必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.189.191.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25910
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.189.191.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 06:32:19 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 104.191.189.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.191.189.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.81.203.211 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-08-05 08:32:34
209.17.96.146 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5bd6a745cc6eec19 | WAF_Rule_ID: 4c344d8609cf47c88674e7c5f743a22c | WAF_Kind: firewall | CF_Action: drop | Country: US | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: wevg.org | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: ATL. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-08-05 08:50:27
195.54.161.52 attack
Brute forcing RDP port 3389
2020-08-05 08:30:33
106.52.135.88 attack
Aug  4 17:45:12 host sshd\[7232\]: Failed password for root from 106.52.135.88 port 51564 ssh2
Aug  4 17:50:56 host sshd\[8375\]: Failed password for root from 106.52.135.88 port 57380 ssh2
Aug  4 17:56:38 host sshd\[9495\]: Failed password for root from 106.52.135.88 port 34964 ssh2
...
2020-08-05 08:21:06
184.105.247.210 attackbotsspam
Unwanted checking 80 or 443 port
...
2020-08-05 12:02:41
37.49.230.229 attackbotsspam
22/tcp
[2020-08-04]1pkt
2020-08-05 08:48:45
122.114.206.112 attack
2020-08-05T02:06:43.135653n23.at sshd[2662041]: Failed password for root from 122.114.206.112 port 60941 ssh2
2020-08-05T02:15:33.377611n23.at sshd[2669423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.206.112  user=root
2020-08-05T02:15:34.804136n23.at sshd[2669423]: Failed password for root from 122.114.206.112 port 60062 ssh2
...
2020-08-05 08:37:14
91.121.183.9 attack
91.121.183.9 - - [05/Aug/2020:01:43:04 +0100] "POST /wp-login.php HTTP/1.1" 200 6067 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
91.121.183.9 - - [05/Aug/2020:01:44:10 +0100] "POST /wp-login.php HTTP/1.1" 200 6066 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
91.121.183.9 - - [05/Aug/2020:01:45:30 +0100] "POST /wp-login.php HTTP/1.1" 200 6067 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-05 08:46:04
178.121.23.223 attack
[portscan] Port scan
2020-08-05 08:46:34
77.48.137.3 attackbotsspam
abasicmove.de 77.48.137.3 [04/Aug/2020:19:52:28 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4315 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
abasicmove.de 77.48.137.3 [04/Aug/2020:19:52:29 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4317 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
2020-08-05 08:46:57
51.178.46.95 attack
Fail2Ban
2020-08-05 08:50:12
195.54.161.56 attackbotsspam
Brute forcing RDP port 3389
2020-08-05 08:32:00
78.109.0.231 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-04T19:39:33Z and 2020-08-04T19:46:50Z
2020-08-05 08:23:54
193.27.229.108 attackspam
Brute forcing RDP port 3389
2020-08-05 08:44:35
187.189.10.161 attackbotsspam
1596563584 - 08/04/2020 19:53:04 Host: 187.189.10.161/187.189.10.161 Port: 23 TCP Blocked
...
2020-08-05 08:27:29

最近上报的IP列表

208.87.5.199 225.16.13.96 157.153.43.92 246.193.249.57
140.196.135.78 79.47.119.81 217.31.141.132 63.125.34.116
149.169.45.150 119.182.46.89 234.169.198.217 58.49.83.11
125.152.142.46 19.210.187.153 69.150.240.203 94.201.105.231
212.9.61.123 139.56.115.87 186.229.70.249 228.190.80.201