必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Republic of China (ROC)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.105.214.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3669
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.105.214.71.			IN	A

;; AUTHORITY SECTION:
.			362	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:24:36 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
71.214.105.106.in-addr.arpa domain name pointer 106.105.214.71.adsl.dynamic.seed.net.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
71.214.105.106.in-addr.arpa	name = 106.105.214.71.adsl.dynamic.seed.net.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.89.187.193 attackbotsspam
xmlrpc attack
2020-07-29 00:33:45
103.123.8.75 attack
2020-07-28T15:33:38.731066lavrinenko.info sshd[27399]: Invalid user xiangweilai from 103.123.8.75 port 37978
2020-07-28T15:33:38.737496lavrinenko.info sshd[27399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.123.8.75
2020-07-28T15:33:38.731066lavrinenko.info sshd[27399]: Invalid user xiangweilai from 103.123.8.75 port 37978
2020-07-28T15:33:41.000934lavrinenko.info sshd[27399]: Failed password for invalid user xiangweilai from 103.123.8.75 port 37978 ssh2
2020-07-28T15:36:20.392684lavrinenko.info sshd[27542]: Invalid user lulu from 103.123.8.75 port 47248
...
2020-07-29 01:00:15
121.233.109.206 attackspambots
Jul 28 13:45:47 h2040555 sshd[13465]: Invalid user tmpu01 from 121.233.109.206
Jul 28 13:45:47 h2040555 sshd[13465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.233.109.206 
Jul 28 13:45:49 h2040555 sshd[13465]: Failed password for invalid user tmpu01 from 121.233.109.206 port 45602 ssh2
Jul 28 13:45:51 h2040555 sshd[13465]: Received disconnect from 121.233.109.206: 11: Bye Bye [preauth]
Jul 28 13:47:34 h2040555 sshd[13469]: Invalid user wyp from 121.233.109.206
Jul 28 13:47:34 h2040555 sshd[13469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.233.109.206 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=121.233.109.206
2020-07-29 00:32:07
87.251.74.22 attackbotsspam
Jul 28 18:37:50 debian-2gb-nbg1-2 kernel: \[18212770.130552\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=87.251.74.22 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=26479 PROTO=TCP SPT=49998 DPT=5667 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-29 00:44:37
114.6.57.130 attackspam
Jul 28 15:42:06 ns381471 sshd[28588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.6.57.130
Jul 28 15:42:08 ns381471 sshd[28588]: Failed password for invalid user liaojh from 114.6.57.130 port 53552 ssh2
2020-07-29 00:45:32
218.94.136.90 attack
Failed password for invalid user yuweiguo from 218.94.136.90 port 36382 ssh2
Invalid user wwz from 218.94.136.90 port 41800
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90
Invalid user wwz from 218.94.136.90 port 41800
Failed password for invalid user wwz from 218.94.136.90 port 41800 ssh2
2020-07-29 00:31:42
117.210.184.69 attack
117.210.184.69 - - [28/Jul/2020:12:54:27 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
117.210.184.69 - - [28/Jul/2020:12:54:29 +0100] "POST /wp-login.php HTTP/1.1" 200 6150 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
117.210.184.69 - - [28/Jul/2020:13:04:09 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-07-29 00:57:02
167.172.163.162 attack
Jul 28 14:04:36 mail sshd[10690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.163.162
Jul 28 14:04:39 mail sshd[10690]: Failed password for invalid user nivinform from 167.172.163.162 port 51398 ssh2
...
2020-07-29 00:25:35
83.69.119.98 attackbotsspam
xmlrpc attack
2020-07-29 00:40:02
66.249.79.123 attackbots
Lines containing failures of 66.249.79.123
/var/log/apache/pucorp.org.log:66.249.79.123 - - [28/Jul/2020:13:51:00 +0200] "GET /hostnameemlist/tag/BUNT.html?type=atom&start=20 HTTP/1.1" 200 14835 "-" "Mozilla/5.0 (Linux; user 6.0.1; Nexus 5X Build/MMB29P) AppleWebKhostname/537.36 (KHTML, like Gecko) Chrome/80.0.3987.92 Mobile Safari/537.36 (compatible; Googlebot/2.1; +hxxp://www.google.com/bot.html)"


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=66.249.79.123
2020-07-29 00:57:35
198.46.233.148 attackbots
Jul 28 15:39:47 vmd26974 sshd[16178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.46.233.148
Jul 28 15:39:49 vmd26974 sshd[16178]: Failed password for invalid user wy from 198.46.233.148 port 32892 ssh2
...
2020-07-29 00:31:17
64.227.2.96 attack
Jul 28 18:51:15 abendstille sshd\[23152\]: Invalid user supervisor from 64.227.2.96
Jul 28 18:51:15 abendstille sshd\[23152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96
Jul 28 18:51:16 abendstille sshd\[23152\]: Failed password for invalid user supervisor from 64.227.2.96 port 34346 ssh2
Jul 28 18:56:21 abendstille sshd\[28407\]: Invalid user hdfs from 64.227.2.96
Jul 28 18:56:21 abendstille sshd\[28407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.2.96
...
2020-07-29 01:00:38
222.186.175.182 attack
2020-07-28T18:19:28.544274vps773228.ovh.net sshd[12776]: Failed password for root from 222.186.175.182 port 7010 ssh2
2020-07-28T18:19:32.390064vps773228.ovh.net sshd[12776]: Failed password for root from 222.186.175.182 port 7010 ssh2
2020-07-28T18:19:35.452504vps773228.ovh.net sshd[12776]: Failed password for root from 222.186.175.182 port 7010 ssh2
2020-07-28T18:19:39.949236vps773228.ovh.net sshd[12776]: Failed password for root from 222.186.175.182 port 7010 ssh2
2020-07-28T18:19:43.443179vps773228.ovh.net sshd[12776]: Failed password for root from 222.186.175.182 port 7010 ssh2
...
2020-07-29 00:46:47
37.236.173.227 attackspambots
2020-07-28 13:48:03 plain_virtual_exim authenticator failed for ([37.236.173.227]) [37.236.173.227]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.236.173.227
2020-07-29 00:37:18
129.211.173.127 attackspam
Jul 28 16:50:32 ip106 sshd[12609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.173.127 
Jul 28 16:50:33 ip106 sshd[12609]: Failed password for invalid user ibm from 129.211.173.127 port 54316 ssh2
...
2020-07-29 00:58:44

最近上报的IP列表

106.105.213.13 106.105.213.82 106.105.214.216 106.105.214.102
106.105.214.141 106.105.213.14 106.105.214.195 106.105.214.5
106.105.213.140 106.105.214.74 106.105.213.69 106.105.214.77
106.105.217.114 106.105.214.95 106.105.217.137 106.105.217.134
106.105.217.152 106.105.214.79 106.120.213.80 106.105.217.20