必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.242.136.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65500
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.242.136.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 04:49:06 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 53.136.242.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.136.242.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.137.72.121 attack
Sep 21 15:23:19 TORMINT sshd\[4448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121  user=root
Sep 21 15:23:22 TORMINT sshd\[4448\]: Failed password for root from 79.137.72.121 port 60506 ssh2
Sep 21 15:27:12 TORMINT sshd\[5000\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121  user=root
...
2019-09-22 04:34:00
112.45.122.8 attack
Sep 21 15:21:07 mail postfix/smtpd[14043]: warning: unknown[112.45.122.8]: SASL LOGIN authentication failed: authentication failure
2019-09-22 04:34:42
103.66.214.53 attack
wp-login.php
2019-09-22 04:32:06
180.71.47.198 attackbots
Invalid user solr from 180.71.47.198 port 46134
2019-09-22 04:42:32
178.32.151.196 attackbots
Sep 21 21:25:17 SilenceServices sshd[12715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.151.196
Sep 21 21:25:19 SilenceServices sshd[12715]: Failed password for invalid user no from 178.32.151.196 port 43110 ssh2
Sep 21 21:29:03 SilenceServices sshd[13690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.151.196
2019-09-22 04:21:09
114.41.241.74 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 13:46:22,339 INFO [amun_request_handler] PortScan Detected on Port: 445 (114.41.241.74)
2019-09-22 04:42:53
111.252.104.135 attackspambots
23/tcp
[2019-09-21]1pkt
2019-09-22 04:28:03
149.56.46.220 attack
Sep 21 04:24:27 lcdev sshd\[15503\]: Invalid user hadoop from 149.56.46.220
Sep 21 04:24:27 lcdev sshd\[15503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.ip-149-56-46.net
Sep 21 04:24:28 lcdev sshd\[15503\]: Failed password for invalid user hadoop from 149.56.46.220 port 46432 ssh2
Sep 21 04:28:33 lcdev sshd\[15864\]: Invalid user raspberry from 149.56.46.220
Sep 21 04:28:33 lcdev sshd\[15864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.ip-149-56-46.net
2019-09-22 04:11:30
188.165.55.33 attackspam
Sep 21 04:27:41 web1 sshd\[2760\]: Invalid user admin1234 from 188.165.55.33
Sep 21 04:27:41 web1 sshd\[2760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.55.33
Sep 21 04:27:43 web1 sshd\[2760\]: Failed password for invalid user admin1234 from 188.165.55.33 port 29241 ssh2
Sep 21 04:31:53 web1 sshd\[3167\]: Invalid user tomcat from 188.165.55.33
Sep 21 04:31:53 web1 sshd\[3167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.55.33
2019-09-22 04:04:18
45.136.109.136 attackbots
Port scan on 13 port(s): 91 113 161 230 469 474 576 649 666 723 737 856 961
2019-09-22 04:36:13
167.71.40.112 attackspam
Sep 21 15:40:03 yesfletchmain sshd\[29258\]: Invalid user deploy from 167.71.40.112 port 45248
Sep 21 15:40:03 yesfletchmain sshd\[29258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.40.112
Sep 21 15:40:05 yesfletchmain sshd\[29258\]: Failed password for invalid user deploy from 167.71.40.112 port 45248 ssh2
Sep 21 15:44:02 yesfletchmain sshd\[29361\]: Invalid user uw from 167.71.40.112 port 58968
Sep 21 15:44:02 yesfletchmain sshd\[29361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.40.112
...
2019-09-22 04:37:51
37.114.129.9 attack
Chat Spam
2019-09-22 04:07:01
62.234.49.247 attack
Sep 21 17:51:54 eventyay sshd[25748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.49.247
Sep 21 17:51:56 eventyay sshd[25748]: Failed password for invalid user support from 62.234.49.247 port 56518 ssh2
Sep 21 17:58:13 eventyay sshd[25860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.49.247
...
2019-09-22 04:31:16
14.182.9.202 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 21-09-2019 13:50:20.
2019-09-22 04:19:35
200.41.231.10 attackspambots
Invalid user omgserv from 200.41.231.10 port 51810
2019-09-22 04:26:27

最近上报的IP列表

64.88.174.2 128.200.51.196 160.55.10.3 47.128.99.186
200.158.189.81 253.120.162.152 51.56.14.83 57.146.44.178
3.101.156.243 88.20.94.151 116.163.60.27 77.159.200.3
253.5.207.251 89.44.140.230 34.8.145.178 55.220.190.188
205.12.126.28 240.124.200.199 63.164.243.170 254.0.171.133