必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.86.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.86.145.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022101 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 01:44:24 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 145.86.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.86.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
218.78.81.255 attack
Jun 23 20:33:25 ip-172-31-61-156 sshd[9672]: Failed password for invalid user system from 218.78.81.255 port 44857 ssh2
Jun 23 20:36:35 ip-172-31-61-156 sshd[9893]: Invalid user catadmin from 218.78.81.255
Jun 23 20:36:35 ip-172-31-61-156 sshd[9893]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.81.255
Jun 23 20:36:35 ip-172-31-61-156 sshd[9893]: Invalid user catadmin from 218.78.81.255
Jun 23 20:36:36 ip-172-31-61-156 sshd[9893]: Failed password for invalid user catadmin from 218.78.81.255 port 56054 ssh2
...
2020-06-24 05:06:24
79.62.122.144 attackbots
Automatic report - Banned IP Access
2020-06-24 05:10:26
114.227.182.117 attackbotsspam
2020-06-23 22:34:57,703 ncomp.co.za proftpd[26362] mail.ncomp.co.za (114.227.182.117[114.227.182.117]): USER www: no such user found from 114.227.182.117 [114.227.182.117] to ::ffff:172.31.1.100:21
2020-06-23 22:34:58,578 ncomp.co.za proftpd[26363] mail.ncomp.co.za (114.227.182.117[114.227.182.117]): USER www: no such user found from 114.227.182.117 [114.227.182.117] to ::ffff:172.31.1.100:21
2020-06-23 22:34:59,426 ncomp.co.za proftpd[26364] mail.ncomp.co.za (114.227.182.117[114.227.182.117]): USER www: no such user found from 114.227.182.117 [114.227.182.117] to ::ffff:172.31.1.100:21
2020-06-24 05:07:40
85.159.44.66 attackspambots
2020-06-23T21:21:37.030288shield sshd\[28168\]: Invalid user nikolas from 85.159.44.66 port 49270
2020-06-23T21:21:37.034007shield sshd\[28168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.159.44.66
2020-06-23T21:21:39.072200shield sshd\[28168\]: Failed password for invalid user nikolas from 85.159.44.66 port 49270 ssh2
2020-06-23T21:25:57.645365shield sshd\[28947\]: Invalid user admin from 85.159.44.66 port 48283
2020-06-23T21:25:57.648875shield sshd\[28947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.159.44.66
2020-06-24 05:33:16
87.156.120.34 attackbotsspam
Automatic report - Port Scan Attack
2020-06-24 05:49:06
193.122.163.81 attackbots
2020-06-23T22:50:01.064668sd-86998 sshd[10234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.163.81  user=root
2020-06-23T22:50:03.484288sd-86998 sshd[10234]: Failed password for root from 193.122.163.81 port 48370 ssh2
2020-06-23T22:54:20.438581sd-86998 sshd[10872]: Invalid user mailing from 193.122.163.81 port 49452
2020-06-23T22:54:20.444519sd-86998 sshd[10872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.122.163.81
2020-06-23T22:54:20.438581sd-86998 sshd[10872]: Invalid user mailing from 193.122.163.81 port 49452
2020-06-23T22:54:22.753825sd-86998 sshd[10872]: Failed password for invalid user mailing from 193.122.163.81 port 49452 ssh2
...
2020-06-24 05:21:30
45.116.117.2 attack
Jun 23 14:40:14 dignus sshd[19756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.116.117.2
Jun 23 14:40:16 dignus sshd[19756]: Failed password for invalid user vbox from 45.116.117.2 port 43698 ssh2
Jun 23 14:44:43 dignus sshd[20288]: Invalid user terrariaserver from 45.116.117.2 port 43294
Jun 23 14:44:43 dignus sshd[20288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.116.117.2
Jun 23 14:44:45 dignus sshd[20288]: Failed password for invalid user terrariaserver from 45.116.117.2 port 43294 ssh2
...
2020-06-24 05:47:22
131.100.61.20 attackbotsspam
IP 131.100.61.20 attacked honeypot on port: 2323 at 6/23/2020 1:34:40 PM
2020-06-24 05:18:17
139.198.18.184 attackbots
SSH Bruteforce Attempt (failed auth)
2020-06-24 05:43:01
154.204.9.245 attackbots
Jun 23 23:16:49 buvik sshd[16311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.204.9.245
Jun 23 23:16:51 buvik sshd[16311]: Failed password for invalid user oscar from 154.204.9.245 port 58856 ssh2
Jun 23 23:20:40 buvik sshd[16883]: Invalid user nifi from 154.204.9.245
...
2020-06-24 05:39:01
118.89.78.131 attackspam
Invalid user tigrou from 118.89.78.131 port 51262
2020-06-24 05:32:55
131.221.80.145 attack
2020-06-23T20:40:35.416258randservbullet-proofcloud-66.localdomain sshd[22783]: Invalid user khs from 131.221.80.145 port 58849
2020-06-23T20:40:35.420432randservbullet-proofcloud-66.localdomain sshd[22783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.221.80.145
2020-06-23T20:40:35.416258randservbullet-proofcloud-66.localdomain sshd[22783]: Invalid user khs from 131.221.80.145 port 58849
2020-06-23T20:40:36.800654randservbullet-proofcloud-66.localdomain sshd[22783]: Failed password for invalid user khs from 131.221.80.145 port 58849 ssh2
...
2020-06-24 05:24:31
220.158.148.132 attack
Jun 23 22:48:32 piServer sshd[20178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.158.148.132 
Jun 23 22:48:34 piServer sshd[20178]: Failed password for invalid user build from 220.158.148.132 port 44370 ssh2
Jun 23 22:51:55 piServer sshd[20453]: Failed password for root from 220.158.148.132 port 43504 ssh2
...
2020-06-24 05:05:56
119.226.11.100 attack
Jun 23 20:26:56 XXX sshd[39949]: Invalid user lzhang from 119.226.11.100 port 43470
2020-06-24 05:23:43
71.6.232.8 attackbots
TCP port : 8529
2020-06-24 05:44:10

最近上报的IP列表

104.21.84.26 104.21.87.32 104.21.87.46 235.90.93.144
104.21.9.22 104.21.90.186 104.21.90.210 104.21.94.73
104.21.95.130 104.210.12.225 104.211.115.240 104.211.138.84
104.211.141.142 104.214.118.174 244.67.45.77 104.214.139.187
237.94.30.226 104.214.217.236 104.215.73.236 104.219.15.211