必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, Province of China

运营商(isp): New Century Infocomm Tech. Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Fixed Line ISP

用户上报:
类型 评论内容 时间
attackbotsspam
Unauthorized connection attempt from IP address 106.104.136.155 on Port 445(SMB)
2020-01-03 19:26:21
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.104.136.155
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40425
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.104.136.155.		IN	A

;; AUTHORITY SECTION:
.			323	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010300 1800 900 604800 86400

;; Query time: 189 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 03 19:26:17 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
155.136.104.106.in-addr.arpa domain name pointer 106-104-136-155.adsl.static.seed.net.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
155.136.104.106.in-addr.arpa	name = 106-104-136-155.adsl.static.seed.net.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.234.5.134 attack
Unauthorized connection attempt detected from IP address 49.234.5.134 to port 2220 [J]
2020-01-15 02:13:58
196.30.15.154 attack
Unauthorized connection attempt from IP address 196.30.15.154 on Port 445(SMB)
2020-01-15 02:09:39
202.134.14.151 attackbotsspam
1579006824 - 01/14/2020 14:00:24 Host: 202.134.14.151/202.134.14.151 Port: 445 TCP Blocked
2020-01-15 01:57:37
131.108.148.22 attack
firewall-block, port(s): 1433/tcp
2020-01-15 01:58:31
198.50.130.238 attackbots
Time:     Tue Jan 14 09:55:34 2020 -0300
IP:       198.50.130.238 (CA/Canada/ip238.ip-198-50-130.net)
Failures: 30 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-01-15 02:14:29
188.25.18.164 attackbots
Unauthorized connection attempt detected from IP address 188.25.18.164 to port 23 [J]
2020-01-15 02:10:09
94.23.63.213 attack
SSH Login Bruteforce
2020-01-15 02:21:51
141.98.102.243 attack
Unauthorized connection attempt from IP address 141.98.102.243 on Port 445(SMB)
2020-01-15 02:18:13
13.233.167.15 attackspam
Invalid user huawei from 13.233.167.15 port 47330
2020-01-15 02:19:46
41.202.220.2 attack
Unauthorized connection attempt from IP address 41.202.220.2 on Port 445(SMB)
2020-01-15 02:12:25
51.91.206.134 attack
Jan 14 18:12:10 nextcloud sshd\[27514\]: Invalid user discordbot from 51.91.206.134
Jan 14 18:12:10 nextcloud sshd\[27514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.206.134
Jan 14 18:12:12 nextcloud sshd\[27514\]: Failed password for invalid user discordbot from 51.91.206.134 port 54516 ssh2
...
2020-01-15 01:47:02
51.91.99.234 attackspambots
k+ssh-bruteforce
2020-01-15 02:19:17
206.72.197.100 attackspam
SMTP nagging
2020-01-15 02:26:08
35.185.136.13 attack
Jan 14 15:19:15 vtv3 sshd[11058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.185.136.13 
Jan 14 15:19:18 vtv3 sshd[11058]: Failed password for invalid user asm from 35.185.136.13 port 40530 ssh2
Jan 14 15:24:15 vtv3 sshd[13353]: Failed password for root from 35.185.136.13 port 38026 ssh2
Jan 14 15:37:55 vtv3 sshd[19644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.185.136.13 
Jan 14 15:37:57 vtv3 sshd[19644]: Failed password for invalid user postgres from 35.185.136.13 port 58738 ssh2
Jan 14 15:42:31 vtv3 sshd[21940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.185.136.13 
Jan 14 15:55:38 vtv3 sshd[28422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.185.136.13 
Jan 14 15:55:40 vtv3 sshd[28422]: Failed password for invalid user css from 35.185.136.13 port 48714 ssh2
Jan 14 16:00:07 vtv3 sshd[30213]: pam_unix(sshd:auth): auth
2020-01-15 02:06:04
125.16.195.251 attack
Unauthorized connection attempt from IP address 125.16.195.251 on Port 445(SMB)
2020-01-15 02:07:48

最近上报的IP列表

185.234.217.201 95.217.153.23 124.255.218.205 74.57.114.137
195.38.32.160 129.211.144.217 206.79.45.90 222.41.19.200
133.13.250.35 80.44.189.157 81.161.127.116 61.7.133.221
206.81.23.209 110.78.180.220 189.170.31.45 171.6.93.77
58.210.2.20 36.81.6.227 103.238.217.51 172.111.144.48