必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Surabaya

省份(region): East Java

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Universitas Nahdlatul Ulama Surabaya

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.106.72.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49117
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.106.72.21.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040100 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 02 01:10:41 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 21.72.106.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 21.72.106.103.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.232.173.87 attackbots
58.232.173.87 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 17:37:27
128.199.167.233 attackbotsspam
F2B jail: sshd. Time: 2019-11-25 10:18:29, Reported by: VKReport
2019-11-25 17:21:28
115.110.207.116 attackbots
Nov 25 04:28:36 linuxvps sshd\[62757\]: Invalid user gicadczenko from 115.110.207.116
Nov 25 04:28:36 linuxvps sshd\[62757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.110.207.116
Nov 25 04:28:37 linuxvps sshd\[62757\]: Failed password for invalid user gicadczenko from 115.110.207.116 port 36116 ssh2
Nov 25 04:37:15 linuxvps sshd\[2828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.110.207.116  user=root
Nov 25 04:37:17 linuxvps sshd\[2828\]: Failed password for root from 115.110.207.116 port 43994 ssh2
2019-11-25 17:44:54
154.8.233.189 attackbotsspam
Nov 25 00:37:07 newdogma sshd[27085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.189  user=nobody
Nov 25 00:37:09 newdogma sshd[27085]: Failed password for nobody from 154.8.233.189 port 60588 ssh2
Nov 25 00:37:09 newdogma sshd[27085]: Received disconnect from 154.8.233.189 port 60588:11: Bye Bye [preauth]
Nov 25 00:37:09 newdogma sshd[27085]: Disconnected from 154.8.233.189 port 60588 [preauth]
Nov 25 01:02:48 newdogma sshd[27265]: Invalid user partello from 154.8.233.189 port 50134
Nov 25 01:02:48 newdogma sshd[27265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.8.233.189
Nov 25 01:02:50 newdogma sshd[27265]: Failed password for invalid user partello from 154.8.233.189 port 50134 ssh2
Nov 25 01:02:50 newdogma sshd[27265]: Received disconnect from 154.8.233.189 port 50134:11: Bye Bye [preauth]
Nov 25 01:02:50 newdogma sshd[27265]: Disconnected from 154.8.233.189 port ........
-------------------------------
2019-11-25 17:21:09
95.170.118.79 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-11-25 17:54:48
193.112.46.41 attackbots
Port scan on 2 port(s): 2377 4243
2019-11-25 17:43:33
40.86.180.184 attackbots
Nov 25 02:48:04 h2570396 sshd[20026]: Failed password for invalid user ftpuser from 40.86.180.184 port 34240 ssh2
Nov 25 02:48:07 h2570396 sshd[20026]: Received disconnect from 40.86.180.184: 11: Bye Bye [preauth]
Nov 25 02:54:11 h2570396 sshd[20086]: Failed password for invalid user checkers from 40.86.180.184 port 29936 ssh2
Nov 25 02:54:11 h2570396 sshd[20086]: Received disconnect from 40.86.180.184: 11: Bye Bye [preauth]
Nov 25 02:58:13 h2570396 sshd[20108]: Failed password for invalid user nallatamb from 40.86.180.184 port 33664 ssh2
Nov 25 02:58:13 h2570396 sshd[20108]: Received disconnect from 40.86.180.184: 11: Bye Bye [preauth]
Nov 25 03:02:21 h2570396 sshd[23303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.86.180.184  user=r.r
Nov 25 03:02:23 h2570396 sshd[23303]: Failed password for r.r from 40.86.180.184 port 41664 ssh2
Nov 25 03:02:24 h2570396 sshd[23303]: Received disconnect from 40.86.180.184: 11: Bye Bye [p........
-------------------------------
2019-11-25 17:27:33
220.200.164.195 attackbots
1574663199 - 11/25/2019 07:26:39 Host: 220.200.164.195/220.200.164.195 Port: 540 TCP Blocked
2019-11-25 17:49:01
117.198.7.135 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 07:50:25.
2019-11-25 17:46:11
69.94.131.69 attack
Nov 25 07:13:56 h2421860 postfix/postscreen[9602]: CONNECT from [69.94.131.69]:51580 to [85.214.119.52]:25
Nov 25 07:13:56 h2421860 postfix/dnsblog[9605]: addr 69.94.131.69 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 25 07:13:56 h2421860 postfix/dnsblog[9604]: addr 69.94.131.69 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Nov 25 07:13:56 h2421860 postfix/dnsblog[9607]: addr 69.94.131.69 listed by domain bl.mailspike.net as 127.0.0.10
Nov 25 07:13:56 h2421860 postfix/dnsblog[9605]: addr 69.94.131.69 listed by domain Unknown.trblspam.com as 185.53.179.7
Nov 25 07:13:56 h2421860 postfix/dnsblog[9606]: addr 69.94.131.69 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 25 07:14:02 h2421860 postfix/postscreen[9602]: DNSBL rank 10 for [69.94.131.69]:51580
Nov x@x
Nov 25 07:14:02 h2421860 postfix/postscreen[9602]: DISCONNECT [69.94.131.69]:51580


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=69.94.131.69
2019-11-25 17:51:16
124.93.2.233 attackspam
2019-11-25T09:32:07.140615abusebot-3.cloudsearch.cf sshd\[17180\]: Invalid user dufond from 124.93.2.233 port 43480
2019-11-25 17:50:59
122.51.114.28 attack
11/25/2019-02:53:13.712330 122.51.114.28 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-25 17:32:09
132.148.151.162 attackspam
132.148.151.162 - - \[25/Nov/2019:09:33:37 +0000\] "POST /wp-login.php HTTP/1.1" 200 4358 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
132.148.151.162 - - \[25/Nov/2019:09:33:38 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-25 17:44:05
106.75.74.6 attackspam
Nov 25 10:18:16 legacy sshd[9946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.74.6
Nov 25 10:18:18 legacy sshd[9946]: Failed password for invalid user info from 106.75.74.6 port 46516 ssh2
Nov 25 10:26:25 legacy sshd[10195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.74.6
...
2019-11-25 17:28:57
163.172.251.80 attack
Nov 24 23:14:27 hanapaa sshd\[28835\]: Invalid user test from 163.172.251.80
Nov 24 23:14:27 hanapaa sshd\[28835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.251.80
Nov 24 23:14:29 hanapaa sshd\[28835\]: Failed password for invalid user test from 163.172.251.80 port 39114 ssh2
Nov 24 23:20:19 hanapaa sshd\[29305\]: Invalid user ro from 163.172.251.80
Nov 24 23:20:19 hanapaa sshd\[29305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.251.80
2019-11-25 17:36:02

最近上报的IP列表

200.54.242.46 182.52.138.240 134.60.152.130 118.193.234.122
201.179.222.153 162.243.111.85 142.93.219.252 198.108.67.77
178.161.254.82 178.128.98.86 151.252.56.45 133.242.15.107
202.83.168.253 200.69.250.253 118.24.151.195 111.69.185.35
200.123.98.131 183.192.240.110 142.44.137.62 122.228.253.88