必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.72.13.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65505
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.72.13.99.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 16:34:46 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
99.13.72.104.in-addr.arpa domain name pointer a104-72-13-99.deploy.static.akamaitechnologies.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.13.72.104.in-addr.arpa	name = a104-72-13-99.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
78.37.70.231 attack
[Tue Mar 10 13:15:44 2020] - Syn Flood From IP: 78.37.70.231 Port: 6000
2020-03-23 17:51:32
71.254.8.90 attackbotsspam
Unauthorized connection attempt detected from IP address 71.254.8.90 to port 1433
2020-03-23 18:19:55
117.6.223.136 attack
[Sun Mar 08 21:35:48 2020] - Syn Flood From IP: 117.6.223.136 Port: 57538
2020-03-23 18:21:45
187.167.194.72 attackbotsspam
Automatic report - Port Scan Attack
2020-03-23 18:04:51
194.26.29.104 attackspambots
Port Scan
2020-03-23 17:59:22
103.78.80.110 attackspam
[Tue Mar 10 03:47:28 2020] - Syn Flood From IP: 103.78.80.110 Port: 52601
2020-03-23 18:06:53
185.175.93.105 attackbots
11410/tcp 5810/tcp 9410/tcp...
[2020-02-27/03-22]1359pkt,459pt.(tcp)
2020-03-23 17:49:00
183.61.164.184 attackspambots
[Mon Mar 09 19:16:21 2020] - Syn Flood From IP: 183.61.164.184 Port: 6000
2020-03-23 18:16:45
142.93.232.102 attackbots
SSH Brute Force
2020-03-23 17:46:51
86.122.94.145 attackspam
23/tcp 23/tcp
[2020-03-09/23]2pkt
2020-03-23 18:07:21
103.124.100.30 attackbotsspam
(sshd) Failed SSH login from 103.124.100.30 (KR/South Korea/-): 5 in the last 3600 secs
2020-03-23 18:24:06
178.62.107.141 attack
2020-03-23T05:51:13.579276sorsha.thespaminator.com sshd[11804]: Invalid user hxm from 178.62.107.141 port 43121
2020-03-23T05:51:15.366315sorsha.thespaminator.com sshd[11804]: Failed password for invalid user hxm from 178.62.107.141 port 43121 ssh2
...
2020-03-23 18:23:35
61.91.106.226 attackbotsspam
[Tue Mar 10 21:23:32 2020] - Syn Flood From IP: 61.91.106.226 Port: 55921
2020-03-23 17:45:25
27.64.161.54 attackbots
Automatic report - Port Scan Attack
2020-03-23 17:48:05
216.244.66.240 attack
[Mon Mar 23 06:35:02.191940 2020] [authz_core:error] [pid 29256] [client 216.244.66.240:47268] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/archive/libjack2-1.9.10.215git.e749cd-10.rncbc.suse.i586.rpm
[Mon Mar 23 06:35:22.564822 2020] [authz_core:error] [pid 28633] [client 216.244.66.240:60404] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/archive/libjack2-1.9.10.215git.e749cd-10.rncbc.suse.x86_64.rpm
[Mon Mar 23 06:35:52.926129 2020] [authz_core:error] [pid 28631] [client 216.244.66.240:56034] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/archive/lilv-0.22.1git.6f656d.tar.bz2
...
2020-03-23 18:08:15

最近上报的IP列表

198.159.100.73 84.233.8.244 108.141.212.107 251.48.160.102
67.42.215.203 36.176.164.4 134.114.33.18 189.133.207.249
53.94.38.11 152.93.53.132 165.129.204.211 130.125.123.127
16.185.146.204 112.255.236.164 203.63.23.88 208.193.148.31
60.140.169.39 57.210.251.57 193.166.179.173 211.49.238.166