必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.85.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.85.143.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:06:53 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 143.85.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.85.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.188.100.169 attack
Nov 19 13:48:27 mxgate1 postfix/postscreen[7608]: CONNECT from [190.188.100.169]:13356 to [176.31.12.44]:25
Nov 19 13:48:27 mxgate1 postfix/dnsblog[7610]: addr 190.188.100.169 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 13:48:27 mxgate1 postfix/dnsblog[7610]: addr 190.188.100.169 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 13:48:27 mxgate1 postfix/dnsblog[7611]: addr 190.188.100.169 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 13:48:27 mxgate1 postfix/dnsblog[7612]: addr 190.188.100.169 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 13:48:33 mxgate1 postfix/postscreen[7608]: DNSBL rank 4 for [190.188.100.169]:13356
Nov x@x
Nov 19 13:48:35 mxgate1 postfix/postscreen[7608]: HANGUP after 1.1 from [190.188.100.169]:13356 in tests after SMTP handshake
Nov 19 13:48:35 mxgate1 postfix/postscreen[7608]: DISCONNECT [190.188.100.169]:13356


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.188.100.169
2019-11-19 23:00:06
209.17.96.186 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-19 22:55:19
203.195.235.135 attackspambots
Nov 19 15:28:42 vps666546 sshd\[27774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.235.135  user=games
Nov 19 15:28:43 vps666546 sshd\[27774\]: Failed password for games from 203.195.235.135 port 46906 ssh2
Nov 19 15:34:18 vps666546 sshd\[27921\]: Invalid user asterisk from 203.195.235.135 port 57976
Nov 19 15:34:18 vps666546 sshd\[27921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.235.135
Nov 19 15:34:20 vps666546 sshd\[27921\]: Failed password for invalid user asterisk from 203.195.235.135 port 57976 ssh2
...
2019-11-19 23:21:27
129.213.105.207 attackbots
Nov 19 15:33:42 legacy sshd[19918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.105.207
Nov 19 15:33:43 legacy sshd[19918]: Failed password for invalid user james from 129.213.105.207 port 43575 ssh2
Nov 19 15:37:52 legacy sshd[20025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.105.207
...
2019-11-19 22:51:25
171.235.58.32 attack
Nov 19 22:20:17 bacztwo sshd[467]: Invalid user support from 171.235.58.32 port 59438
Nov 19 22:20:31 bacztwo sshd[2583]: Invalid user guest from 171.235.58.32 port 48084
Nov 19 22:20:47 bacztwo sshd[5334]: Invalid user cisco from 171.235.58.32 port 7812
Nov 19 22:20:52 bacztwo sshd[6598]: Invalid user admin from 171.235.58.32 port 42260
Nov 19 22:21:03 bacztwo sshd[8053]: Invalid user system from 171.235.58.32 port 36440
Nov 19 22:21:08 bacztwo sshd[8707]: Invalid user admin from 171.235.58.32 port 63418
Nov 19 22:21:15 bacztwo sshd[9367]: Invalid user user from 171.235.58.32 port 9564
Nov 19 22:21:38 bacztwo sshd[13610]: Invalid user ubnt from 171.235.58.32 port 47540
Nov 19 22:21:39 bacztwo sshd[13817]: Invalid user test from 171.235.58.32 port 35634
Nov 19 22:21:48 bacztwo sshd[15145]: Invalid user support from 171.235.58.32 port 61192
Nov 19 22:22:17 bacztwo sshd[18774]: Invalid user admin from 171.235.58.32 port 22526
Nov 19 22:23:18 bacztwo sshd[25731]: Invalid user test from 17
...
2019-11-19 22:47:14
46.153.81.72 attack
Nov 19 13:56:11 mxgate1 postfix/postscreen[7608]: CONNECT from [46.153.81.72]:20017 to [176.31.12.44]:25
Nov 19 13:56:11 mxgate1 postfix/dnsblog[7629]: addr 46.153.81.72 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 19 13:56:11 mxgate1 postfix/dnsblog[7629]: addr 46.153.81.72 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 13:56:11 mxgate1 postfix/dnsblog[7629]: addr 46.153.81.72 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 13:56:11 mxgate1 postfix/dnsblog[7610]: addr 46.153.81.72 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 13:56:17 mxgate1 postfix/postscreen[7608]: DNSBL rank 3 for [46.153.81.72]:20017
Nov x@x
Nov 19 13:56:19 mxgate1 postfix/postscreen[7608]: HANGUP after 1.9 from [46.153.81.72]:20017 in tests after SMTP handshake
Nov 19 13:56:19 mxgate1 postfix/postscreen[7608]: DISCONNECT [46.153.81.72]:20017


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=46.153.81.72
2019-11-19 23:17:16
125.231.8.217 attack
Telnet Server BruteForce Attack
2019-11-19 23:16:07
103.48.111.250 attack
Telnet Server BruteForce Attack
2019-11-19 22:59:32
51.77.211.94 attack
Nov 19 16:42:12 server2 sshd\[23342\]: Invalid user kmysclub from 51.77.211.94
Nov 19 16:42:32 server2 sshd\[23346\]: Invalid user kmysclub from 51.77.211.94
Nov 19 16:43:26 server2 sshd\[23374\]: Invalid user peuser from 51.77.211.94
Nov 19 16:44:03 server2 sshd\[23424\]: Invalid user peuser from 51.77.211.94
Nov 19 16:44:07 server2 sshd\[23426\]: Invalid user peuser from 51.77.211.94
Nov 19 16:46:03 server2 sshd\[23666\]: Invalid user peuser from 51.77.211.94
2019-11-19 23:02:01
104.148.21.248 attack
Nov 19 13:47:22 mxgate1 postfix/postscreen[7608]: CONNECT from [104.148.21.248]:33592 to [176.31.12.44]:25
Nov 19 13:47:22 mxgate1 postfix/dnsblog[7610]: addr 104.148.21.248 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 19 13:47:22 mxgate1 postfix/dnsblog[7609]: addr 104.148.21.248 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 13:47:28 mxgate1 postfix/postscreen[7608]: DNSBL rank 3 for [104.148.21.248]:33592
Nov x@x
Nov 19 13:47:29 mxgate1 postfix/postscreen[7608]: DISCONNECT [104.148.21.248]:33592


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.21.248
2019-11-19 22:51:50
185.92.247.200 attackspambots
185.92.247.200 - - \[19/Nov/2019:13:03:26 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
185.92.247.200 - - \[19/Nov/2019:13:03:27 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-19 23:00:44
102.171.140.33 attackspam
Nov 19 13:47:06 mxgate1 postfix/postscreen[7608]: CONNECT from [102.171.140.33]:21485 to [176.31.12.44]:25
Nov 19 13:47:06 mxgate1 postfix/dnsblog[7612]: addr 102.171.140.33 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 13:47:06 mxgate1 postfix/dnsblog[7610]: addr 102.171.140.33 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 13:47:06 mxgate1 postfix/dnsblog[7610]: addr 102.171.140.33 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 19 13:47:06 mxgate1 postfix/dnsblog[7610]: addr 102.171.140.33 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 13:47:12 mxgate1 postfix/postscreen[7608]: DNSBL rank 3 for [102.171.140.33]:21485
Nov x@x
Nov 19 13:47:13 mxgate1 postfix/postscreen[7608]: HANGUP after 0.57 from [102.171.140.33]:21485 in tests after SMTP handshake
Nov 19 13:47:13 mxgate1 postfix/postscreen[7608]: DISCONNECT [102.171.140.33]:21485


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=102.171.140.33
2019-11-19 22:48:37
94.132.98.59 attack
Lines containing failures of 94.132.98.59
Nov 19 13:51:25 server01 postfix/smtpd[27684]: connect from a94-132-98-59.cpe.netcabo.pt[94.132.98.59]
Nov x@x
Nov x@x
Nov 19 13:51:25 server01 postfix/policy-spf[27781]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=e704c6e16%40orisline.es;ip=94.132.98.59;r=server01.2800km.de
Nov x@x
Nov 19 13:51:25 server01 postfix/smtpd[27684]: lost connection after DATA from a94-132-98-59.cpe.netcabo.pt[94.132.98.59]
Nov 19 13:51:25 server01 postfix/smtpd[27684]: disconnect from a94-132-98-59.cpe.netcabo.pt[94.132.98.59]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=94.132.98.59
2019-11-19 23:05:14
45.249.80.131 attack
2019-11-19T13:02:59.956466abusebot-2.cloudsearch.cf sshd\[26159\]: Invalid user user1 from 45.249.80.131 port 57950
2019-11-19 23:23:29
127.0.0.1 attack
Test Connectivity
2019-11-19 23:08:24

最近上报的IP列表

104.21.85.141 104.21.85.144 104.21.85.147 104.21.85.146
104.21.85.152 104.21.85.153 104.21.85.154 104.21.85.157
104.21.85.158 104.21.85.150 104.21.85.156 104.21.85.155
104.21.85.16 104.21.85.162 104.21.85.160 104.21.85.165
104.21.85.167 104.21.85.166 104.21.85.168 104.21.85.169