必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.100.99.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.100.99.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 14:31:55 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
194.99.100.104.in-addr.arpa domain name pointer a104-100-99-194.deploy.static.akamaitechnologies.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.99.100.104.in-addr.arpa	name = a104-100-99-194.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.53.236.131 attack
(smtpauth) Failed SMTP AUTH login from 191.53.236.131 (BR/Brazil/191-53-236-131.ptu-wr.mastercabo.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-29 08:21:51 plain authenticator failed for ([191.53.236.131]) [191.53.236.131]: 535 Incorrect authentication data (set_id=marketin)
2020-06-29 17:47:23
179.191.237.172 attack
Jun 29 11:24:37 dhoomketu sshd[1124371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.237.172 
Jun 29 11:24:37 dhoomketu sshd[1124371]: Invalid user hugo from 179.191.237.172 port 39409
Jun 29 11:24:39 dhoomketu sshd[1124371]: Failed password for invalid user hugo from 179.191.237.172 port 39409 ssh2
Jun 29 11:28:59 dhoomketu sshd[1124446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.191.237.172  user=root
Jun 29 11:29:01 dhoomketu sshd[1124446]: Failed password for root from 179.191.237.172 port 39784 ssh2
...
2020-06-29 17:13:09
223.206.235.124 attackspam
Port probing on unauthorized port 445
2020-06-29 17:37:06
188.128.43.28 attackspambots
Jun 29 06:52:45 sso sshd[15829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.128.43.28
Jun 29 06:52:47 sso sshd[15829]: Failed password for invalid user qiang from 188.128.43.28 port 59262 ssh2
...
2020-06-29 17:14:24
116.236.251.214 attackbots
2020-06-29T10:08:33+0200 Failed SSH Authentication/Brute Force Attack. (Server 10)
2020-06-29 17:08:52
79.124.62.66 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 3342 proto: TCP cat: Misc Attack
2020-06-29 17:10:42
182.52.137.200 attack
1593402752 - 06/29/2020 05:52:32 Host: 182.52.137.200/182.52.137.200 Port: 445 TCP Blocked
2020-06-29 17:19:08
2.236.188.179 attackspam
Jun 29 09:33:17 *** sshd[22388]: Invalid user sysadmin from 2.236.188.179
2020-06-29 17:35:16
36.78.184.46 attackspambots
Automatic report - Port Scan Attack
2020-06-29 17:43:47
178.119.72.145 attackspam
SSH Bruteforce attack
2020-06-29 17:48:31
191.243.176.130 attackspambots
k+ssh-bruteforce
2020-06-29 17:42:57
180.94.149.1 attackbots
Icarus honeypot on github
2020-06-29 17:37:32
92.124.129.231 attackbots
1593402763 - 06/29/2020 05:52:43 Host: 92.124.129.231/92.124.129.231 Port: 445 TCP Blocked
2020-06-29 17:10:19
103.112.191.100 attackbots
Jun 29 10:36:47 vmd26974 sshd[23985]: Failed password for root from 103.112.191.100 port 24719 ssh2
...
2020-06-29 17:40:29
177.124.15.33 attackspambots
Jun 29 05:09:48 plex-server sshd[133177]: Failed password for invalid user ec2-user from 177.124.15.33 port 12075 ssh2
Jun 29 05:15:03 plex-server sshd[134728]: Invalid user ncu from 177.124.15.33 port 11241
Jun 29 05:15:03 plex-server sshd[134728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.15.33 
Jun 29 05:15:03 plex-server sshd[134728]: Invalid user ncu from 177.124.15.33 port 11241
Jun 29 05:15:05 plex-server sshd[134728]: Failed password for invalid user ncu from 177.124.15.33 port 11241 ssh2
...
2020-06-29 17:30:21

最近上报的IP列表

213.42.102.18 209.62.179.198 101.254.167.2 48.134.186.177
69.30.208.32 41.237.110.198 188.48.243.75 214.216.99.238
17.116.147.221 255.192.148.65 97.82.199.8 205.176.172.159
148.116.22.19 174.31.161.229 24.116.179.109 205.170.46.193
222.138.215.111 164.248.125.31 31.126.41.212 143.144.137.199