必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Beijing

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Beijing Baidu Netcom Science and Technology Co., Ltd.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
106.12.128.114 attackbotsspam
SSH Brute Force
2020-04-29 13:22:21
106.12.128.24 attack
2019-12-02T14:17:09.360595shield sshd\[16882\]: Invalid user cobbe from 106.12.128.24 port 38700
2019-12-02T14:17:09.365231shield sshd\[16882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
2019-12-02T14:17:11.192723shield sshd\[16882\]: Failed password for invalid user cobbe from 106.12.128.24 port 38700 ssh2
2019-12-02T14:25:43.105327shield sshd\[18225\]: Invalid user mohsin from 106.12.128.24 port 47514
2019-12-02T14:25:43.109962shield sshd\[18225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
2019-12-02 23:16:31
106.12.128.24 attack
Nov 16 01:01:42 jane sshd[32025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24 
Nov 16 01:01:43 jane sshd[32025]: Failed password for invalid user mysql from 106.12.128.24 port 33350 ssh2
...
2019-11-16 08:32:39
106.12.128.24 attackbotsspam
Oct 10 16:11:34 vps691689 sshd[28929]: Failed password for root from 106.12.128.24 port 41282 ssh2
Oct 10 16:17:03 vps691689 sshd[29036]: Failed password for root from 106.12.128.24 port 47428 ssh2
...
2019-10-10 22:22:02
106.12.128.24 attackbotsspam
Oct  5 19:52:11 tdfoods sshd\[11936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24  user=root
Oct  5 19:52:13 tdfoods sshd\[11936\]: Failed password for root from 106.12.128.24 port 49164 ssh2
Oct  5 19:57:03 tdfoods sshd\[12334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24  user=root
Oct  5 19:57:05 tdfoods sshd\[12334\]: Failed password for root from 106.12.128.24 port 55464 ssh2
Oct  5 20:02:04 tdfoods sshd\[12797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24  user=root
2019-10-06 14:16:13
106.12.128.24 attackspam
SSH Brute-Force reported by Fail2Ban
2019-10-06 02:08:02
106.12.128.24 attackbots
Oct  5 12:46:45 SilenceServices sshd[22363]: Failed password for root from 106.12.128.24 port 49910 ssh2
Oct  5 12:50:50 SilenceServices sshd[23450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
Oct  5 12:50:52 SilenceServices sshd[23450]: Failed password for invalid user 123 from 106.12.128.24 port 53992 ssh2
2019-10-05 18:52:40
106.12.128.24 attack
2019-09-29T08:00:42.8755381495-001 sshd\[4489\]: Failed password for invalid user uq from 106.12.128.24 port 44442 ssh2
2019-09-29T08:11:29.3512191495-001 sshd\[5318\]: Invalid user owncloud from 106.12.128.24 port 38178
2019-09-29T08:11:29.3590951495-001 sshd\[5318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
2019-09-29T08:11:31.3036381495-001 sshd\[5318\]: Failed password for invalid user owncloud from 106.12.128.24 port 38178 ssh2
2019-09-29T08:16:44.8902711495-001 sshd\[5620\]: Invalid user ernest from 106.12.128.24 port 49166
2019-09-29T08:16:44.8933911495-001 sshd\[5620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
...
2019-09-29 20:33:10
106.12.128.114 attackbotsspam
Sep  1 02:57:16 MK-Soft-VM6 sshd\[11674\]: Invalid user it2 from 106.12.128.114 port 57490
Sep  1 02:57:16 MK-Soft-VM6 sshd\[11674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.114
Sep  1 02:57:18 MK-Soft-VM6 sshd\[11674\]: Failed password for invalid user it2 from 106.12.128.114 port 57490 ssh2
...
2019-09-01 13:43:09
106.12.128.114 attack
Aug 28 06:24:55 localhost sshd\[55797\]: Invalid user 123456 from 106.12.128.114 port 33396
Aug 28 06:24:55 localhost sshd\[55797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.114
Aug 28 06:24:57 localhost sshd\[55797\]: Failed password for invalid user 123456 from 106.12.128.114 port 33396 ssh2
Aug 28 06:29:56 localhost sshd\[56107\]: Invalid user control123 from 106.12.128.114 port 51898
Aug 28 06:29:56 localhost sshd\[56107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.114
...
2019-08-28 15:34:24
106.12.128.24 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-08-07 16:49:22
106.12.128.114 attackspam
SSH Brute Force, server-1 sshd[15882]: Failed password for ftp from 106.12.128.114 port 43554 ssh2
2019-07-20 19:33:33
106.12.128.24 attack
Invalid user www from 106.12.128.24 port 39768
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
Failed password for invalid user www from 106.12.128.24 port 39768 ssh2
Invalid user test from 106.12.128.24 port 34682
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
2019-07-12 16:24:53
106.12.128.114 attackbots
Automatic report
2019-07-11 12:21:30
106.12.128.114 attackspam
Jul  7 03:40:51 unicornsoft sshd\[9597\]: Invalid user nagios from 106.12.128.114
Jul  7 03:40:51 unicornsoft sshd\[9597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.114
Jul  7 03:40:53 unicornsoft sshd\[9597\]: Failed password for invalid user nagios from 106.12.128.114 port 35124 ssh2
2019-07-07 20:21:33
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.12.128.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22726
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.12.128.54.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041601 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 17 07:35:44 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 54.128.12.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 54.128.12.106.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
87.204.167.99 attackspam
Aug 27 04:19:21 mail.srvfarm.net postfix/smtpd[1328473]: warning: host-1-99.erydan.net[87.204.167.99]: SASL PLAIN authentication failed: 
Aug 27 04:19:21 mail.srvfarm.net postfix/smtpd[1328473]: lost connection after AUTH from host-1-99.erydan.net[87.204.167.99]
Aug 27 04:19:48 mail.srvfarm.net postfix/smtpd[1314737]: warning: host-1-99.erydan.net[87.204.167.99]: SASL PLAIN authentication failed: 
Aug 27 04:19:48 mail.srvfarm.net postfix/smtpd[1314737]: lost connection after AUTH from host-1-99.erydan.net[87.204.167.99]
Aug 27 04:22:47 mail.srvfarm.net postfix/smtps/smtpd[1331985]: warning: host-1-99.erydan.net[87.204.167.99]: SASL PLAIN authentication failed:
2020-08-28 09:43:56
81.219.94.125 attack
Aug 27 04:22:08 mail.srvfarm.net postfix/smtpd[1314737]: warning: 81-219-94-125.ostmedia.pl[81.219.94.125]: SASL PLAIN authentication failed: 
Aug 27 04:22:08 mail.srvfarm.net postfix/smtpd[1314737]: lost connection after AUTH from 81-219-94-125.ostmedia.pl[81.219.94.125]
Aug 27 04:26:23 mail.srvfarm.net postfix/smtpd[1328470]: warning: 81-219-94-125.ostmedia.pl[81.219.94.125]: SASL PLAIN authentication failed: 
Aug 27 04:26:23 mail.srvfarm.net postfix/smtpd[1328470]: lost connection after AUTH from 81-219-94-125.ostmedia.pl[81.219.94.125]
Aug 27 04:29:24 mail.srvfarm.net postfix/smtpd[1328471]: warning: 81-219-94-125.ostmedia.pl[81.219.94.125]: SASL PLAIN authentication failed:
2020-08-28 09:35:11
177.130.163.38 attack
Aug 27 13:26:41 mail.srvfarm.net postfix/smtpd[1562257]: warning: unknown[177.130.163.38]: SASL PLAIN authentication failed: 
Aug 27 13:26:42 mail.srvfarm.net postfix/smtpd[1562257]: lost connection after AUTH from unknown[177.130.163.38]
Aug 27 13:33:09 mail.srvfarm.net postfix/smtps/smtpd[1566725]: warning: unknown[177.130.163.38]: SASL PLAIN authentication failed: 
Aug 27 13:33:09 mail.srvfarm.net postfix/smtps/smtpd[1566725]: lost connection after AUTH from unknown[177.130.163.38]
Aug 27 13:33:15 mail.srvfarm.net postfix/smtpd[1562204]: warning: unknown[177.130.163.38]: SASL PLAIN authentication failed:
2020-08-28 09:14:58
103.237.58.147 attackspambots
Aug 27 04:29:49 mail.srvfarm.net postfix/smtpd[1313879]: warning: unknown[103.237.58.147]: SASL PLAIN authentication failed: 
Aug 27 04:29:49 mail.srvfarm.net postfix/smtpd[1313879]: lost connection after AUTH from unknown[103.237.58.147]
Aug 27 04:31:42 mail.srvfarm.net postfix/smtpd[1334723]: warning: unknown[103.237.58.147]: SASL PLAIN authentication failed: 
Aug 27 04:31:42 mail.srvfarm.net postfix/smtpd[1334723]: lost connection after AUTH from unknown[103.237.58.147]
Aug 27 04:39:15 mail.srvfarm.net postfix/smtps/smtpd[1331749]: warning: unknown[103.237.58.147]: SASL PLAIN authentication failed:
2020-08-28 09:33:45
62.193.147.75 attackbots
Aug 27 04:47:50 mail.srvfarm.net postfix/smtps/smtpd[1337554]: warning: unknown[62.193.147.75]: SASL PLAIN authentication failed: 
Aug 27 04:47:50 mail.srvfarm.net postfix/smtps/smtpd[1337554]: lost connection after AUTH from unknown[62.193.147.75]
Aug 27 04:48:53 mail.srvfarm.net postfix/smtpd[1333803]: warning: unknown[62.193.147.75]: SASL PLAIN authentication failed: 
Aug 27 04:48:53 mail.srvfarm.net postfix/smtpd[1333803]: lost connection after AUTH from unknown[62.193.147.75]
Aug 27 04:55:18 mail.srvfarm.net postfix/smtpd[1334742]: warning: unknown[62.193.147.75]: SASL PLAIN authentication failed:
2020-08-28 09:20:44
46.151.72.104 attackbotsspam
Brute force attempt
2020-08-28 09:21:48
218.92.0.133 attack
2020-08-28T01:24:43.036409dmca.cloudsearch.cf sshd[12588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2020-08-28T01:24:44.800944dmca.cloudsearch.cf sshd[12588]: Failed password for root from 218.92.0.133 port 34206 ssh2
2020-08-28T01:24:47.536005dmca.cloudsearch.cf sshd[12588]: Failed password for root from 218.92.0.133 port 34206 ssh2
2020-08-28T01:24:43.036409dmca.cloudsearch.cf sshd[12588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2020-08-28T01:24:44.800944dmca.cloudsearch.cf sshd[12588]: Failed password for root from 218.92.0.133 port 34206 ssh2
2020-08-28T01:24:47.536005dmca.cloudsearch.cf sshd[12588]: Failed password for root from 218.92.0.133 port 34206 ssh2
2020-08-28T01:24:43.036409dmca.cloudsearch.cf sshd[12588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2020-08-28T01:2
...
2020-08-28 09:39:50
187.63.34.60 attackbotsspam
Aug 27 04:33:40 mail.srvfarm.net postfix/smtpd[1334718]: warning: unknown[187.63.34.60]: SASL PLAIN authentication failed: 
Aug 27 04:33:41 mail.srvfarm.net postfix/smtpd[1334718]: lost connection after AUTH from unknown[187.63.34.60]
Aug 27 04:37:41 mail.srvfarm.net postfix/smtpd[1336013]: warning: unknown[187.63.34.60]: SASL PLAIN authentication failed: 
Aug 27 04:37:42 mail.srvfarm.net postfix/smtpd[1336013]: lost connection after AUTH from unknown[187.63.34.60]
Aug 27 04:43:15 mail.srvfarm.net postfix/smtps/smtpd[1331136]: warning: unknown[187.63.34.60]: SASL PLAIN authentication failed:
2020-08-28 09:11:54
177.154.237.74 attackbotsspam
Aug 27 18:26:32 mail.srvfarm.net postfix/smtps/smtpd[1678180]: warning: unknown[177.154.237.74]: SASL PLAIN authentication failed: 
Aug 27 18:26:32 mail.srvfarm.net postfix/smtps/smtpd[1678180]: lost connection after AUTH from unknown[177.154.237.74]
Aug 27 18:33:31 mail.srvfarm.net postfix/smtps/smtpd[1680354]: warning: unknown[177.154.237.74]: SASL PLAIN authentication failed: 
Aug 27 18:33:32 mail.srvfarm.net postfix/smtps/smtpd[1680354]: lost connection after AUTH from unknown[177.154.237.74]
Aug 27 18:34:34 mail.srvfarm.net postfix/smtpd[1679372]: warning: unknown[177.154.237.74]: SASL PLAIN authentication failed:
2020-08-28 09:30:36
103.213.194.30 attackspambots
Aug 27 04:38:43 mail.srvfarm.net postfix/smtpd[1332207]: warning: unknown[103.213.194.30]: SASL PLAIN authentication failed: 
Aug 27 04:38:43 mail.srvfarm.net postfix/smtpd[1332207]: lost connection after AUTH from unknown[103.213.194.30]
Aug 27 04:42:58 mail.srvfarm.net postfix/smtpd[1332133]: warning: unknown[103.213.194.30]: SASL PLAIN authentication failed: 
Aug 27 04:42:58 mail.srvfarm.net postfix/smtpd[1332133]: lost connection after AUTH from unknown[103.213.194.30]
Aug 27 04:45:38 mail.srvfarm.net postfix/smtpd[1334717]: warning: unknown[103.213.194.30]: SASL PLAIN authentication failed:
2020-08-28 09:18:07
45.169.17.89 attack
Aug 27 04:50:16 mail.srvfarm.net postfix/smtpd[1334718]: warning: unknown[45.169.17.89]: SASL PLAIN authentication failed: 
Aug 27 04:50:17 mail.srvfarm.net postfix/smtpd[1334718]: lost connection after AUTH from unknown[45.169.17.89]
Aug 27 04:53:24 mail.srvfarm.net postfix/smtpd[1334720]: warning: unknown[45.169.17.89]: SASL PLAIN authentication failed: 
Aug 27 04:53:25 mail.srvfarm.net postfix/smtpd[1334720]: lost connection after AUTH from unknown[45.169.17.89]
Aug 27 04:55:10 mail.srvfarm.net postfix/smtps/smtpd[1339209]: warning: unknown[45.169.17.89]: SASL PLAIN authentication failed:
2020-08-28 09:22:49
81.161.67.134 attackbotsspam
Aug 27 04:26:04 mail.srvfarm.net postfix/smtpd[1314738]: warning: unknown[81.161.67.134]: SASL PLAIN authentication failed: 
Aug 27 04:26:04 mail.srvfarm.net postfix/smtpd[1314738]: lost connection after AUTH from unknown[81.161.67.134]
Aug 27 04:34:11 mail.srvfarm.net postfix/smtps/smtpd[1314660]: warning: unknown[81.161.67.134]: SASL PLAIN authentication failed: 
Aug 27 04:34:11 mail.srvfarm.net postfix/smtps/smtpd[1314660]: lost connection after AUTH from unknown[81.161.67.134]
Aug 27 04:35:33 mail.srvfarm.net postfix/smtps/smtpd[1333102]: warning: unknown[81.161.67.134]: SASL PLAIN authentication failed:
2020-08-28 09:35:39
213.92.204.15 attack
Aug 28 01:40:12 mail.srvfarm.net postfix/smtpd[2002814]: warning: unknown[213.92.204.15]: SASL PLAIN authentication failed: 
Aug 28 01:40:12 mail.srvfarm.net postfix/smtpd[2002814]: lost connection after AUTH from unknown[213.92.204.15]
Aug 28 01:42:52 mail.srvfarm.net postfix/smtpd[2002815]: warning: unknown[213.92.204.15]: SASL PLAIN authentication failed: 
Aug 28 01:42:52 mail.srvfarm.net postfix/smtpd[2002815]: lost connection after AUTH from unknown[213.92.204.15]
Aug 28 01:45:14 mail.srvfarm.net postfix/smtps/smtpd[2003945]: warning: unknown[213.92.204.15]: SASL PLAIN authentication failed:
2020-08-28 09:09:18
181.174.128.23 attack
Aug 27 04:38:06 mail.srvfarm.net postfix/smtps/smtpd[1333102]: warning: unknown[181.174.128.23]: SASL PLAIN authentication failed: 
Aug 27 04:38:07 mail.srvfarm.net postfix/smtps/smtpd[1333102]: lost connection after AUTH from unknown[181.174.128.23]
Aug 27 04:41:22 mail.srvfarm.net postfix/smtps/smtpd[1331697]: warning: unknown[181.174.128.23]: SASL PLAIN authentication failed: 
Aug 27 04:41:23 mail.srvfarm.net postfix/smtps/smtpd[1331697]: lost connection after AUTH from unknown[181.174.128.23]
Aug 27 04:43:02 mail.srvfarm.net postfix/smtpd[1334742]: warning: unknown[181.174.128.23]: SASL PLAIN authentication failed:
2020-08-28 09:30:09
188.92.214.246 attackbotsspam
Aug 27 19:17:23 mail.srvfarm.net postfix/smtpd[1699914]: warning: unknown[188.92.214.246]: SASL PLAIN authentication failed: 
Aug 27 19:17:23 mail.srvfarm.net postfix/smtpd[1699914]: lost connection after AUTH from unknown[188.92.214.246]
Aug 27 19:20:44 mail.srvfarm.net postfix/smtps/smtpd[1699203]: warning: unknown[188.92.214.246]: SASL PLAIN authentication failed: 
Aug 27 19:20:44 mail.srvfarm.net postfix/smtps/smtpd[1699203]: lost connection after AUTH from unknown[188.92.214.246]
Aug 27 19:24:01 mail.srvfarm.net postfix/smtpd[1686715]: warning: unknown[188.92.214.246]: SASL PLAIN authentication failed:
2020-08-28 09:11:05

最近上报的IP列表

50.62.23.56 157.230.141.3 138.68.8.165 51.6.183.56
73.107.137.94 220.110.164.66 130.117.173.14 201.177.9.26
125.64.119.132 177.87.110.52 89.144.151.138 186.148.83.53
116.238.224.222 113.100.255.50 190.233.21.220 109.184.123.187
222.188.180.110 201.123.127.172 205.205.150.9 144.217.82.205