必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.91.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14720
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.91.165.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:14:38 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 165.91.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 165.91.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.176.27.90 attackbots
Multiport scan : 252 ports scanned 14566 14666 14766 14866 14966 15066 15166 15266 15366 15466 15566 15666 15766 15866 15966 16066 16166 16266 16366 16466 16566 16666 16766 16866 16966 17066 17166 17266 17366 17466 17566 17666 17766 17866 17966 18066 18166 18266 18366 18466 18566 18666 18766 18866 18966 19066 19166 19266 19366 19466 19566 19666 19766 19866 19966 20066 20166 20266 20366 20466 20566 20666 20766 20866 20966 21066 21166 .....
2020-02-21 06:46:26
202.162.192.228 attack
Feb 20 23:05:11 haigwepa sshd[2779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.162.192.228 
Feb 20 23:05:13 haigwepa sshd[2779]: Failed password for invalid user admin from 202.162.192.228 port 37386 ssh2
...
2020-02-21 07:11:36
95.226.183.46 attackbots
Feb 20 23:52:00 dedicated sshd[23502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.226.183.46  user=man
Feb 20 23:52:02 dedicated sshd[23502]: Failed password for man from 95.226.183.46 port 54672 ssh2
2020-02-21 06:55:28
223.71.139.98 attackspam
Feb 20 12:46:48 hanapaa sshd\[19799\]: Invalid user couchdb from 223.71.139.98
Feb 20 12:46:48 hanapaa sshd\[19799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.98
Feb 20 12:46:51 hanapaa sshd\[19799\]: Failed password for invalid user couchdb from 223.71.139.98 port 47254 ssh2
Feb 20 12:52:10 hanapaa sshd\[20232\]: Invalid user cpanel from 223.71.139.98
Feb 20 12:52:10 hanapaa sshd\[20232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.71.139.98
2020-02-21 06:53:46
183.48.32.252 attack
Feb 20 21:56:16 zimbra sshd[13566]: Invalid user confluence from 183.48.32.252
Feb 20 21:56:16 zimbra sshd[13566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.48.32.252
Feb 20 21:56:18 zimbra sshd[13566]: Failed password for invalid user confluence from 183.48.32.252 port 34306 ssh2
Feb 20 21:56:18 zimbra sshd[13566]: Received disconnect from 183.48.32.252 port 34306:11: Bye Bye [preauth]
Feb 20 21:56:18 zimbra sshd[13566]: Disconnected from 183.48.32.252 port 34306 [preauth]
Feb 20 22:12:06 zimbra sshd[25741]: Invalid user server from 183.48.32.252
Feb 20 22:12:06 zimbra sshd[25741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.48.32.252
Feb 20 22:12:07 zimbra sshd[25741]: Failed password for invalid user server from 183.48.32.252 port 36601 ssh2
Feb 20 22:12:07 zimbra sshd[25741]: Received disconnect from 183.48.32.252 port 36601:11: Bye Bye [preauth]
Feb 20 22:12:07 zimbra ........
-------------------------------
2020-02-21 07:10:20
185.147.212.8 attack
[2020-02-20 17:50:34] NOTICE[1148] chan_sip.c: Registration from '' failed for '185.147.212.8:57823' - Wrong password
[2020-02-20 17:50:34] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-20T17:50:34.808-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="7915",SessionID="0x7fd82cb725a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.212.8/57823",Challenge="1f7e3f1e",ReceivedChallenge="1f7e3f1e",ReceivedHash="656cd5aee1b1d7dc7cdfd0821f5e510f"
[2020-02-20 17:51:03] NOTICE[1148] chan_sip.c: Registration from '' failed for '185.147.212.8:53658' - Wrong password
[2020-02-20 17:51:03] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-02-20T17:51:03.906-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="503",SessionID="0x7fd82cdc4bd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.212.8/5
...
2020-02-21 07:01:19
180.179.48.101 attackspambots
web-1 [ssh] SSH Attack
2020-02-21 07:17:38
104.194.9.13 attack
Port scan on 5 port(s): 5061 5062 5063 5064 5065
2020-02-21 07:21:32
118.89.61.51 attackbots
Automatic report - SSH Brute-Force Attack
2020-02-21 06:59:41
78.109.28.81 attackspambots
Invalid user devp from 78.109.28.81 port 41208
2020-02-21 07:16:08
61.178.32.88 attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-02-21 06:57:04
207.242.238.194 attackspam
20/2/20@16:47:29: FAIL: Alarm-Network address from=207.242.238.194
20/2/20@16:47:29: FAIL: Alarm-Network address from=207.242.238.194
...
2020-02-21 07:12:50
80.245.114.176 attackbotsspam
Feb 20 23:04:39 web8 sshd\[3580\]: Invalid user chris from 80.245.114.176
Feb 20 23:04:39 web8 sshd\[3580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.245.114.176
Feb 20 23:04:41 web8 sshd\[3580\]: Failed password for invalid user chris from 80.245.114.176 port 59222 ssh2
Feb 20 23:07:14 web8 sshd\[4993\]: Invalid user rabbitmq from 80.245.114.176
Feb 20 23:07:14 web8 sshd\[4993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.245.114.176
2020-02-21 07:25:04
132.232.50.212 attackbotsspam
Feb 20 15:45:49 dallas01 sshd[1454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.50.212
Feb 20 15:45:51 dallas01 sshd[1454]: Failed password for invalid user web from 132.232.50.212 port 35770 ssh2
Feb 20 15:47:47 dallas01 sshd[1782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.50.212
2020-02-21 06:50:48
190.85.186.67 attackspam
Port Scan
2020-02-21 06:56:34

最近上报的IP列表

104.21.91.161 104.21.91.17 104.21.91.169 104.21.91.167
104.21.91.168 104.21.91.163 104.21.91.170 104.21.91.172
104.21.91.171 104.21.91.176 104.21.91.177 104.21.91.179
104.21.91.18 104.21.91.180 104.21.91.184 104.21.91.181
104.21.91.178 104.21.91.183 104.21.91.185 104.21.91.188