必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.84.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.84.75.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:06:32 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 75.84.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.84.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.84.88.56 attackspambots
$f2bV_matches
2019-12-30 08:33:10
192.254.129.171 attackspambots
HTTP Directory Traversal Vulnerability, PTR: viv.vivenproducciones.com.
2019-12-30 08:34:20
49.88.112.75 attack
Dec 30 00:01:53 ovpn sshd\[18933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75  user=root
Dec 30 00:01:54 ovpn sshd\[18933\]: Failed password for root from 49.88.112.75 port 15723 ssh2
Dec 30 00:02:45 ovpn sshd\[19148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.75  user=root
Dec 30 00:02:47 ovpn sshd\[19148\]: Failed password for root from 49.88.112.75 port 57406 ssh2
Dec 30 00:02:49 ovpn sshd\[19148\]: Failed password for root from 49.88.112.75 port 57406 ssh2
2019-12-30 08:29:21
46.105.91.255 attackspambots
5060/udp
[2019-12-29]1pkt
2019-12-30 08:31:14
47.19.54.70 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-12-30 08:51:01
183.80.213.167 attackbots
Unauthorized connection attempt detected from IP address 183.80.213.167 to port 23
2019-12-30 09:03:25
78.43.55.100 attack
2019-12-30T00:33:37.132131shield sshd\[11664\]: Invalid user mysql from 78.43.55.100 port 59704
2019-12-30T00:33:37.136294shield sshd\[11664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hsi-kbw-078-043-055-100.hsi4.kabel-badenwuerttemberg.de
2019-12-30T00:33:39.585328shield sshd\[11664\]: Failed password for invalid user mysql from 78.43.55.100 port 59704 ssh2
2019-12-30T00:38:22.122678shield sshd\[12052\]: Invalid user scortes from 78.43.55.100 port 46399
2019-12-30T00:38:22.126864shield sshd\[12052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hsi-kbw-078-043-055-100.hsi4.kabel-badenwuerttemberg.de
2019-12-30 08:43:40
163.172.49.106 attack
2019-12-30T00:43:19.066558shield sshd\[12982\]: Invalid user ccccc from 163.172.49.106 port 50376
2019-12-30T00:43:19.072996shield sshd\[12982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.49.106
2019-12-30T00:43:21.752607shield sshd\[12982\]: Failed password for invalid user ccccc from 163.172.49.106 port 50376 ssh2
2019-12-30T00:46:23.989947shield sshd\[13869\]: Invalid user half-life from 163.172.49.106 port 53472
2019-12-30T00:46:23.995546shield sshd\[13869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.49.106
2019-12-30 08:47:57
192.34.63.180 attackspambots
C1,WP GET /wp-login.php
2019-12-30 08:44:07
185.156.73.21 attackspambots
Scanning random ports - tries to find possible vulnerable services
2019-12-30 08:46:03
164.52.24.162 attack
Unauthorized connection attempt detected from IP address 164.52.24.162 to port 443
2019-12-30 09:05:34
129.204.210.40 attackspam
Automatic report - Banned IP Access
2019-12-30 08:46:19
188.158.78.60 attackbots
19/12/29@18:02:32: FAIL: Alarm-Network address from=188.158.78.60
...
2019-12-30 08:40:40
124.235.118.14 attackbots
Unauthorized connection attempt detected from IP address 124.235.118.14 to port 8080
2019-12-30 09:06:26
54.37.230.141 attackbotsspam
Dec 30 01:06:34 ArkNodeAT sshd\[29179\]: Invalid user kives from 54.37.230.141
Dec 30 01:06:34 ArkNodeAT sshd\[29179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.230.141
Dec 30 01:06:35 ArkNodeAT sshd\[29179\]: Failed password for invalid user kives from 54.37.230.141 port 57528 ssh2
2019-12-30 08:45:24

最近上报的IP列表

104.21.84.72 104.21.84.73 104.21.84.77 104.21.84.78
104.21.84.79 104.21.84.81 104.21.84.80 104.21.84.84
104.21.84.86 104.21.84.83 104.21.84.87 104.21.84.88
104.21.84.93 104.21.84.9 104.21.84.91 104.21.84.95
104.21.84.97 104.21.84.98 104.21.84.94 104.21.84.99