必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.94.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48845
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.94.33.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:18:57 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 33.94.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 33.94.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.117.64.48 attackbotsspam
3389BruteforceFW22
2019-12-02 14:18:00
193.70.36.161 attackspam
Dec  2 02:33:11 firewall sshd[29261]: Failed password for invalid user caulo from 193.70.36.161 port 33444 ssh2
Dec  2 02:38:39 firewall sshd[29421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.36.161  user=root
Dec  2 02:38:41 firewall sshd[29421]: Failed password for root from 193.70.36.161 port 39130 ssh2
...
2019-12-02 14:19:46
213.154.16.234 attackbotsspam
SpamReport
2019-12-02 15:03:38
175.143.127.73 attack
Invalid user steve from 175.143.127.73 port 35784
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.143.127.73
Failed password for invalid user steve from 175.143.127.73 port 35784 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.143.127.73  user=root
Failed password for root from 175.143.127.73 port 41254 ssh2
2019-12-02 15:07:30
218.92.0.184 attackspambots
Dec  2 07:08:24 srv206 sshd[15306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Dec  2 07:08:26 srv206 sshd[15306]: Failed password for root from 218.92.0.184 port 11429 ssh2
...
2019-12-02 14:19:17
218.92.0.141 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.141  user=root
Failed password for root from 218.92.0.141 port 50879 ssh2
Failed password for root from 218.92.0.141 port 50879 ssh2
Failed password for root from 218.92.0.141 port 50879 ssh2
Failed password for root from 218.92.0.141 port 50879 ssh2
2019-12-02 15:01:05
218.92.0.179 attackbotsspam
SSH Brute Force, server-1 sshd[6605]: Failed password for root from 218.92.0.179 port 48049 ssh2
2019-12-02 14:59:10
189.172.82.36 attackbotsspam
Dec  2 07:30:19 vpn01 sshd[22906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.172.82.36
Dec  2 07:30:21 vpn01 sshd[22906]: Failed password for invalid user nologin from 189.172.82.36 port 36900 ssh2
...
2019-12-02 15:05:50
179.232.1.252 attackbotsspam
Dec  1 20:18:51 auw2 sshd\[18752\]: Invalid user upadmin from 179.232.1.252
Dec  1 20:18:51 auw2 sshd\[18752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.252
Dec  1 20:18:53 auw2 sshd\[18752\]: Failed password for invalid user upadmin from 179.232.1.252 port 36676 ssh2
Dec  1 20:26:46 auw2 sshd\[19483\]: Invalid user www from 179.232.1.252
Dec  1 20:26:46 auw2 sshd\[19483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.252
2019-12-02 14:29:18
190.144.135.118 attackspambots
Dec  2 01:30:22 plusreed sshd[31137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.135.118  user=root
Dec  2 01:30:24 plusreed sshd[31137]: Failed password for root from 190.144.135.118 port 36619 ssh2
...
2019-12-02 15:05:13
106.12.181.184 attackbotsspam
Dec  2 07:00:24 vps691689 sshd[6106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.184
Dec  2 07:00:26 vps691689 sshd[6106]: Failed password for invalid user 0147 from 106.12.181.184 port 33138 ssh2
Dec  2 07:08:11 vps691689 sshd[6359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.184
...
2019-12-02 14:25:43
162.248.52.82 attackbots
Dec  2 07:30:22 sso sshd[6052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.52.82
Dec  2 07:30:24 sso sshd[6052]: Failed password for invalid user caloyannis from 162.248.52.82 port 34762 ssh2
...
2019-12-02 15:08:27
222.186.175.182 attack
2019-12-02T06:22:23.940670shield sshd\[20725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
2019-12-02T06:22:25.801963shield sshd\[20725\]: Failed password for root from 222.186.175.182 port 60912 ssh2
2019-12-02T06:22:28.813518shield sshd\[20725\]: Failed password for root from 222.186.175.182 port 60912 ssh2
2019-12-02T06:22:32.764876shield sshd\[20725\]: Failed password for root from 222.186.175.182 port 60912 ssh2
2019-12-02T06:22:35.738522shield sshd\[20725\]: Failed password for root from 222.186.175.182 port 60912 ssh2
2019-12-02 14:22:59
202.182.104.58 attackspambots
REQUESTED PAGE: ///wp-login.php
2019-12-02 15:04:50
113.195.129.48 attack
Automatic report - Port Scan
2019-12-02 14:46:42

最近上报的IP列表

104.21.94.34 104.21.94.36 104.21.94.35 104.21.94.4
104.21.94.39 104.21.94.31 104.21.94.44 104.21.94.40
104.21.94.37 104.21.94.54 104.21.94.57 104.21.94.5
104.21.94.60 104.21.94.46 104.21.94.6 104.21.94.58
104.21.94.63 104.21.94.64 104.21.94.67 104.21.94.61