必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): Beijing

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Beijing Baidu Netcom Science and Technology Co., Ltd.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
106.12.128.114 attackbotsspam
SSH Brute Force
2020-04-29 13:22:21
106.12.128.24 attack
2019-12-02T14:17:09.360595shield sshd\[16882\]: Invalid user cobbe from 106.12.128.24 port 38700
2019-12-02T14:17:09.365231shield sshd\[16882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
2019-12-02T14:17:11.192723shield sshd\[16882\]: Failed password for invalid user cobbe from 106.12.128.24 port 38700 ssh2
2019-12-02T14:25:43.105327shield sshd\[18225\]: Invalid user mohsin from 106.12.128.24 port 47514
2019-12-02T14:25:43.109962shield sshd\[18225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
2019-12-02 23:16:31
106.12.128.24 attack
Nov 16 01:01:42 jane sshd[32025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24 
Nov 16 01:01:43 jane sshd[32025]: Failed password for invalid user mysql from 106.12.128.24 port 33350 ssh2
...
2019-11-16 08:32:39
106.12.128.24 attackbotsspam
Oct 10 16:11:34 vps691689 sshd[28929]: Failed password for root from 106.12.128.24 port 41282 ssh2
Oct 10 16:17:03 vps691689 sshd[29036]: Failed password for root from 106.12.128.24 port 47428 ssh2
...
2019-10-10 22:22:02
106.12.128.24 attackbotsspam
Oct  5 19:52:11 tdfoods sshd\[11936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24  user=root
Oct  5 19:52:13 tdfoods sshd\[11936\]: Failed password for root from 106.12.128.24 port 49164 ssh2
Oct  5 19:57:03 tdfoods sshd\[12334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24  user=root
Oct  5 19:57:05 tdfoods sshd\[12334\]: Failed password for root from 106.12.128.24 port 55464 ssh2
Oct  5 20:02:04 tdfoods sshd\[12797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24  user=root
2019-10-06 14:16:13
106.12.128.24 attackspam
SSH Brute-Force reported by Fail2Ban
2019-10-06 02:08:02
106.12.128.24 attackbots
Oct  5 12:46:45 SilenceServices sshd[22363]: Failed password for root from 106.12.128.24 port 49910 ssh2
Oct  5 12:50:50 SilenceServices sshd[23450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
Oct  5 12:50:52 SilenceServices sshd[23450]: Failed password for invalid user 123 from 106.12.128.24 port 53992 ssh2
2019-10-05 18:52:40
106.12.128.24 attack
2019-09-29T08:00:42.8755381495-001 sshd\[4489\]: Failed password for invalid user uq from 106.12.128.24 port 44442 ssh2
2019-09-29T08:11:29.3512191495-001 sshd\[5318\]: Invalid user owncloud from 106.12.128.24 port 38178
2019-09-29T08:11:29.3590951495-001 sshd\[5318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
2019-09-29T08:11:31.3036381495-001 sshd\[5318\]: Failed password for invalid user owncloud from 106.12.128.24 port 38178 ssh2
2019-09-29T08:16:44.8902711495-001 sshd\[5620\]: Invalid user ernest from 106.12.128.24 port 49166
2019-09-29T08:16:44.8933911495-001 sshd\[5620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
...
2019-09-29 20:33:10
106.12.128.114 attackbotsspam
Sep  1 02:57:16 MK-Soft-VM6 sshd\[11674\]: Invalid user it2 from 106.12.128.114 port 57490
Sep  1 02:57:16 MK-Soft-VM6 sshd\[11674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.114
Sep  1 02:57:18 MK-Soft-VM6 sshd\[11674\]: Failed password for invalid user it2 from 106.12.128.114 port 57490 ssh2
...
2019-09-01 13:43:09
106.12.128.114 attack
Aug 28 06:24:55 localhost sshd\[55797\]: Invalid user 123456 from 106.12.128.114 port 33396
Aug 28 06:24:55 localhost sshd\[55797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.114
Aug 28 06:24:57 localhost sshd\[55797\]: Failed password for invalid user 123456 from 106.12.128.114 port 33396 ssh2
Aug 28 06:29:56 localhost sshd\[56107\]: Invalid user control123 from 106.12.128.114 port 51898
Aug 28 06:29:56 localhost sshd\[56107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.114
...
2019-08-28 15:34:24
106.12.128.24 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-08-07 16:49:22
106.12.128.114 attackspam
SSH Brute Force, server-1 sshd[15882]: Failed password for ftp from 106.12.128.114 port 43554 ssh2
2019-07-20 19:33:33
106.12.128.24 attack
Invalid user www from 106.12.128.24 port 39768
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
Failed password for invalid user www from 106.12.128.24 port 39768 ssh2
Invalid user test from 106.12.128.24 port 34682
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.24
2019-07-12 16:24:53
106.12.128.114 attackbots
Automatic report
2019-07-11 12:21:30
106.12.128.114 attackspam
Jul  7 03:40:51 unicornsoft sshd\[9597\]: Invalid user nagios from 106.12.128.114
Jul  7 03:40:51 unicornsoft sshd\[9597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.128.114
Jul  7 03:40:53 unicornsoft sshd\[9597\]: Failed password for invalid user nagios from 106.12.128.114 port 35124 ssh2
2019-07-07 20:21:33
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.12.128.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22726
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;106.12.128.54.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041601 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 17 07:35:44 +08 2019
;; MSG SIZE  rcvd: 117

HOST信息:
Host 54.128.12.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 54.128.12.106.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.208.208.144 attackbots
7899/tcp 5588/tcp 6001/tcp...
[2019-05-16/07-14]608pkt,96pt.(tcp)
2019-07-15 02:49:00
190.220.31.11 attack
Jul 14 12:49:55 localhost sshd\[3661\]: Invalid user engineering from 190.220.31.11 port 33348
Jul 14 12:49:55 localhost sshd\[3661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.220.31.11
Jul 14 12:49:58 localhost sshd\[3661\]: Failed password for invalid user engineering from 190.220.31.11 port 33348 ssh2
2019-07-15 02:47:46
109.175.7.4 attackspambots
failed_logins
2019-07-15 02:42:56
115.227.98.107 attackspam
Automatic report - Banned IP Access
2019-07-15 02:13:48
154.117.192.9 attack
Lines containing failures of 154.117.192.9
Jul 14 11:48:49 omfg postfix/smtpd[9056]: connect from unknown[154.117.192.9]
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=154.117.192.9
2019-07-15 02:42:12
14.231.185.58 attackbotsspam
Jul 14 11:45:55 pl3server sshd[1014231]: Address 14.231.185.58 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul 14 11:45:55 pl3server sshd[1014231]: Invalid user admin from 14.231.185.58
Jul 14 11:45:55 pl3server sshd[1014231]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.231.185.58
Jul 14 11:45:57 pl3server sshd[1014231]: Failed password for invalid user admin from 14.231.185.58 port 33408 ssh2
Jul 14 11:45:58 pl3server sshd[1014231]: Connection closed by 14.231.185.58 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.231.185.58
2019-07-15 02:29:04
95.91.8.75 attack
Jul 14 19:14:33 microserver sshd[18558]: Invalid user gio from 95.91.8.75 port 34464
Jul 14 19:14:33 microserver sshd[18558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.91.8.75
Jul 14 19:14:34 microserver sshd[18558]: Failed password for invalid user gio from 95.91.8.75 port 34464 ssh2
Jul 14 19:20:10 microserver sshd[19252]: Invalid user guan from 95.91.8.75 port 34396
Jul 14 19:20:10 microserver sshd[19252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.91.8.75
Jul 14 19:31:04 microserver sshd[20997]: Invalid user admin from 95.91.8.75 port 34270
Jul 14 19:31:04 microserver sshd[20997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.91.8.75
Jul 14 19:31:06 microserver sshd[20997]: Failed password for invalid user admin from 95.91.8.75 port 34270 ssh2
Jul 14 19:36:32 microserver sshd[21682]: Invalid user matrix from 95.91.8.75 port 34206
Jul 14 19:36:32 microserver sshd[216
2019-07-15 02:06:01
93.75.138.203 attack
Automatic report - Port Scan Attack
2019-07-15 02:30:40
178.128.221.237 attackbots
Jul 14 20:07:48 core01 sshd\[22457\]: Invalid user alvin from 178.128.221.237 port 56700
Jul 14 20:07:48 core01 sshd\[22457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.221.237
...
2019-07-15 02:41:34
117.239.199.130 attackbotsspam
Jul 14 19:24:54 nextcloud sshd\[14501\]: Invalid user aline from 117.239.199.130
Jul 14 19:24:54 nextcloud sshd\[14501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.239.199.130
Jul 14 19:24:56 nextcloud sshd\[14501\]: Failed password for invalid user aline from 117.239.199.130 port 7686 ssh2
...
2019-07-15 02:02:27
94.23.0.64 attackbots
Jul 14 19:36:59 bouncer sshd\[28112\]: Invalid user rs from 94.23.0.64 port 41317
Jul 14 19:36:59 bouncer sshd\[28112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.0.64 
Jul 14 19:37:01 bouncer sshd\[28112\]: Failed password for invalid user rs from 94.23.0.64 port 41317 ssh2
...
2019-07-15 02:52:22
159.65.84.164 attack
2019-07-14T18:05:42.371936abusebot-7.cloudsearch.cf sshd\[1049\]: Invalid user ftpsecure from 159.65.84.164 port 56298
2019-07-15 02:27:03
200.38.229.217 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-15 02:15:19
95.17.244.90 attackbotsspam
Automatic report - Port Scan Attack
2019-07-15 02:33:27
185.77.171.124 attackbots
Jul 14 11:47:22 shared06 sshd[21451]: Invalid user admin from 185.77.171.124
Jul 14 11:47:22 shared06 sshd[21451]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.77.171.124
Jul 14 11:47:24 shared06 sshd[21451]: Failed password for invalid user admin from 185.77.171.124 port 52912 ssh2
Jul 14 11:47:25 shared06 sshd[21451]: Connection closed by 185.77.171.124 port 52912 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.77.171.124
2019-07-15 02:34:14

最近上报的IP列表

50.62.23.56 157.230.141.3 138.68.8.165 51.6.183.56
73.107.137.94 220.110.164.66 130.117.173.14 201.177.9.26
125.64.119.132 177.87.110.52 89.144.151.138 186.148.83.53
116.238.224.222 113.100.255.50 190.233.21.220 109.184.123.187
222.188.180.110 201.123.127.172 205.205.150.9 144.217.82.205