必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.93.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 429
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.93.164.			IN	A

;; AUTHORITY SECTION:
.			376	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:22:30 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 164.93.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.93.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
157.245.120.102 attack
Apr 27 23:50:28 liveconfig01 sshd[10689]: Invalid user wiktor from 157.245.120.102
Apr 27 23:50:28 liveconfig01 sshd[10689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.120.102
Apr 27 23:50:31 liveconfig01 sshd[10689]: Failed password for invalid user wiktor from 157.245.120.102 port 47422 ssh2
Apr 27 23:50:31 liveconfig01 sshd[10689]: Received disconnect from 157.245.120.102 port 47422:11: Bye Bye [preauth]
Apr 27 23:50:31 liveconfig01 sshd[10689]: Disconnected from 157.245.120.102 port 47422 [preauth]
Apr 27 23:55:18 liveconfig01 sshd[10973]: Invalid user sergio from 157.245.120.102
Apr 27 23:55:18 liveconfig01 sshd[10973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.120.102
Apr 27 23:55:21 liveconfig01 sshd[10973]: Failed password for invalid user sergio from 157.245.120.102 port 50574 ssh2
Apr 27 23:55:21 liveconfig01 sshd[10973]: Received disconnect from 157.245.........
-------------------------------
2020-04-29 05:53:12
51.89.67.61 attackbots
04/28/2020-16:47:17.191072 51.89.67.61 Protocol: 17 ET SCAN Sipvicious Scan
2020-04-29 05:35:36
14.231.148.249 attack
2020-04-2822:44:171jTX5S-0004LU-TY\<=info@whatsup2013.chH=\(localhost\)[14.231.148.249]:48893P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3148id=00ae184b406b4149d5d066ca2dd9f3eff16874@whatsup2013.chT="Youmakemysoulhot"fordavidsharris1960@gmail.comsahil.mishra1421@gmail.com2020-04-2822:43:501jTX51-0004IE-VW\<=info@whatsup2013.chH=\(localhost\)[14.237.117.104]:52660P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3247id=ae06782b200bde2d0ef006555e8ab39fbc5649b355@whatsup2013.chT="Younodoubtknow\,Ilosthappiness"forfranksv24@gmail.commikesmobilediesel91@gmail.com2020-04-2822:46:241jTX7Y-0004bv-47\<=info@whatsup2013.chH=\(localhost\)[186.226.0.24]:42184P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3134id=2c2cd4d9d2f92cdffc02f4a7ac78416d4ea4517cd7@whatsup2013.chT="You'rehandsome"fordclay3699@gmail.comdrakefarmsjd@gmail.com2020-04-2822:44:261jTX5d-0004Mo-PI\<=info@whatsup2013.chH
2020-04-29 06:00:41
182.156.209.222 attackspam
Apr 29 00:21:42 pkdns2 sshd\[47739\]: Address 182.156.209.222 maps to static-222.209.156.182-tataidc.co.in, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Apr 29 00:21:44 pkdns2 sshd\[47739\]: Failed password for root from 182.156.209.222 port 62645 ssh2Apr 29 00:25:41 pkdns2 sshd\[47930\]: Address 182.156.209.222 maps to static-222.209.156.182-tataidc.co.in, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Apr 29 00:25:41 pkdns2 sshd\[47930\]: Invalid user guest4 from 182.156.209.222Apr 29 00:25:43 pkdns2 sshd\[47930\]: Failed password for invalid user guest4 from 182.156.209.222 port 16257 ssh2Apr 29 00:29:30 pkdns2 sshd\[48059\]: Address 182.156.209.222 maps to static-222.209.156.182-tataidc.co.in, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!Apr 29 00:29:30 pkdns2 sshd\[48059\]: Invalid user christel from 182.156.209.222
...
2020-04-29 05:41:55
112.85.42.188 attackspam
04/28/2020-18:00:37.512516 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-04-29 06:01:53
83.48.120.190 attackbots
Honeypot Spam Send
2020-04-29 05:47:06
111.231.139.30 attackspam
Invalid user joerg from 111.231.139.30 port 38050
2020-04-29 06:12:30
104.218.48.196 attack
port
2020-04-29 05:34:04
91.160.151.223 attackspam
Invalid user ftpuser from 91.160.151.223 port 2159
2020-04-29 05:39:43
177.69.67.248 attackbots
Apr 29 00:02:22 eventyay sshd[6455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.67.248
Apr 29 00:02:24 eventyay sshd[6455]: Failed password for invalid user moni from 177.69.67.248 port 39176 ssh2
Apr 29 00:07:50 eventyay sshd[6775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.67.248
...
2020-04-29 06:08:57
178.128.247.181 attack
Apr 29 00:01:53 eventyay sshd[6426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.247.181
Apr 29 00:01:55 eventyay sshd[6426]: Failed password for invalid user lsa from 178.128.247.181 port 46188 ssh2
Apr 29 00:05:09 eventyay sshd[6594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.247.181
...
2020-04-29 06:10:28
27.71.227.197 attackbotsspam
Apr 28 23:53:13 meumeu sshd[29232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.227.197 
Apr 28 23:53:15 meumeu sshd[29232]: Failed password for invalid user cp from 27.71.227.197 port 48168 ssh2
Apr 28 23:57:39 meumeu sshd[29901]: Failed password for backup from 27.71.227.197 port 54914 ssh2
...
2020-04-29 06:01:29
185.50.149.25 attackbotsspam
Blocked 185.50.149.25 For sending bad password count 6 tried : sales@daisychainedi.com & sales & test@daisychainedi.com & test & postmaster@daisychainedi.com & postmaster
2020-04-29 05:41:32
157.245.115.45 attackspambots
Apr 28 14:20:14 mockhub sshd[23780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.115.45
Apr 28 14:20:16 mockhub sshd[23780]: Failed password for invalid user francisc from 157.245.115.45 port 59516 ssh2
...
2020-04-29 05:33:48
92.222.78.178 attack
Apr 28 23:46:55 OPSO sshd\[29121\]: Invalid user sudeep from 92.222.78.178 port 58138
Apr 28 23:46:55 OPSO sshd\[29121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.78.178
Apr 28 23:46:57 OPSO sshd\[29121\]: Failed password for invalid user sudeep from 92.222.78.178 port 58138 ssh2
Apr 28 23:51:04 OPSO sshd\[29826\]: Invalid user eve from 92.222.78.178 port 43738
Apr 28 23:51:04 OPSO sshd\[29826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.78.178
2020-04-29 05:56:33

最近上报的IP列表

104.21.93.182 104.21.93.208 104.21.93.202 104.21.93.222
104.21.93.244 104.21.93.238 104.21.93.35 104.21.93.218
104.21.93.36 104.21.93.38 104.21.93.66 104.21.93.62
104.21.93.61 104.21.93.70 104.21.93.6 13.226.141.99
104.21.93.99 104.21.93.95 104.21.93.97 104.21.93.76