必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.142.83.59
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54332
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.142.83.59.			IN	A

;; AUTHORITY SECTION:
.			421	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030200 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 02 19:27:08 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
59.83.142.106.in-addr.arpa domain name pointer KD106142083059.au-net.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
59.83.142.106.in-addr.arpa	name = KD106142083059.au-net.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
165.22.94.219 attackbotsspam
2020/05/18 20:11:00 \[error\] 24758\#24758: \*42459 FastCGI sent in stderr: "Primary script unknown" while reading response header from upstream, client: 165.22.94.219, server: rakkor.uk, request: "GET /wp-login.php HTTP/1.1", upstream: "fastcgi://unix:/run/php-fpm/php-fdf1d4a0-1ee6-4ddf-8a4a-bf7184d3fc60.sock:", host: "rakkor.uk", referrer: "http://rakkor.uk/wp-login.php"
2020/05/18 20:11:00 \[error\] 24758\#24758: \*42459 FastCGI sent in stderr: "Primary script unknown" while reading response header from upstream, client: 165.22.94.219, server: rakkor.uk, request: "GET /wp-login.php HTTP/1.1", upstream: "fastcgi://unix:/run/php-fpm/php-fdf1d4a0-1ee6-4ddf-8a4a-bf7184d3fc60.sock:", host: "rakkor.uk", referrer: "http://rakkor.uk/wp-login.php"
2020-05-25 17:47:35
142.93.56.12 attackbotsspam
2020-05-25T12:37:53.588217afi-git.jinr.ru sshd[28225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.56.12
2020-05-25T12:37:53.584820afi-git.jinr.ru sshd[28225]: Invalid user 101 from 142.93.56.12 port 53126
2020-05-25T12:37:55.767875afi-git.jinr.ru sshd[28225]: Failed password for invalid user 101 from 142.93.56.12 port 53126 ssh2
2020-05-25T12:41:42.722750afi-git.jinr.ru sshd[29158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.56.12  user=root
2020-05-25T12:41:44.340238afi-git.jinr.ru sshd[29158]: Failed password for root from 142.93.56.12 port 37880 ssh2
...
2020-05-25 18:00:05
141.98.80.46 attack
2020-05-25T10:17:29.469046beta postfix/smtpd[1688]: warning: unknown[141.98.80.46]: SASL LOGIN authentication failed: authentication failure
2020-05-25T10:17:32.926951beta postfix/smtpd[1688]: warning: unknown[141.98.80.46]: SASL LOGIN authentication failed: authentication failure
2020-05-25T10:47:07.471962beta postfix/smtpd[2152]: warning: unknown[141.98.80.46]: SASL LOGIN authentication failed: authentication failure
...
2020-05-25 17:49:36
211.83.111.21 attackspam
May 25 04:26:48 ws24vmsma01 sshd[622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.83.111.21
May 25 04:26:49 ws24vmsma01 sshd[622]: Failed password for invalid user db2inst1 from 211.83.111.21 port 53060 ssh2
...
2020-05-25 17:37:40
159.65.176.156 attackspam
May 25 05:44:53 vps46666688 sshd[30935]: Failed password for root from 159.65.176.156 port 51164 ssh2
...
2020-05-25 17:53:10
194.135.234.194 attackbotsspam
Port Scan detected!
...
2020-05-25 17:52:10
198.199.124.109 attack
(sshd) Failed SSH login from 198.199.124.109 (NL/Netherlands/-): 5 in the last 3600 secs
2020-05-25 17:51:29
103.253.42.59 attackbots
[2020-05-25 00:37:07] NOTICE[1157][C-00009199] chan_sip.c: Call from '' (103.253.42.59:56099) to extension '002146812400987' rejected because extension not found in context 'public'.
[2020-05-25 00:37:07] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-25T00:37:07.555-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="002146812400987",SessionID="0x7f5f1039ca78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.253.42.59/56099",ACLName="no_extension_match"
[2020-05-25 00:38:51] NOTICE[1157][C-0000919b] chan_sip.c: Call from '' (103.253.42.59:56283) to extension '0002146812400987' rejected because extension not found in context 'public'.
[2020-05-25 00:38:51] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-25T00:38:51.009-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0002146812400987",SessionID="0x7f5f10787a08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD
...
2020-05-25 17:30:33
193.112.195.243 attackbotsspam
May 25 07:51:25 pornomens sshd\[30908\]: Invalid user mirek from 193.112.195.243 port 57948
May 25 07:51:26 pornomens sshd\[30908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.195.243
May 25 07:51:28 pornomens sshd\[30908\]: Failed password for invalid user mirek from 193.112.195.243 port 57948 ssh2
...
2020-05-25 17:23:59
182.253.184.20 attack
Failed password for invalid user judy from 182.253.184.20 port 37242 ssh2
2020-05-25 17:44:47
104.248.126.170 attackbotsspam
2020-05-25T05:04:56.986226shield sshd\[7128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.126.170  user=root
2020-05-25T05:04:59.221849shield sshd\[7128\]: Failed password for root from 104.248.126.170 port 43766 ssh2
2020-05-25T05:08:21.232899shield sshd\[8161\]: Invalid user manager from 104.248.126.170 port 46088
2020-05-25T05:08:21.236578shield sshd\[8161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.126.170
2020-05-25T05:08:22.615253shield sshd\[8161\]: Failed password for invalid user manager from 104.248.126.170 port 46088 ssh2
2020-05-25 17:47:20
46.20.69.17 attack
30897/tcp 8281/tcp 12547/tcp...
[2020-04-21/05-25]11pkt,10pt.(tcp)
2020-05-25 17:48:20
112.3.24.101 attackbots
Invalid user qkj from 112.3.24.101 port 57342
2020-05-25 17:38:01
39.129.23.23 attackbotsspam
Failed password for invalid user user from 39.129.23.23 port 45664 ssh2
2020-05-25 17:27:49
119.90.51.171 attackspam
Brute-force attempt banned
2020-05-25 17:56:36

最近上报的IP列表

113.116.129.72 113.116.129.85 113.116.129.87 113.116.13.112
113.116.13.72 113.116.13.91 113.116.130.115 113.116.130.157
113.116.130.197 113.116.130.201 113.116.130.221 113.116.130.33
113.116.130.53 113.116.130.76 113.116.130.85 113.116.131.114
113.116.131.135 113.116.131.148 113.116.131.152 113.116.131.17