必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.9.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62041
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.9.9.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021701 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 03:13:09 CST 2022
;; MSG SIZE  rcvd: 103
HOST信息:
Host 9.9.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 9.9.21.104.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
108.177.122.188 attack
Multiple persistent hacking from ip this is a vpn I believe actual hacker is in culpepper county Virginia. They harassed me for over a year. I will be seeking legal action. Uses hundreds of domains
2020-05-05 00:57:33
114.217.58.233 attackspam
May  3 23:41:14 h1946882 sshd[9896]: pam_unix(sshd:auth): authenticatio=
n failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D114.2=
17.58.233  user=3Dpostgres
May  3 23:41:16 h1946882 sshd[9896]: Failed password for postgres from =
114.217.58.233 port 37202 ssh2
May  3 23:41:17 h1946882 sshd[9896]: Received disconnect from 114.217.5=
8.233: 11: Bye Bye [preauth]
May  3 23:49:43 h1946882 sshd[9952]: Connection closed by 114.217.58.23=
3 [preauth]
May  3 23:57:42 h1946882 sshd[10119]: Connection closed by 114.217.58.2=
33 [preauth]
May  4 00:05:28 h1946882 sshd[10164]: Connection closed by 114.217.58.2=
33 [preauth]
May  4 00:13:27 h1946882 sshd[10253]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D114.=
217.58.233=20
May  4 00:13:29 h1946882 sshd[10253]: Failed password for invalid user =
receber from 114.217.58.233 port 38814 ssh2
May  4 00:13:30 h1946882 sshd[10253]: Received disconnect from 114.217.........
-------------------------------
2020-05-05 00:52:33
178.128.248.121 attackspambots
2020-05-04T16:21:12.615576rocketchat.forhosting.nl sshd[31646]: Failed password for invalid user postgres from 178.128.248.121 port 49120 ssh2
2020-05-04T16:30:52.676661rocketchat.forhosting.nl sshd[31846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.248.121  user=root
2020-05-04T16:30:53.962264rocketchat.forhosting.nl sshd[31846]: Failed password for root from 178.128.248.121 port 50238 ssh2
...
2020-05-05 01:12:38
86.207.169.37 attack
May  4 15:13:27 santamaria sshd\[7360\]: Invalid user developer from 86.207.169.37
May  4 15:13:27 santamaria sshd\[7360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.207.169.37
May  4 15:13:29 santamaria sshd\[7360\]: Failed password for invalid user developer from 86.207.169.37 port 58170 ssh2
...
2020-05-05 01:11:26
61.131.104.154 attack
[portscan] Port scan
2020-05-05 00:56:24
68.183.108.55 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-05 01:01:52
183.250.159.23 attack
(sshd) Failed SSH login from 183.250.159.23 (CN/China/-): 5 in the last 3600 secs
2020-05-05 00:58:21
162.243.144.29 attackbotsspam
1588610265 - 05/04/2020 18:37:45 Host: 162.243.144.29/162.243.144.29 Port: 113 TCP Blocked
2020-05-05 01:10:02
167.99.88.132 attackbots
Path traversal
"miner.exe" malware
2020-05-05 00:47:35
186.235.79.54 attackbotsspam
TCP src-port=41173   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (211)
2020-05-05 00:32:14
109.74.194.144 attack
[Mon May 04 13:17:24 2020] - DDoS Attack From IP: 109.74.194.144 Port: 38639
2020-05-05 01:00:42
120.53.3.4 attack
May  4 19:16:52 gw1 sshd[15819]: Failed password for root from 120.53.3.4 port 52712 ssh2
...
2020-05-05 01:01:32
178.128.22.249 attackspam
May  4 18:37:03 vmd26974 sshd[20031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.22.249
May  4 18:37:05 vmd26974 sshd[20031]: Failed password for invalid user username from 178.128.22.249 port 49872 ssh2
...
2020-05-05 00:59:52
213.37.130.21 attackspam
May  4 17:33:26 inter-technics sshd[28896]: Invalid user abb from 213.37.130.21 port 52970
May  4 17:33:26 inter-technics sshd[28896]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.37.130.21
May  4 17:33:26 inter-technics sshd[28896]: Invalid user abb from 213.37.130.21 port 52970
May  4 17:33:28 inter-technics sshd[28896]: Failed password for invalid user abb from 213.37.130.21 port 52970 ssh2
May  4 17:38:01 inter-technics sshd[30194]: Invalid user ganesh from 213.37.130.21 port 33110
...
2020-05-05 01:12:17
108.177.122.188 attack
Multiple persistent hacking from ip this is a vpn I believe actual hacker is in culpepper county Virginia. They harassed me for over a year. I will be seeking legal action. Uses hundreds of domains
2020-05-05 00:57:34

最近上报的IP列表

104.21.9.86 104.21.9.91 104.21.9.88 104.21.9.90
104.21.9.92 104.21.9.95 104.21.90.103 104.21.90.104
104.21.9.96 104.21.90.105 104.21.90.108 104.21.90.106
104.21.90.107 104.21.90.11 104.21.90.109 104.21.90.112
104.21.90.110 104.21.90.111 104.21.90.116 104.21.90.121