必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.89.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.89.231.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:11:54 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 231.89.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 231.89.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.181.151.169 attack
Unauthorized connection attempt from IP address 113.181.151.169 on Port 445(SMB)
2019-07-22 20:30:36
101.86.194.234 attackspambots
Unauthorized connection attempt from IP address 101.86.194.234 on Port 445(SMB)
2019-07-22 20:34:05
179.106.102.63 attackbots
port scan and connect, tcp 80 (http)
2019-07-22 20:44:27
190.85.143.32 attackspambots
Unauthorized connection attempt from IP address 190.85.143.32 on Port 445(SMB)
2019-07-22 20:27:09
37.34.188.252 attackbots
:
2019-07-22 20:34:40
142.93.15.179 attack
Jul 22 13:06:03 debian sshd\[2388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.15.179  user=root
Jul 22 13:06:05 debian sshd\[2388\]: Failed password for root from 142.93.15.179 port 48360 ssh2
...
2019-07-22 20:11:29
77.42.77.222 attackspam
Automatic report - Port Scan Attack
2019-07-22 20:50:16
81.18.156.138 attackbotsspam
Unauthorized connection attempt from IP address 81.18.156.138 on Port 445(SMB)
2019-07-22 20:05:38
45.55.88.94 attackspam
Jul 22 13:21:24 microserver sshd[30958]: Invalid user god from 45.55.88.94 port 48037
Jul 22 13:21:24 microserver sshd[30958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94
Jul 22 13:21:26 microserver sshd[30958]: Failed password for invalid user god from 45.55.88.94 port 48037 ssh2
Jul 22 13:28:31 microserver sshd[31706]: Invalid user unseen from 45.55.88.94 port 46494
Jul 22 13:28:31 microserver sshd[31706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94
Jul 22 13:42:42 microserver sshd[33640]: Invalid user ik from 45.55.88.94 port 43408
Jul 22 13:42:42 microserver sshd[33640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.88.94
Jul 22 13:42:44 microserver sshd[33640]: Failed password for invalid user ik from 45.55.88.94 port 43408 ssh2
Jul 22 13:49:52 microserver sshd[34370]: Invalid user tester from 45.55.88.94 port 41867
Jul 22 13:49:52 microserver ssh
2019-07-22 20:46:32
111.248.91.9 attack
Unauthorized connection attempt from IP address 111.248.91.9 on Port 445(SMB)
2019-07-22 20:21:42
189.254.33.157 attackspam
Invalid user hadoop from 189.254.33.157 port 46947
2019-07-22 20:42:21
189.125.224.4 attackbots
SMB Server BruteForce Attack
2019-07-22 20:47:29
103.5.182.27 attack
Unauthorized connection attempt from IP address 103.5.182.27 on Port 445(SMB)
2019-07-22 20:26:01
46.3.96.69 attackspam
firewall-block, port(s): 23407/tcp, 23408/tcp, 34507/tcp
2019-07-22 20:50:35
109.251.240.16 attackspambots
" "
2019-07-22 20:02:29

最近上报的IP列表

104.21.89.227 104.21.89.228 104.21.89.229 104.21.89.232
104.21.89.239 104.21.89.234 104.21.89.233 104.21.89.235
104.21.89.237 104.21.89.24 104.21.89.241 104.21.89.240
104.21.89.242 104.21.89.245 104.21.89.243 104.21.89.244
104.21.89.250 104.21.89.247 104.21.89.25 104.21.89.251