必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.252.89.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.252.89.93.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 23:49:57 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 93.89.252.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 93.89.252.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
145.239.0.81 attackbotsspam
\[2019-10-29 04:16:59\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-29T04:16:59.656-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="99047187410018647127882",SessionID="0x7fdf2cc7a718",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/145.239.0.81/49584",ACLName="no_extension_match"
\[2019-10-29 04:17:05\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-29T04:17:05.790-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="99047185410018647127882",SessionID="0x7fdf2cccf908",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/145.239.0.81/54083",ACLName="no_extension_match"
\[2019-10-29 04:17:11\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-29T04:17:11.997-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="99047184410018647127882",SessionID="0x7fdf2cc27d48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/145.239.0.81/6
2019-10-29 16:19:38
200.182.172.131 attack
Invalid user qh from 200.182.172.131 port 51342
2019-10-29 16:53:28
185.143.221.55 attackbotsspam
10/29/2019-03:40:16.585970 185.143.221.55 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-29 16:47:08
27.154.225.186 attackbotsspam
Oct 29 09:02:57 fr01 sshd[11325]: Invalid user qo from 27.154.225.186
Oct 29 09:02:57 fr01 sshd[11325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.154.225.186
Oct 29 09:02:57 fr01 sshd[11325]: Invalid user qo from 27.154.225.186
Oct 29 09:03:00 fr01 sshd[11325]: Failed password for invalid user qo from 27.154.225.186 port 58514 ssh2
Oct 29 09:16:21 fr01 sshd[13664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.154.225.186  user=root
Oct 29 09:16:23 fr01 sshd[13664]: Failed password for root from 27.154.225.186 port 44190 ssh2
...
2019-10-29 16:19:15
46.38.144.179 attackbots
2019-10-29T09:23:50.014514mail01 postfix/smtpd[17414]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-29T09:24:42.097399mail01 postfix/smtpd[17414]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-29T09:24:48.148837mail01 postfix/smtpd[3268]: warning: unknown[46.38.144.179]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-29 16:38:15
139.198.15.74 attackbots
Automatic report - Banned IP Access
2019-10-29 16:39:02
37.49.231.121 attackspambots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-10-29 16:24:53
123.207.40.70 attackbots
Oct 29 00:47:19 home sshd[21693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.40.70  user=root
Oct 29 00:47:21 home sshd[21693]: Failed password for root from 123.207.40.70 port 40326 ssh2
Oct 29 01:02:25 home sshd[21833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.40.70  user=root
Oct 29 01:02:27 home sshd[21833]: Failed password for root from 123.207.40.70 port 39360 ssh2
Oct 29 01:08:26 home sshd[21873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.40.70  user=root
Oct 29 01:08:28 home sshd[21873]: Failed password for root from 123.207.40.70 port 49142 ssh2
Oct 29 01:14:32 home sshd[21902]: Invalid user rtkit from 123.207.40.70 port 58940
Oct 29 01:14:32 home sshd[21902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.40.70
Oct 29 01:14:32 home sshd[21902]: Invalid user rtkit from 123.207.40.70 port 58940
2019-10-29 16:22:52
114.67.80.161 attack
Oct 28 20:26:27 wbs sshd\[10515\]: Invalid user 1!aNo9B45\?,_ from 114.67.80.161
Oct 28 20:26:27 wbs sshd\[10515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.161
Oct 28 20:26:29 wbs sshd\[10515\]: Failed password for invalid user 1!aNo9B45\?,_ from 114.67.80.161 port 45380 ssh2
Oct 28 20:30:58 wbs sshd\[10863\]: Invalid user tianli from 114.67.80.161
Oct 28 20:30:58 wbs sshd\[10863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.161
2019-10-29 16:17:37
51.75.18.215 attack
Oct 29 08:23:16 localhost sshd\[16640\]: Invalid user simon@123 from 51.75.18.215
Oct 29 08:23:16 localhost sshd\[16640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.215
Oct 29 08:23:18 localhost sshd\[16640\]: Failed password for invalid user simon@123 from 51.75.18.215 port 52018 ssh2
Oct 29 08:27:06 localhost sshd\[16941\]: Invalid user P@$$w0rd2000 from 51.75.18.215
Oct 29 08:27:06 localhost sshd\[16941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.215
...
2019-10-29 16:30:55
134.209.219.234 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-29 16:38:34
95.173.186.148 attackbots
Oct 29 04:46:23 legacy sshd[6547]: Failed password for root from 95.173.186.148 port 46464 ssh2
Oct 29 04:50:29 legacy sshd[6670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.173.186.148
Oct 29 04:50:32 legacy sshd[6670]: Failed password for invalid user ubuntu8 from 95.173.186.148 port 57140 ssh2
...
2019-10-29 16:39:18
178.62.9.122 attackbots
Automatic report - Banned IP Access
2019-10-29 16:32:52
14.227.168.154 attack
Automatic report - Port Scan Attack
2019-10-29 16:16:45
182.138.228.127 attackbots
firewall-block, port(s): 60001/tcp
2019-10-29 16:48:36

最近上报的IP列表

241.165.245.248 255.54.47.67 179.66.2.97 142.83.2.70
44.2.12.86 160.139.12.129 55.222.47.165 116.16.11.249
109.29.186.253 241.3.61.142 224.83.91.95 90.126.12.212
186.56.172.195 125.1.141.80 159.90.150.247 229.150.227.27
24.17.32.4 159.158.16.249 129.189.251.99 151.40.142.170