必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.121.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61263
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.121.106.			IN	A

;; AUTHORITY SECTION:
.			426	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:29:57 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 106.121.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.121.14.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.64.80.135 attack
Invalid user po from 192.64.80.135 port 54652
2020-08-20 14:45:00
218.92.0.200 attackspambots
Automatic report BANNED IP
2020-08-20 14:29:04
92.38.128.243 attackspam
Aug 20 08:04:39 vps647732 sshd[9791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.38.128.243
Aug 20 08:04:41 vps647732 sshd[9791]: Failed password for invalid user zhongfu from 92.38.128.243 port 41702 ssh2
...
2020-08-20 14:25:39
136.243.72.5 attack
Aug 20 08:53:47 relay postfix/smtpd\[3850\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[1582\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[3812\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[2132\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[3293\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[1593\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[2724\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[2258\]: warning: mon.riss
...
2020-08-20 15:07:34
148.72.209.9 attackspam
Automatic report - XMLRPC Attack
2020-08-20 14:46:30
83.137.149.120 attack
83.137.149.120 - - [20/Aug/2020:07:15:22 +0200] "GET /wp-login.php HTTP/1.1" 200 8775 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
83.137.149.120 - - [20/Aug/2020:07:15:24 +0200] "POST /wp-login.php HTTP/1.1" 200 9026 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
83.137.149.120 - - [20/Aug/2020:07:15:25 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-20 14:40:44
103.238.69.138 attackspam
malicious Brute-Force reported by https://www.patrick-binder.de
...
2020-08-20 14:34:58
139.99.61.247 attackspambots
Aug 20 07:57:14 pornomens sshd\[1983\]: Invalid user ubuntu from 139.99.61.247 port 36570
Aug 20 07:57:14 pornomens sshd\[1983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.61.247
Aug 20 07:57:16 pornomens sshd\[1983\]: Failed password for invalid user ubuntu from 139.99.61.247 port 36570 ssh2
...
2020-08-20 14:46:06
151.80.140.166 attackbotsspam
2020-08-20T01:30:30.6306341495-001 sshd[22058]: Failed password for root from 151.80.140.166 port 47222 ssh2
2020-08-20T01:33:56.9619971495-001 sshd[22288]: Invalid user developer from 151.80.140.166 port 52516
2020-08-20T01:33:56.9653661495-001 sshd[22288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=dev.geronimo-dev.ovh
2020-08-20T01:33:56.9619971495-001 sshd[22288]: Invalid user developer from 151.80.140.166 port 52516
2020-08-20T01:33:59.2429191495-001 sshd[22288]: Failed password for invalid user developer from 151.80.140.166 port 52516 ssh2
2020-08-20T01:37:31.0473981495-001 sshd[22495]: Invalid user matias from 151.80.140.166 port 60366
...
2020-08-20 14:25:20
167.71.235.133 attack
Aug 19 18:59:20 auw2 sshd\[14607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.235.133  user=root
Aug 19 18:59:22 auw2 sshd\[14607\]: Failed password for root from 167.71.235.133 port 37698 ssh2
Aug 19 19:07:34 auw2 sshd\[15330\]: Invalid user vu from 167.71.235.133
Aug 19 19:07:34 auw2 sshd\[15330\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.235.133
Aug 19 19:07:36 auw2 sshd\[15330\]: Failed password for invalid user vu from 167.71.235.133 port 46816 ssh2
2020-08-20 14:23:32
85.209.0.128 attack
Aug 20 03:52:28 *** sshd[1841]: Did not receive identification string from 85.209.0.128
2020-08-20 15:03:07
185.250.220.170 attackbotsspam
Aug 20 04:41:39 *hidden* kernel: [165614.379814] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=185.250.220.170 DST=173.212.244.83 LEN=40 TOS=0x08 PREC=0x20 TTL=245 ID=30663 PROTO=TCP SPT=47025 DPT=8881 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 20 04:46:27 *hidden* kernel: [165901.929775] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=185.250.220.170 DST=173.212.244.83 LEN=40 TOS=0x08 PREC=0x20 TTL=245 ID=60200 PROTO=TCP SPT=47025 DPT=7000 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 20 05:18:49 *hidden* kernel: [167844.067923] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=185.250.220.170 DST=173.212.244.83 LEN=40 TOS=0x08 PREC=0x20 TTL=245 ID=13587 PROTO=TCP SPT=47025 DPT=5000 WINDOW=1024 RES=0x00 SYN URGP=0 Aug 20 05:52:08 *hidden* kernel: [169842.933141] [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3e:4a:cc:28:99:3a:4d:23:91:08:00 SRC=185.250.220.170 DST=173.212.244.83 LEN=40 TOS=0x08 PREC=0x20 TTL=245 ID=47934 PROTO=TCP
...
2020-08-20 14:54:15
222.186.42.155 attack
Aug 20 08:28:58 dev0-dcde-rnet sshd[13417]: Failed password for root from 222.186.42.155 port 23442 ssh2
Aug 20 08:29:08 dev0-dcde-rnet sshd[13420]: Failed password for root from 222.186.42.155 port 16582 ssh2
2020-08-20 14:31:54
218.92.0.248 attackspam
Aug 20 08:46:02 jane sshd[16139]: Failed password for root from 218.92.0.248 port 24447 ssh2
Aug 20 08:46:07 jane sshd[16139]: Failed password for root from 218.92.0.248 port 24447 ssh2
...
2020-08-20 14:48:07
222.186.175.182 attackspam
Aug 20 08:33:12 Ubuntu-1404-trusty-64-minimal sshd\[22554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Aug 20 08:33:14 Ubuntu-1404-trusty-64-minimal sshd\[22554\]: Failed password for root from 222.186.175.182 port 27438 ssh2
Aug 20 08:33:30 Ubuntu-1404-trusty-64-minimal sshd\[22614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Aug 20 08:33:33 Ubuntu-1404-trusty-64-minimal sshd\[22614\]: Failed password for root from 222.186.175.182 port 35142 ssh2
Aug 20 08:33:43 Ubuntu-1404-trusty-64-minimal sshd\[22614\]: Failed password for root from 222.186.175.182 port 35142 ssh2
2020-08-20 14:33:59

最近上报的IP列表

106.14.2.20 106.14.121.111 106.14.120.47 106.14.121.14
106.14.121.13 106.14.121.140 106.14.121.167 106.14.121.156
106.14.121.154 106.14.121.169 106.14.121.171 106.14.2.210
106.14.121.187 106.14.121.202 106.14.121.195 106.14.121.225
106.14.121.238 106.14.121.233 106.14.121.229 106.14.121.250