必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.120.242.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47869
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.120.242.131.		IN	A

;; AUTHORITY SECTION:
.			498	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 11:08:59 CST 2023
;; MSG SIZE  rcvd: 108
HOST信息:
Host 131.242.120.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 131.242.120.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
223.166.141.228 attackbots
Invalid user gerald from 223.166.141.228 port 1126
2020-02-19 08:55:56
46.200.203.201 attack
firewall-block, port(s): 23/tcp
2020-02-19 09:19:40
185.230.82.40 attackbotsspam
SSH Brute Force
2020-02-19 08:58:45
66.96.233.31 attackspam
Invalid user leah from 66.96.233.31 port 49486
2020-02-19 09:09:22
46.101.27.6 attackspam
Invalid user postgres from 46.101.27.6 port 47240
2020-02-19 08:55:11
115.29.245.139 attackspam
Feb 18 06:08:35 : SSH login attempts with invalid user
2020-02-19 09:28:32
89.128.118.41 attack
Total attacks: 2
2020-02-19 09:06:03
180.250.140.74 attack
Invalid user zxin10 from 180.250.140.74 port 41006
2020-02-19 09:25:16
121.157.82.202 attackspambots
Invalid user yuanwd from 121.157.82.202 port 40098
2020-02-19 09:02:29
51.79.69.137 attack
Feb 18 14:33:24 web9 sshd\[5124\]: Invalid user user03 from 51.79.69.137
Feb 18 14:33:24 web9 sshd\[5124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.69.137
Feb 18 14:33:26 web9 sshd\[5124\]: Failed password for invalid user user03 from 51.79.69.137 port 48524 ssh2
Feb 18 14:35:15 web9 sshd\[5401\]: Invalid user jiaxing from 51.79.69.137
Feb 18 14:35:15 web9 sshd\[5401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.69.137
2020-02-19 08:53:10
1.215.162.195 attackbots
Spammer
2020-02-19 09:19:56
77.93.126.12 attackspam
Invalid user sinus from 77.93.126.12 port 52996
2020-02-19 09:07:59
163.172.140.67 attack
Invalid user mdu from 163.172.140.67 port 55936
2020-02-19 09:00:41
68.183.236.92 attack
Invalid user craigh from 68.183.236.92 port 57022
2020-02-19 09:28:50
5.196.74.190 attackbots
Feb 19 06:08:38 gw1 sshd[7637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.74.190
Feb 19 06:08:40 gw1 sshd[7637]: Failed password for invalid user root2 from 5.196.74.190 port 55646 ssh2
...
2020-02-19 09:13:55

最近上报的IP列表

106.120.51.39 106.120.42.205 106.120.226.199 106.120.83.244
106.120.210.5 106.120.217.211 106.120.20.99 106.120.186.166
106.120.208.221 106.120.26.11 106.120.205.148 106.120.178.148
106.120.173.67 106.120.179.4 106.120.165.189 106.120.172.167
106.120.159.29 106.120.141.225 106.120.15.167 106.120.125.142