必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.9.230.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.9.230.199.			IN	A

;; AUTHORITY SECTION:
.			505	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:34:39 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
199.230.9.104.in-addr.arpa domain name pointer 104-9-230-199.lightspeed.tukrga.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.230.9.104.in-addr.arpa	name = 104-9-230-199.lightspeed.tukrga.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
89.248.174.201 attackspam
Dec 21 06:27:53 h2177944 kernel: \[104882.814636\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.174.201 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=710 PROTO=TCP SPT=40831 DPT=9003 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 21 06:27:53 h2177944 kernel: \[104882.814650\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.174.201 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=710 PROTO=TCP SPT=40831 DPT=9003 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 21 07:27:53 h2177944 kernel: \[108482.366398\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.174.201 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=25578 PROTO=TCP SPT=40831 DPT=8610 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 21 07:27:53 h2177944 kernel: \[108482.366409\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.174.201 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=25578 PROTO=TCP SPT=40831 DPT=8610 WINDOW=1024 RES=0x00 SYN URGP=0 
Dec 21 07:27:54 h2177944 kernel: \[108482.990534\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.174.201 DST=85.214.117.9 LEN
2019-12-21 17:16:33
180.124.243.17 attackspam
Unauthorized connection attempt detected from IP address 180.124.243.17 to port 1433
2019-12-21 17:28:59
150.95.27.59 attackbots
Dec 21 06:48:05 ns382633 sshd\[1145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.27.59  user=root
Dec 21 06:48:07 ns382633 sshd\[1145\]: Failed password for root from 150.95.27.59 port 43374 ssh2
Dec 21 07:27:45 ns382633 sshd\[8333\]: Invalid user davon from 150.95.27.59 port 47468
Dec 21 07:27:45 ns382633 sshd\[8333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.27.59
Dec 21 07:27:47 ns382633 sshd\[8333\]: Failed password for invalid user davon from 150.95.27.59 port 47468 ssh2
2019-12-21 17:20:59
157.32.167.217 attackbots
Dec 21 07:27:53 icinga sshd[25400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.32.167.217
Dec 21 07:27:55 icinga sshd[25400]: Failed password for invalid user RPM from 157.32.167.217 port 52897 ssh2
...
2019-12-21 17:15:10
222.186.175.217 attack
Dec 21 10:15:04 vps647732 sshd[19472]: Failed password for root from 222.186.175.217 port 26122 ssh2
Dec 21 10:15:19 vps647732 sshd[19472]: error: maximum authentication attempts exceeded for root from 222.186.175.217 port 26122 ssh2 [preauth]
...
2019-12-21 17:17:44
165.227.39.133 attackbots
Dec 21 09:51:52 vpn01 sshd[28199]: Failed password for root from 165.227.39.133 port 45260 ssh2
...
2019-12-21 17:42:03
178.128.148.98 attackspambots
Dec 21 10:25:46 * sshd[22519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.148.98
Dec 21 10:25:49 * sshd[22519]: Failed password for invalid user celery from 178.128.148.98 port 54870 ssh2
2019-12-21 17:51:24
222.186.173.142 attack
Dec 21 10:24:12 MK-Soft-VM5 sshd[26322]: Failed password for root from 222.186.173.142 port 12322 ssh2
Dec 21 10:24:16 MK-Soft-VM5 sshd[26322]: Failed password for root from 222.186.173.142 port 12322 ssh2
...
2019-12-21 17:27:11
221.226.28.244 attackspam
Dec 21 09:40:23 MK-Soft-Root2 sshd[30868]: Failed password for root from 221.226.28.244 port 26335 ssh2
Dec 21 09:47:35 MK-Soft-Root2 sshd[32137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.28.244 
...
2019-12-21 17:47:30
196.33.101.31 attack
Unauthorized connection attempt from IP address 196.33.101.31 on Port 445(SMB)
2019-12-21 17:14:47
216.218.206.116 attackspambots
unauthorized access on port 443 [https] FO
2019-12-21 17:25:19
13.76.216.239 attackspam
Dec 21 10:22:38 srv01 sshd[28452]: Invalid user cardy from 13.76.216.239 port 55510
Dec 21 10:22:38 srv01 sshd[28452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.216.239
Dec 21 10:22:38 srv01 sshd[28452]: Invalid user cardy from 13.76.216.239 port 55510
Dec 21 10:22:40 srv01 sshd[28452]: Failed password for invalid user cardy from 13.76.216.239 port 55510 ssh2
Dec 21 10:29:01 srv01 sshd[28844]: Invalid user user3 from 13.76.216.239 port 36564
...
2019-12-21 17:43:12
31.162.48.29 attack
[portscan] Port scan
2019-12-21 17:19:44
129.204.202.89 attackspam
2019-12-21T07:07:52.035772shield sshd\[28703\]: Invalid user erenity from 129.204.202.89 port 45313
2019-12-21T07:07:52.040194shield sshd\[28703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.202.89
2019-12-21T07:07:53.634710shield sshd\[28703\]: Failed password for invalid user erenity from 129.204.202.89 port 45313 ssh2
2019-12-21T07:16:03.856275shield sshd\[30923\]: Invalid user lkjhgf from 129.204.202.89 port 48526
2019-12-21T07:16:03.860595shield sshd\[30923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.202.89
2019-12-21 17:24:33
27.200.135.104 attackbots
Automatic report - Port Scan
2019-12-21 17:41:08

最近上报的IP列表

104.89.58.84 104.9.222.126 104.9.232.112 104.9.168.165
104.9.212.93 104.9.20.193 104.9.237.77 104.89.79.182
104.9.18.211 104.9.223.224 104.9.180.253 104.9.236.53
104.9.13.2 104.9.200.213 104.9.110.138 104.9.183.232
104.9.203.222 104.9.17.179 104.9.174.34 104.9.54.107