必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.136.213.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14428
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.136.213.154.		IN	A

;; AUTHORITY SECTION:
.			235	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 10:55:49 CST 2023
;; MSG SIZE  rcvd: 108
HOST信息:
154.213.136.106.in-addr.arpa domain name pointer KD106136213154.ppp-bb.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
154.213.136.106.in-addr.arpa	name = KD106136213154.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
118.70.185.229 attackspam
Dec  4 10:40:11 nextcloud sshd\[3467\]: Invalid user contract from 118.70.185.229
Dec  4 10:40:11 nextcloud sshd\[3467\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.185.229
Dec  4 10:40:13 nextcloud sshd\[3467\]: Failed password for invalid user contract from 118.70.185.229 port 39880 ssh2
...
2019-12-04 18:41:14
106.13.59.70 attackspam
Dec  4 07:11:00 venus sshd\[1611\]: Invalid user pass12345678 from 106.13.59.70 port 33122
Dec  4 07:11:00 venus sshd\[1611\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.59.70
Dec  4 07:11:02 venus sshd\[1611\]: Failed password for invalid user pass12345678 from 106.13.59.70 port 33122 ssh2
...
2019-12-04 18:12:34
178.254.169.66 attackbots
/var/log/messages:Dec  2 06:52:29 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1575269549.750:6958): pid=17776 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-server cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 pfs=ecdh-sha2-nistp256 spid=17777 suid=74 rport=45445 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=178.254.169.66 terminal=? res=success'
/var/log/messages:Dec  2 06:52:29 sanyalnet-cloud-vps audispd: node=sanyalnet-cloud-vps.freeddns.org type=CRYPTO_SESSION msg=audhostname(1575269549.753:6959): pid=17776 uid=0 auid=4294967295 ses=4294967295 msg='op=start direction=from-client cipher=aes256-ctr ksize=256 mac=hmac-sha2-256 pfs=ecdh-sha2-nistp256 spid=17777 suid=74 rport=45445 laddr=104.167.106.93 lport=22  exe="/usr/sbin/sshd" hostname=? addr=178.254.169.66 terminal=? res=success'
/var/log/messages:Dec  2 06:52:34 sanyalnet-cloud-vps fail2ban.filter[1442]: INFO [ssh........
-------------------------------
2019-12-04 18:31:27
51.254.204.190 attack
Dec  4 12:23:31 server sshd\[15119\]: Invalid user schibig from 51.254.204.190
Dec  4 12:23:31 server sshd\[15119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.ip-51-254-204.eu 
Dec  4 12:23:33 server sshd\[15119\]: Failed password for invalid user schibig from 51.254.204.190 port 60104 ssh2
Dec  4 12:28:47 server sshd\[16545\]: Invalid user usuario from 51.254.204.190
Dec  4 12:28:47 server sshd\[16545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.ip-51-254-204.eu 
...
2019-12-04 18:09:04
94.191.108.176 attackspambots
Dec  4 15:37:26 areeb-Workstation sshd[32118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.108.176 
Dec  4 15:37:28 areeb-Workstation sshd[32118]: Failed password for invalid user dandridge from 94.191.108.176 port 60188 ssh2
...
2019-12-04 18:15:00
149.202.93.208 attack
12/04/2019-01:47:01.678220 149.202.93.208 Protocol: 17 ET SCAN Sipvicious Scan
2019-12-04 18:30:15
104.54.180.97 attackbots
2019-12-04T10:20:27.459478abusebot-8.cloudsearch.cf sshd\[26643\]: Invalid user noel from 104.54.180.97 port 38392
2019-12-04T10:20:27.464090abusebot-8.cloudsearch.cf sshd\[26643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104-54-180-97.lightspeed.irvnca.sbcglobal.net
2019-12-04 18:40:34
103.129.222.135 attackbotsspam
Dec  4 11:26:59 gw1 sshd[19612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.222.135
Dec  4 11:27:01 gw1 sshd[19612]: Failed password for invalid user admin from 103.129.222.135 port 50713 ssh2
...
2019-12-04 18:13:06
117.50.38.246 attackbotsspam
Fail2Ban - SSH Bruteforce Attempt
2019-12-04 18:27:28
96.45.184.47 attack
Dec  4 07:38:42 Ubuntu-1404-trusty-64-minimal sshd\[27307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.45.184.47  user=root
Dec  4 07:38:44 Ubuntu-1404-trusty-64-minimal sshd\[27307\]: Failed password for root from 96.45.184.47 port 40170 ssh2
Dec  4 08:12:21 Ubuntu-1404-trusty-64-minimal sshd\[27865\]: Invalid user smmsp from 96.45.184.47
Dec  4 08:12:21 Ubuntu-1404-trusty-64-minimal sshd\[27865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.45.184.47
Dec  4 08:12:23 Ubuntu-1404-trusty-64-minimal sshd\[27865\]: Failed password for invalid user smmsp from 96.45.184.47 port 35740 ssh2
2019-12-04 18:37:40
81.145.158.178 attackspambots
Dec  4 09:29:56 zeus sshd[18998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.145.158.178 
Dec  4 09:29:58 zeus sshd[18998]: Failed password for invalid user galladi from 81.145.158.178 port 58900 ssh2
Dec  4 09:38:18 zeus sshd[19191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.145.158.178 
Dec  4 09:38:21 zeus sshd[19191]: Failed password for invalid user benson from 81.145.158.178 port 35691 ssh2
2019-12-04 18:06:09
50.63.164.78 attack
Bash Remote Code Execution Vulnerability, PTR: ip-50-63-164-78.ip.secureserver.net.
2019-12-04 18:19:06
213.241.46.78 attack
Dec  3 23:38:16 php1 sshd\[29943\]: Invalid user server from 213.241.46.78
Dec  3 23:38:16 php1 sshd\[29943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kominywulkan.pl
Dec  3 23:38:18 php1 sshd\[29943\]: Failed password for invalid user server from 213.241.46.78 port 46850 ssh2
Dec  3 23:46:17 php1 sshd\[31243\]: Invalid user westonw from 213.241.46.78
Dec  3 23:46:17 php1 sshd\[31243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=kominywulkan.pl
2019-12-04 18:01:59
132.232.112.25 attack
Dec  4 02:33:36 plusreed sshd[13331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.112.25  user=root
Dec  4 02:33:38 plusreed sshd[13331]: Failed password for root from 132.232.112.25 port 36350 ssh2
...
2019-12-04 18:17:50
192.159.67.93 attackbots
Port scan on 3 port(s): 2376 2377 4243
2019-12-04 18:32:20

最近上报的IP列表

106.137.140.246 106.136.239.186 106.136.222.63 106.136.230.10
106.136.193.130 106.136.189.131 106.136.247.157 106.136.179.109
106.136.157.28 106.136.178.143 106.136.41.13 106.136.18.155
106.136.161.162 106.136.97.66 106.136.208.127 106.136.19.243
106.137.103.87 106.136.216.155 106.136.194.175 106.136.12.98