必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.89.107
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45738
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.89.107.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:11:17 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 107.89.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 107.89.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
23.251.142.181 attackbots
SSH Brute Force, server-1 sshd[12278]: Failed password for root from 23.251.142.181 port 36027 ssh2
2019-12-13 20:50:03
210.51.161.210 attack
2019-12-13T13:36:45.773868  sshd[23163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.51.161.210  user=root
2019-12-13T13:36:47.310487  sshd[23163]: Failed password for root from 210.51.161.210 port 55350 ssh2
2019-12-13T13:43:01.913600  sshd[23247]: Invalid user yasuki from 210.51.161.210 port 57668
2019-12-13T13:43:01.928502  sshd[23247]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.51.161.210
2019-12-13T13:43:01.913600  sshd[23247]: Invalid user yasuki from 210.51.161.210 port 57668
2019-12-13T13:43:03.750948  sshd[23247]: Failed password for invalid user yasuki from 210.51.161.210 port 57668 ssh2
...
2019-12-13 20:46:12
62.234.109.203 attackbots
Dec 13 10:59:22 minden010 sshd[26140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.109.203
Dec 13 10:59:25 minden010 sshd[26140]: Failed password for invalid user unsworth from 62.234.109.203 port 38323 ssh2
Dec 13 11:06:19 minden010 sshd[30216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.109.203
...
2019-12-13 20:49:29
218.66.111.134 attackbots
Port 1433 Scan
2019-12-13 20:50:28
94.176.10.47 attackspam
(Dec 13)  LEN=40 TTL=241 ID=21697 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 PREC=0x20 TTL=242 ID=6314 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 PREC=0x20 TTL=242 ID=48360 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 PREC=0x20 TTL=242 ID=8309 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 PREC=0x20 TTL=242 ID=35824 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 TOS=0x10 PREC=0x40 TTL=237 ID=32605 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 PREC=0x20 TTL=242 ID=37167 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 PREC=0x20 TTL=242 ID=57247 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 13)  LEN=40 PREC=0x20 TTL=242 ID=18741 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 PREC=0x20 TTL=242 ID=22935 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 PREC=0x20 TTL=242 ID=20743 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 PREC=0x20 TTL=242 ID=53582 DF TCP DPT=23 WINDOW=14600 SYN 
 (Dec 12)  LEN=40 TOS=0x10 PREC=0x40 TTL=237 ID=17934 DF TCP DPT=23 WINDOW=1460...
2019-12-13 20:45:46
222.186.180.223 attack
Dec 13 13:58:58 MK-Soft-VM4 sshd[10244]: Failed password for root from 222.186.180.223 port 43176 ssh2
Dec 13 13:59:03 MK-Soft-VM4 sshd[10244]: Failed password for root from 222.186.180.223 port 43176 ssh2
...
2019-12-13 21:04:47
35.232.92.131 attackbotsspam
2019-12-13T13:09:44.717812shield sshd\[4569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.92.232.35.bc.googleusercontent.com  user=root
2019-12-13T13:09:46.956554shield sshd\[4569\]: Failed password for root from 35.232.92.131 port 36186 ssh2
2019-12-13T13:15:20.388725shield sshd\[5411\]: Invalid user oracle from 35.232.92.131 port 48842
2019-12-13T13:15:20.393202shield sshd\[5411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.92.232.35.bc.googleusercontent.com
2019-12-13T13:15:22.415270shield sshd\[5411\]: Failed password for invalid user oracle from 35.232.92.131 port 48842 ssh2
2019-12-13 21:15:27
95.178.157.221 attackbotsspam
Telnetd brute force attack detected by fail2ban
2019-12-13 21:16:00
27.72.145.243 attackbotsspam
Unauthorized connection attempt detected from IP address 27.72.145.243 to port 445
2019-12-13 21:12:03
86.211.94.186 attackspam
Scanning
2019-12-13 21:15:02
170.80.33.29 attackspambots
Dec 13 10:51:26 thevastnessof sshd[22358]: Failed password for root from 170.80.33.29 port 57874 ssh2
...
2019-12-13 20:58:32
157.230.33.24 attackbots
1576240027 - 12/13/2019 13:27:07 Host: coap-explorer.github.io/157.230.33.24 Port: 5683 UDP Blocked
2019-12-13 20:58:58
107.170.153.57 attackbots
2019-12-13T10:30:31.835549host3.slimhost.com.ua sshd[2457155]: Invalid user Ulpu from 107.170.153.57 port 36581
2019-12-13T10:30:31.842320host3.slimhost.com.ua sshd[2457155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.153.57
2019-12-13T10:30:31.835549host3.slimhost.com.ua sshd[2457155]: Invalid user Ulpu from 107.170.153.57 port 36581
2019-12-13T10:30:33.048315host3.slimhost.com.ua sshd[2457155]: Failed password for invalid user Ulpu from 107.170.153.57 port 36581 ssh2
2019-12-13T11:36:46.453403host3.slimhost.com.ua sshd[2485804]: Invalid user bosiljevac from 107.170.153.57 port 45596
2019-12-13T11:36:46.459208host3.slimhost.com.ua sshd[2485804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.153.57
2019-12-13T11:36:46.453403host3.slimhost.com.ua sshd[2485804]: Invalid user bosiljevac from 107.170.153.57 port 45596
2019-12-13T11:36:48.698360host3.slimhost.com.ua sshd[2485804]: Failed p
...
2019-12-13 21:16:52
45.80.64.127 attackspam
$f2bV_matches
2019-12-13 20:59:59
78.139.216.115 attackspam
Dec 13 13:17:44 MK-Soft-VM8 sshd[5148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.139.216.115 
Dec 13 13:17:46 MK-Soft-VM8 sshd[5148]: Failed password for invalid user mysql from 78.139.216.115 port 53948 ssh2
...
2019-12-13 20:51:31

最近上报的IP列表

104.21.89.106 104.21.89.102 104.21.89.112 104.21.89.11
104.21.89.109 104.21.89.108 104.21.89.113 104.21.89.115
104.21.89.122 104.21.89.117 104.21.89.123 104.21.89.12
104.21.89.125 104.21.89.130 104.21.89.124 104.21.89.126
104.21.89.131 104.21.89.120 104.21.89.129 104.21.89.133