必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.106.241.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56180
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.106.241.121.		IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021700 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 01:29:46 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
121.241.106.104.in-addr.arpa domain name pointer a104-106-241-121.deploy.static.akamaitechnologies.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.241.106.104.in-addr.arpa	name = a104-106-241-121.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
164.132.47.139 attack
odoo8
...
2020-07-08 19:17:18
128.14.134.170 attack
IP 128.14.134.170 attacked honeypot on port: 80 at 7/7/2020 8:40:24 PM
2020-07-08 18:50:36
118.24.202.214 attackbots
Jul  8 11:22:53 abendstille sshd\[22558\]: Invalid user tujikai from 118.24.202.214
Jul  8 11:22:53 abendstille sshd\[22558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.202.214
Jul  8 11:22:54 abendstille sshd\[22558\]: Failed password for invalid user tujikai from 118.24.202.214 port 51062 ssh2
Jul  8 11:28:47 abendstille sshd\[28172\]: Invalid user homes from 118.24.202.214
Jul  8 11:28:47 abendstille sshd\[28172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.202.214
...
2020-07-08 18:48:06
218.77.105.226 attackspambots
Jul  8 05:34:27 meumeu sshd[112051]: Invalid user gyy from 218.77.105.226 port 34458
Jul  8 05:34:27 meumeu sshd[112051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.77.105.226 
Jul  8 05:34:27 meumeu sshd[112051]: Invalid user gyy from 218.77.105.226 port 34458
Jul  8 05:34:29 meumeu sshd[112051]: Failed password for invalid user gyy from 218.77.105.226 port 34458 ssh2
Jul  8 05:38:39 meumeu sshd[112190]: Invalid user florin from 218.77.105.226 port 34412
Jul  8 05:38:39 meumeu sshd[112190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.77.105.226 
Jul  8 05:38:39 meumeu sshd[112190]: Invalid user florin from 218.77.105.226 port 34412
Jul  8 05:38:41 meumeu sshd[112190]: Failed password for invalid user florin from 218.77.105.226 port 34412 ssh2
Jul  8 05:40:19 meumeu sshd[112305]: Invalid user student4 from 218.77.105.226 port 45712
...
2020-07-08 19:10:26
167.99.66.193 attackbotsspam
Jul  8 10:57:23 game-panel sshd[6580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.193
Jul  8 10:57:25 game-panel sshd[6580]: Failed password for invalid user emelie from 167.99.66.193 port 57878 ssh2
Jul  8 11:00:44 game-panel sshd[6767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.66.193
2020-07-08 19:06:56
83.97.20.35 attack
Jul  8 13:02:21 debian-2gb-nbg1-2 kernel: \[16464740.976764\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=83.97.20.35 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=54321 PROTO=TCP SPT=39888 DPT=2082 WINDOW=65535 RES=0x00 SYN URGP=0
2020-07-08 19:19:14
128.1.135.158 attackbotsspam
Lines containing failures of 128.1.135.158
Jul  8 01:43:32 kmh-vmh-002-fsn07 sshd[13141]: Invalid user iocha from 128.1.135.158 port 57468
Jul  8 01:43:32 kmh-vmh-002-fsn07 sshd[13141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.135.158 
Jul  8 01:43:34 kmh-vmh-002-fsn07 sshd[13141]: Failed password for invalid user iocha from 128.1.135.158 port 57468 ssh2
Jul  8 01:43:35 kmh-vmh-002-fsn07 sshd[13141]: Received disconnect from 128.1.135.158 port 57468:11: Bye Bye [preauth]
Jul  8 01:43:35 kmh-vmh-002-fsn07 sshd[13141]: Disconnected from invalid user iocha 128.1.135.158 port 57468 [preauth]
Jul  8 01:50:25 kmh-vmh-002-fsn07 sshd[23801]: Invalid user olaf from 128.1.135.158 port 49318
Jul  8 01:50:25 kmh-vmh-002-fsn07 sshd[23801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.1.135.158 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=128.1.135.158
2020-07-08 19:03:52
201.234.55.85 attackspambots
Jul  8 03:34:02 dignus sshd[19076]: Failed password for invalid user test5 from 201.234.55.85 port 40403 ssh2
Jul  8 03:36:46 dignus sshd[19375]: Invalid user munyaradzi from 201.234.55.85 port 40403
Jul  8 03:36:46 dignus sshd[19375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.234.55.85
Jul  8 03:36:47 dignus sshd[19375]: Failed password for invalid user munyaradzi from 201.234.55.85 port 40403 ssh2
Jul  8 03:39:33 dignus sshd[19639]: Invalid user zhangyansen from 201.234.55.85 port 40403
...
2020-07-08 18:44:08
1.34.110.215 attackbotsspam
" "
2020-07-08 18:51:28
125.124.32.85 attackbots
Fail2Ban - SSH Bruteforce Attempt
2020-07-08 18:58:07
118.98.127.138 attackspambots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-07-08 19:04:36
182.61.65.47 attackspambots
leo_www
2020-07-08 19:06:25
196.52.43.99 attackspam
3389/tcp 11211/tcp 1443/tcp...
[2020-05-07/07-08]67pkt,42pt.(tcp),6pt.(udp)
2020-07-08 18:54:11
193.58.196.146 attack
$lgm
2020-07-08 18:53:34
139.155.127.59 attack
Jul  8 11:53:58 vm1 sshd[23013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.127.59
Jul  8 11:54:00 vm1 sshd[23013]: Failed password for invalid user wanghr from 139.155.127.59 port 54366 ssh2
...
2020-07-08 19:13:19

最近上报的IP列表

104.106.240.168 104.106.237.68 104.106.243.101 104.106.240.149
104.106.240.33 104.106.242.79 104.106.244.124 104.106.245.218
104.106.245.216 104.106.244.51 104.106.245.147 104.106.247.93
104.106.246.89 104.106.245.229 104.106.246.124 104.106.248.171
104.21.62.83 104.106.245.236 104.106.246.10 104.106.249.112