必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.75.145.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.75.145.121.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:29:52 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 121.145.75.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.145.75.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.169 attackbotsspam
Jul 22 11:48:03 ip-172-31-62-245 sshd\[1345\]: Failed password for root from 222.186.175.169 port 29586 ssh2\
Jul 22 11:48:14 ip-172-31-62-245 sshd\[1345\]: Failed password for root from 222.186.175.169 port 29586 ssh2\
Jul 22 11:48:17 ip-172-31-62-245 sshd\[1345\]: Failed password for root from 222.186.175.169 port 29586 ssh2\
Jul 22 11:48:29 ip-172-31-62-245 sshd\[1358\]: Failed password for root from 222.186.175.169 port 52364 ssh2\
Jul 22 11:48:32 ip-172-31-62-245 sshd\[1358\]: Failed password for root from 222.186.175.169 port 52364 ssh2\
2020-07-22 19:50:59
49.51.51.24 attackspambots
Unauthorized connection attempt detected from IP address 49.51.51.24 to port 79
2020-07-22 19:46:26
179.110.20.249 attack
Unauthorized connection attempt detected from IP address 179.110.20.249 to port 80
2020-07-22 20:19:24
188.166.145.228 attackspambots
 TCP (SYN) 188.166.145.228:58936 -> port 8443, len 44
2020-07-22 19:54:19
118.38.81.92 attackspam
Unauthorized connection attempt detected from IP address 118.38.81.92 to port 5555
2020-07-22 20:01:27
191.20.239.247 attackspambots
Unauthorized connection attempt detected from IP address 191.20.239.247 to port 22
2020-07-22 20:16:51
52.142.62.1 attackbotsspam
Icarus honeypot on github
2020-07-22 19:45:42
27.72.31.77 attackspambots
Unauthorized connection attempt detected from IP address 27.72.31.77 to port 445
2020-07-22 19:48:46
218.92.0.216 attackspam
Jul 22 13:51:19 v22018053744266470 sshd[10501]: Failed password for root from 218.92.0.216 port 64071 ssh2
Jul 22 13:51:26 v22018053744266470 sshd[10511]: Failed password for root from 218.92.0.216 port 33141 ssh2
...
2020-07-22 19:52:21
132.232.135.73 attack
Unauthorized connection attempt detected from IP address 132.232.135.73 to port 80
2020-07-22 19:59:54
106.13.192.5 attackspambots
Unauthorized connection attempt detected from IP address 106.13.192.5 to port 6245
2020-07-22 20:03:27
47.219.122.64 attackspambots
Unauthorized connection attempt detected from IP address 47.219.122.64 to port 23
2020-07-22 20:10:21
114.93.26.83 attackbotsspam
Port Scan
...
2020-07-22 20:26:08
45.5.200.4 attackspambots
GET / HTTP/1.1 403 0 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML
2020-07-22 19:47:13
40.76.114.244 attackspambots
Unauthorized connection attempt detected from IP address 40.76.114.244 to port 1433
2020-07-22 20:11:36

最近上报的IP列表

106.75.140.64 106.85.130.101 106.85.130.141 106.85.129.9
106.85.129.96 106.85.130.1 106.85.130.113 106.85.130.12
106.85.129.52 106.85.129.86 106.85.129.62 106.85.129.80
106.85.129.93 106.85.130.170 106.85.130.169 106.85.130.177
106.85.130.192 106.85.130.205 106.85.130.186 106.85.130.166