必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       10.0.0.0 - 10.255.255.255
CIDR:           10.0.0.0/8
NetName:        PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED
NetHandle:      NET-10-0-0-0-1
Parent:          ()
NetType:        IANA Special Use
OriginAS:       
Organization:   Internet Assigned Numbers Authority (IANA)
RegDate:        
Updated:        2024-05-24
Comment:        These addresses are in use by many millions of independently operated networks, which might be as small as a single computer connected to a home gateway, and are automatically configured in hundreds of millions of devices.  They are only intended for use within a private context  and traffic that needs to cross the Internet will need to use a different, unique address.
Comment:        
Comment:        These addresses can be used by anyone without any need to coordinate with IANA or an Internet registry.  The traffic from these addresses does not come from ICANN or IANA.  We are not the source of activity you may see on logs or in e-mail records.  Please refer to http://www.iana.org/abuse/answers
Comment:        
Comment:        These addresses were assigned by the IETF, the organization that develops Internet protocols, in the Best Current Practice document, RFC 1918 which can be found at:
Comment:        http://datatracker.ietf.org/doc/rfc1918
Ref:            https://rdap.arin.net/registry/ip/10.0.0.0



OrgName:        Internet Assigned Numbers Authority
OrgId:          IANA
Address:        12025 Waterfront Drive
Address:        Suite 300
City:           Los Angeles
StateProv:      CA
PostalCode:     90292
Country:        US
RegDate:        
Updated:        2024-05-24
Ref:            https://rdap.arin.net/registry/entity/IANA


OrgTechHandle: IANA-IP-ARIN
OrgTechName:   ICANN
OrgTechPhone:  +1-310-301-5820 
OrgTechEmail:  abuse@iana.org
OrgTechRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN

OrgAbuseHandle: IANA-IP-ARIN
OrgAbuseName:   ICANN
OrgAbusePhone:  +1-310-301-5820 
OrgAbuseEmail:  abuse@iana.org
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IANA-IP-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.20.9.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33946
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;10.20.9.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 16:53:11 CST 2026
;; MSG SIZE  rcvd: 104
HOST信息:
Host 104.9.20.10.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.9.20.10.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
68.183.12.127 attackbotsspam
Invalid user ceara from 68.183.12.127 port 56556
2020-03-26 15:03:18
142.44.139.12 attackbotsspam
Mar 26 06:48:52 vpn01 sshd[13129]: Failed password for root from 142.44.139.12 port 38432 ssh2
Mar 26 06:49:03 vpn01 sshd[13129]: error: maximum authentication attempts exceeded for root from 142.44.139.12 port 38432 ssh2 [preauth]
...
2020-03-26 14:40:01
51.77.194.232 attackbots
Mar 26 07:11:19 h1745522 sshd[10267]: Invalid user aq from 51.77.194.232 port 38814
Mar 26 07:11:19 h1745522 sshd[10267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.194.232
Mar 26 07:11:19 h1745522 sshd[10267]: Invalid user aq from 51.77.194.232 port 38814
Mar 26 07:11:21 h1745522 sshd[10267]: Failed password for invalid user aq from 51.77.194.232 port 38814 ssh2
Mar 26 07:15:47 h1745522 sshd[10441]: Invalid user fo from 51.77.194.232 port 53028
Mar 26 07:15:47 h1745522 sshd[10441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.194.232
Mar 26 07:15:47 h1745522 sshd[10441]: Invalid user fo from 51.77.194.232 port 53028
Mar 26 07:15:49 h1745522 sshd[10441]: Failed password for invalid user fo from 51.77.194.232 port 53028 ssh2
Mar 26 07:19:48 h1745522 sshd[10586]: Invalid user gus from 51.77.194.232 port 39002
...
2020-03-26 15:08:08
221.152.245.103 attack
DATE:2020-03-26 04:48:09, IP:221.152.245.103, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-03-26 15:12:44
182.61.149.31 attackbots
Mar 26 07:02:51 meumeu sshd[18486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.149.31 
Mar 26 07:02:52 meumeu sshd[18486]: Failed password for invalid user yves from 182.61.149.31 port 48200 ssh2
Mar 26 07:05:21 meumeu sshd[18849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.149.31 
...
2020-03-26 15:19:57
222.186.30.76 attackspambots
Mar 26 07:44:01 silence02 sshd[14540]: Failed password for root from 222.186.30.76 port 47007 ssh2
Mar 26 07:44:04 silence02 sshd[14540]: Failed password for root from 222.186.30.76 port 47007 ssh2
Mar 26 07:44:06 silence02 sshd[14540]: Failed password for root from 222.186.30.76 port 47007 ssh2
2020-03-26 14:49:07
212.115.53.7 attackspam
DATE:2020-03-26 07:53:29, IP:212.115.53.7, PORT:ssh SSH brute force auth (docker-dc)
2020-03-26 15:16:26
107.180.92.3 attack
$f2bV_matches
2020-03-26 14:50:54
151.69.170.146 attackbots
Mar 26 07:57:20 server sshd[37393]: Failed password for invalid user test1 from 151.69.170.146 port 33968 ssh2
Mar 26 08:01:09 server sshd[38542]: Failed password for invalid user PlcmSpIp from 151.69.170.146 port 41256 ssh2
Mar 26 08:05:01 server sshd[39516]: Failed password for invalid user derek from 151.69.170.146 port 48539 ssh2
2020-03-26 15:17:37
189.7.217.23 attackspam
$f2bV_matches
2020-03-26 15:11:01
1.53.144.209 attackbots
1585194714 - 03/26/2020 04:51:54 Host: 1.53.144.209/1.53.144.209 Port: 445 TCP Blocked
2020-03-26 15:17:19
194.146.50.59 attackspambots
SpamScore above: 10.0
2020-03-26 15:10:28
147.135.233.199 attack
Invalid user frolov from 147.135.233.199 port 41656
2020-03-26 14:34:36
106.13.88.44 attack
SSH login attempts.
2020-03-26 14:52:26
106.75.13.213 attack
Mar 26 04:52:14 vmd17057 sshd[16596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.13.213 
Mar 26 04:52:16 vmd17057 sshd[16596]: Failed password for invalid user xq from 106.75.13.213 port 60147 ssh2
...
2020-03-26 15:04:06

最近上报的IP列表

205.70.134.42 97.65.67.161 34.26.247.78 218.57.69.114
10.232.10.72 202.2.87.223 61.64.146.18 13.179.139.26
169.254.110.75 190.157.85.3 2606:4700:10::ac43:1778 2606:4700:10::6814:6639
2606:4700:10::ac43:2364 2606:4700:10::ac43:824 2606:4700:10::6816:709 2606:4700:10::ac43:1016
2606:4700:10::6814:9726 2606:4700:10::6814:5865 2606:4700:10::6814:9337 2606:4700:10::6816:2859