必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.94.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15438
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.94.21.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:18:38 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 21.94.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.94.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
203.71.53.21 attackbotsspam
Aug  9 05:59:37 our-server-hostname postfix/smtpd[19149]: connect from unknown[203.71.53.21]
Aug  9 05:59:38 our-server-hostname postfix/smtpd[19149]: NOQUEUE: reject: RCPT from unknown[203.71.53.21]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Aug  9 05:59:39 our-server-hostname postfix/smtpd[19149]: disconnect from unknown[203.71.53.21]
Aug  9 06:00:20 our-server-hostname postfix/smtpd[19126]: connect from unknown[203.71.53.21]
Aug  9 06:00:22 our-server-hostname postfix/smtpd[19126]: NOQUEUE: reject: RCPT from unknown[203.71.53.21]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Aug  9 06:00:22 our-server-hostname postfix/smtpd[19126]: disconnect from unknown[203.71.53.21]
Aug  9 06:00:29 our-server-hostname postfix/smtpd[18928]: connect from unknown[203.71.53.21]
Aug  9 06:00:30 our-server-hostname postfix/smtpd[18928]: NOQUEUE: reject: RCPT from unknown[203.71.53.21]: 504 5.5........
-------------------------------
2020-08-10 04:05:51
175.118.152.100 attackbots
Brute-force attempt banned
2020-08-10 03:55:09
218.75.210.46 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-09T19:17:14Z and 2020-08-09T19:22:59Z
2020-08-10 03:51:19
46.17.104.176 attack
Aug  9 15:57:02 vps46666688 sshd[17458]: Failed password for root from 46.17.104.176 port 38819 ssh2
...
2020-08-10 04:05:33
167.172.57.1 attackbotsspam
167.172.57.1 - - [09/Aug/2020:20:08:13 +0100] "POST /wp-login.php HTTP/1.1" 200 1960 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.57.1 - - [09/Aug/2020:20:08:16 +0100] "POST /wp-login.php HTTP/1.1" 200 1937 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.172.57.1 - - [09/Aug/2020:20:08:18 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-10 03:51:47
187.162.37.16 attackbotsspam
Automatic report - Port Scan
2020-08-10 04:17:55
192.35.169.34 attackspambots
 TCP (SYN) 192.35.169.34:25561 -> port 9048, len 44
2020-08-10 04:08:59
85.93.20.149 attackbots
200809 14:46:06 [Warning] Access denied for user 'root'@'85.93.20.149' (using password: YES)
200809 14:46:31 [Warning] Access denied for user 'root'@'85.93.20.149' (using password: YES)
200809 15:04:59 [Warning] Access denied for user 'root'@'85.93.20.149' (using password: YES)
...
2020-08-10 04:14:23
103.19.58.23 attack
Aug  9 20:44:23 rocket sshd[25304]: Failed password for root from 103.19.58.23 port 60842 ssh2
Aug  9 20:46:59 rocket sshd[25816]: Failed password for root from 103.19.58.23 port 37452 ssh2
...
2020-08-10 04:06:43
14.51.232.216 attackbots
detected by Fail2Ban
2020-08-10 03:56:00
62.234.137.26 attackspambots
$f2bV_matches
2020-08-10 03:56:16
192.99.4.59 attack
192.99.4.59 - - [09/Aug/2020:20:46:29 +0100] "POST /wp-login.php HTTP/1.1" 200 5874 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.4.59 - - [09/Aug/2020:20:49:16 +0100] "POST /wp-login.php HTTP/1.1" 200 5874 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.4.59 - - [09/Aug/2020:20:51:16 +0100] "POST /wp-login.php HTTP/1.1" 200 5881 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-10 03:54:48
118.126.116.101 attackspam
Aug  9 21:09:05 vm0 sshd[30605]: Failed password for root from 118.126.116.101 port 56200 ssh2
...
2020-08-10 03:50:22
185.220.100.246 attack
CF RAY ID: 5be5ea724d36d46f IP Class: tor URI: /wp-config.php.backup
2020-08-10 04:00:44
190.104.235.8 attack
Aug  9 21:25:24 piServer sshd[32580]: Failed password for root from 190.104.235.8 port 34585 ssh2
Aug  9 21:28:55 piServer sshd[540]: Failed password for root from 190.104.235.8 port 58421 ssh2
...
2020-08-10 03:41:55

最近上报的IP列表

104.21.94.217 104.21.94.211 104.21.94.213 104.21.94.216
104.21.94.214 104.21.94.219 104.21.94.218 104.21.94.22
104.21.94.221 104.21.94.220 104.21.94.222 104.21.94.225
104.21.94.226 104.21.94.223 104.21.94.228 104.21.94.229
104.21.94.227 104.21.94.230 104.21.94.231 104.21.94.23