sep 22 21:51:36 web1 sshd\[22087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.92.221
2019-09-23 16:00:29
113.141.66.255 attackbotsspam
$f2bV_matches
2019-09-23 15:50:18
114.141.104.45 attackbotsspam
Sep 22 22:16:23 php1 sshd\[21304\]: Invalid user ramon from 114.141.104.45
Sep 22 22:16:23 php1 sshd\[21304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.141.104.45
Sep 22 22:16:25 php1 sshd\[21304\]: Failed password for invalid user ramon from 114.141.104.45 port 59085 ssh2
Sep 22 22:22:58 php1 sshd\[21879\]: Invalid user member from 114.141.104.45
Sep 22 22:22:58 php1 sshd\[21879\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.141.104.45
2019-09-23 16:34:09
165.22.63.29 attack
Sep 23 09:16:21 microserver sshd[60437]: Invalid user devil from 165.22.63.29 port 35808
Sep 23 09:16:21 microserver sshd[60437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.29
Sep 23 09:16:23 microserver sshd[60437]: Failed password for invalid user devil from 165.22.63.29 port 35808 ssh2
Sep 23 09:20:58 microserver sshd[61107]: Invalid user fv from 165.22.63.29 port 47186
Sep 23 09:20:58 microserver sshd[61107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.29
Sep 23 09:38:37 microserver sshd[63281]: Invalid user asterisk from 165.22.63.29 port 36242
Sep 23 09:38:37 microserver sshd[63281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.63.29
Sep 23 09:38:39 microserver sshd[63281]: Failed password for invalid user asterisk from 165.22.63.29 port 36242 ssh2
Sep 23 09:43:09 microserver sshd[63943]: Invalid user HDP from 165.22.63.29 port 47620
Sep 23 09:43:
2019-09-23 16:17:43
207.46.13.137 attackbots
Automatic report - Banned IP Access
2019-09-23 16:33:56
192.139.15.36 attackbotsspam
Sep 23 02:22:06 plusreed sshd[25182]: Invalid user jessica from 192.139.15.36
...
2019-09-23 15:58:03

最近上报的IP列表

104.21.82.93 104.21.83.3 104.21.83.5 104.21.83.70
104.21.84.126 104.21.84.176 104.21.84.191 104.21.84.82
104.21.84.92 104.21.85.149 104.21.85.15 104.21.91.197
237.32.164.4 104.21.91.35 104.21.91.89 104.21.92.196
104.21.93.10 104.21.94.115 104.21.94.202 104.21.94.234