必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Republic of China (ROC)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.104.37.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.104.37.122.			IN	A

;; AUTHORITY SECTION:
.			558	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:54:46 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
122.37.104.106.in-addr.arpa domain name pointer 106-104-37-122.adsl.static.seed.net.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.37.104.106.in-addr.arpa	name = 106-104-37-122.adsl.static.seed.net.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.218.73.208 attackspambots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-06-05 20:52:41
68.183.193.148 attackspam
Jun  5 02:31:00 web1 sshd\[13692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148  user=root
Jun  5 02:31:01 web1 sshd\[13692\]: Failed password for root from 68.183.193.148 port 51180 ssh2
Jun  5 02:34:28 web1 sshd\[13945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148  user=root
Jun  5 02:34:30 web1 sshd\[13945\]: Failed password for root from 68.183.193.148 port 54616 ssh2
Jun  5 02:37:55 web1 sshd\[14205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148  user=root
2020-06-05 20:45:40
192.241.175.250 attack
2020-06-05T08:07:09.720257sorsha.thespaminator.com sshd[4654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.175.250  user=root
2020-06-05T08:07:11.436058sorsha.thespaminator.com sshd[4654]: Failed password for root from 192.241.175.250 port 50080 ssh2
...
2020-06-05 20:35:05
51.83.70.93 attackbots
Jun  5 13:00:53 ajax sshd[23584]: Failed password for root from 51.83.70.93 port 60618 ssh2
2020-06-05 20:11:17
222.186.30.35 attackbotsspam
Jun  5 02:31:43 web9 sshd\[16576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Jun  5 02:31:45 web9 sshd\[16576\]: Failed password for root from 222.186.30.35 port 26672 ssh2
Jun  5 02:31:51 web9 sshd\[16598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
Jun  5 02:31:53 web9 sshd\[16598\]: Failed password for root from 222.186.30.35 port 47853 ssh2
Jun  5 02:31:59 web9 sshd\[16621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35  user=root
2020-06-05 20:39:39
223.242.225.12 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 223.242.225.12 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-05 16:33:23 login authenticator failed for (GFmh9Jd) [223.242.225.12]: 535 Incorrect authentication data (set_id=info)
2020-06-05 20:45:55
195.54.161.40 attackbots
scans 18 times in preceeding hours on the ports (in chronological order) 6968 6950 6978 6973 6975 6971 4992 4998 4997 4990 4983 4986 4996 4993 4991 4995 4989 4982
2020-06-05 20:28:22
117.50.65.85 attackspambots
SSH Brute-Force attacks
2020-06-05 20:28:39
103.233.2.22 attackbots
Automatic report - Port Scan
2020-06-05 20:53:03
113.190.252.87 attack
113.190.252.87 - - [05/Jun/2020:14:03:57 +0200] "GET /wp-login.php HTTP/1.1" 200 6521 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
113.190.252.87 - - [05/Jun/2020:14:04:00 +0200] "POST /wp-login.php HTTP/1.1" 200 6772 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
113.190.252.87 - - [05/Jun/2020:14:04:01 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-05 20:20:48
142.93.151.98 attackspam
Jun  5 13:20:05 km20725 sshd[18132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.151.98  user=r.r
Jun  5 13:20:07 km20725 sshd[18132]: Failed password for r.r from 142.93.151.98 port 55260 ssh2
Jun  5 13:20:08 km20725 sshd[18132]: Received disconnect from 142.93.151.98 port 55260:11: Bye Bye [preauth]
Jun  5 13:20:08 km20725 sshd[18132]: Disconnected from authenticating user r.r 142.93.151.98 port 55260 [preauth]
Jun  5 13:44:36 km20725 sshd[19819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.151.98  user=r.r
Jun  5 13:44:38 km20725 sshd[19819]: Failed password for r.r from 142.93.151.98 port 54836 ssh2
Jun  5 13:44:40 km20725 sshd[19819]: Received disconnect from 142.93.151.98 port 54836:11: Bye Bye [preauth]
Jun  5 13:44:40 km20725 sshd[19819]: Disconnected from authenticating user r.r 142.93.151.98 port 54836 [preauth]
Jun  5 13:47:38 km20725 sshd[20600]: pam_unix(ss........
-------------------------------
2020-06-05 20:44:00
89.248.160.150 attack
Fail2Ban Ban Triggered
2020-06-05 20:32:18
188.161.145.231 attackspambots
[2020-06-05 x@x
[2020-06-05 x@x
[2020-06-05 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.161.145.231
2020-06-05 20:27:14
222.186.173.142 attackspambots
2020-06-05T15:46:50.964925afi-git.jinr.ru sshd[12632]: Failed password for root from 222.186.173.142 port 33396 ssh2
2020-06-05T15:46:54.437957afi-git.jinr.ru sshd[12632]: Failed password for root from 222.186.173.142 port 33396 ssh2
2020-06-05T15:46:57.660239afi-git.jinr.ru sshd[12632]: Failed password for root from 222.186.173.142 port 33396 ssh2
2020-06-05T15:46:57.660398afi-git.jinr.ru sshd[12632]: error: maximum authentication attempts exceeded for root from 222.186.173.142 port 33396 ssh2 [preauth]
2020-06-05T15:46:57.660412afi-git.jinr.ru sshd[12632]: Disconnecting: Too many authentication failures [preauth]
...
2020-06-05 20:47:39
167.71.202.162 attackspambots
Jun  5 14:03:28 MainVPS sshd[14239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.202.162  user=root
Jun  5 14:03:30 MainVPS sshd[14239]: Failed password for root from 167.71.202.162 port 47892 ssh2
Jun  5 14:06:08 MainVPS sshd[16468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.202.162  user=root
Jun  5 14:06:09 MainVPS sshd[16468]: Failed password for root from 167.71.202.162 port 33460 ssh2
Jun  5 14:08:53 MainVPS sshd[18834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.202.162  user=root
Jun  5 14:08:55 MainVPS sshd[18834]: Failed password for root from 167.71.202.162 port 47266 ssh2
...
2020-06-05 20:11:44

最近上报的IP列表

187.188.27.205 84.211.26.166 109.75.47.172 176.104.3.226
186.92.209.206 14.207.54.44 27.124.5.120 8.31.2.22
186.95.238.56 163.125.211.131 138.128.118.130 81.192.97.200
185.181.246.177 107.162.218.165 218.155.37.133 115.242.182.102
173.206.76.77 86.57.48.160 115.56.51.242 189.95.246.234