必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.85.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2136
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.85.209.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:07:16 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 209.85.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 209.85.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
197.51.198.220 attackspambots
Jul 16 14:14:45 srv-4 sshd\[2900\]: Invalid user admin from 197.51.198.220
Jul 16 14:14:45 srv-4 sshd\[2900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.51.198.220
Jul 16 14:14:47 srv-4 sshd\[2900\]: Failed password for invalid user admin from 197.51.198.220 port 46785 ssh2
...
2019-07-16 20:18:02
132.232.32.228 attackbotsspam
Repeated brute force against a port
2019-07-16 20:30:15
41.225.239.103 attackspambots
SMTP invalid logins 3 and blocked 8 Dates: 16-7-2019 till 16-7-2019
2019-07-16 20:27:22
173.249.60.49 attackspambots
Jul 14 20:41:18 josie sshd[12346]: Invalid user ubuntu from 173.249.60.49
Jul 14 20:41:18 josie sshd[12346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.249.60.49 
Jul 14 20:41:20 josie sshd[12346]: Failed password for invalid user ubuntu from 173.249.60.49 port 59282 ssh2
Jul 14 20:41:20 josie sshd[12380]: Received disconnect from 173.249.60.49: 11: Bye Bye
Jul 14 20:41:21 josie sshd[12419]: Invalid user ubuntu from 173.249.60.49
Jul 14 20:41:21 josie sshd[12419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.249.60.49 
Jul 14 20:41:23 josie sshd[12419]: Failed password for invalid user ubuntu from 173.249.60.49 port 60274 ssh2
Jul 14 20:41:23 josie sshd[12421]: Received disconnect from 173.249.60.49: 11: Bye Bye
Jul 14 20:41:27 josie sshd[12469]: Invalid user ubuntu from 173.249.60.49
Jul 14 20:41:27 josie sshd[12469]: pam_unix(sshd:auth): authentication failure; logname= uid........
-------------------------------
2019-07-16 20:28:00
66.7.148.40 attack
SMTP invalid logins 10 and blocked 0 Dates: 15-7-2019 till 16-7-2019
2019-07-16 20:28:50
185.23.64.234 attackbotsspam
[portscan] Port scan
2019-07-16 19:58:56
54.36.84.241 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-16 20:52:05
5.62.41.147 attack
\[2019-07-16 07:59:18\] NOTICE\[20804\] chan_sip.c: Registration from '\' failed for '5.62.41.147:8214' - Wrong password
\[2019-07-16 07:59:18\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-16T07:59:18.033-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="618",SessionID="0x7f06f80c2bc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.147/59903",Challenge="3d785999",ReceivedChallenge="3d785999",ReceivedHash="bc6709082809a19625fcc6ce6a33efb2"
\[2019-07-16 08:00:37\] NOTICE\[20804\] chan_sip.c: Registration from '\' failed for '5.62.41.147:8362' - Wrong password
\[2019-07-16 08:00:37\] SECURITY\[20812\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-07-16T08:00:37.929-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="619",SessionID="0x7f06f806ae98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.147/61762
2019-07-16 20:13:11
216.243.31.2 attackspambots
Jul 16 11:14:46   DDOS Attack: SRC=216.243.31.2 DST=[Masked] LEN=40 TOS=0x08 PREC=0x60 TTL=46  DF PROTO=TCP SPT=35838 DPT=80 WINDOW=0 RES=0x00 RST URGP=0
2019-07-16 20:19:16
45.227.253.213 attack
Jul 16 14:14:55 relay postfix/smtpd\[31411\]: warning: unknown\[45.227.253.213\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:15:03 relay postfix/smtpd\[4945\]: warning: unknown\[45.227.253.213\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:16:08 relay postfix/smtpd\[23250\]: warning: unknown\[45.227.253.213\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:16:18 relay postfix/smtpd\[31408\]: warning: unknown\[45.227.253.213\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:18:10 relay postfix/smtpd\[31411\]: warning: unknown\[45.227.253.213\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-16 20:31:41
197.97.228.205 attack
Invalid user admin from 197.97.228.205 port 60708
2019-07-16 20:37:31
94.23.9.204 attack
Jul 16 14:08:50 core01 sshd\[3537\]: Invalid user mongodb from 94.23.9.204 port 54476
Jul 16 14:08:50 core01 sshd\[3537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.9.204
...
2019-07-16 20:14:16
113.138.134.161 attackspambots
[Aegis] @ 2019-07-16 12:15:07  0100 -> Attempt to use mail server as relay (550: Requested action not taken).
2019-07-16 20:01:22
185.137.111.23 attackbotsspam
Jul 16 14:31:52 relay postfix/smtpd\[31411\]: warning: unknown\[185.137.111.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:32:11 relay postfix/smtpd\[25482\]: warning: unknown\[185.137.111.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:32:55 relay postfix/smtpd\[15226\]: warning: unknown\[185.137.111.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:33:14 relay postfix/smtpd\[25482\]: warning: unknown\[185.137.111.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 16 14:33:57 relay postfix/smtpd\[15226\]: warning: unknown\[185.137.111.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-16 20:39:20
118.67.182.88 attackspam
Jul 16 11:39:39 MK-Soft-VM3 sshd\[7793\]: Invalid user guest from 118.67.182.88 port 49422
Jul 16 11:39:39 MK-Soft-VM3 sshd\[7793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.67.182.88
Jul 16 11:39:40 MK-Soft-VM3 sshd\[7793\]: Failed password for invalid user guest from 118.67.182.88 port 49422 ssh2
...
2019-07-16 20:35:58

最近上报的IP列表

104.21.85.205 104.21.85.206 104.21.85.21 104.21.85.211
104.21.85.210 104.21.85.213 104.21.85.217 104.21.85.218
104.21.85.214 104.21.85.215 104.21.85.216 104.21.85.22
104.21.85.221 104.21.85.222 104.21.85.223 104.21.85.224
104.21.85.219 104.21.85.226 104.21.85.229 104.21.85.228