必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.75.164.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.75.164.145.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030301 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 02:35:00 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
145.164.75.106.in-addr.arpa domain name pointer pdxpxhw.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.164.75.106.in-addr.arpa	name = pdxpxhw.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
130.162.102.37 attack
RDP Bruteforce
2019-11-23 17:09:40
188.166.216.84 attackbotsspam
Invalid user castis from 188.166.216.84 port 59646
2019-11-23 17:15:05
49.234.116.13 attackbotsspam
2019-11-23T06:27:08.638652abusebot-8.cloudsearch.cf sshd\[16598\]: Invalid user 123456 from 49.234.116.13 port 43630
2019-11-23 16:57:11
150.223.12.97 attackbots
Nov 23 09:42:37 sd-53420 sshd\[21044\]: Invalid user ubuntu from 150.223.12.97
Nov 23 09:42:37 sd-53420 sshd\[21044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.12.97
Nov 23 09:42:39 sd-53420 sshd\[21044\]: Failed password for invalid user ubuntu from 150.223.12.97 port 36698 ssh2
Nov 23 09:50:06 sd-53420 sshd\[22928\]: User root from 150.223.12.97 not allowed because none of user's groups are listed in AllowGroups
Nov 23 09:50:06 sd-53420 sshd\[22928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.12.97  user=root
...
2019-11-23 16:56:31
138.197.73.215 attackspambots
Lines containing failures of 138.197.73.215
Nov 20 19:31:44 jarvis sshd[24257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.73.215  user=mysql
Nov 20 19:31:46 jarvis sshd[24257]: Failed password for mysql from 138.197.73.215 port 58422 ssh2
Nov 20 19:31:47 jarvis sshd[24257]: Received disconnect from 138.197.73.215 port 58422:11: Bye Bye [preauth]
Nov 20 19:31:47 jarvis sshd[24257]: Disconnected from authenticating user mysql 138.197.73.215 port 58422 [preauth]
Nov 20 19:52:32 jarvis sshd[27983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.73.215  user=r.r
Nov 20 19:52:35 jarvis sshd[27983]: Failed password for r.r from 138.197.73.215 port 59156 ssh2
Nov 20 19:52:36 jarvis sshd[27983]: Received disconnect from 138.197.73.215 port 59156:11: Bye Bye [preauth]
Nov 20 19:52:36 jarvis sshd[27983]: Disconnected from authenticating user r.r 138.197.73.215 port 59156 [preauth]........
------------------------------
2019-11-23 16:45:37
104.248.145.71 attackbots
Nov 23 07:08:31 web2 sshd[10827]: Failed password for root from 104.248.145.71 port 47066 ssh2
2019-11-23 17:17:59
91.217.194.85 attack
Nov 23 08:04:08 vps666546 sshd\[29584\]: Invalid user ghanson from 91.217.194.85 port 34302
Nov 23 08:04:08 vps666546 sshd\[29584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.217.194.85
Nov 23 08:04:09 vps666546 sshd\[29584\]: Failed password for invalid user ghanson from 91.217.194.85 port 34302 ssh2
Nov 23 08:08:17 vps666546 sshd\[29638\]: Invalid user avirett from 91.217.194.85 port 40442
Nov 23 08:08:17 vps666546 sshd\[29638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.217.194.85
...
2019-11-23 16:41:00
118.218.101.13 attackspam
spam FO
2019-11-23 16:39:34
49.51.8.24 attack
port scan and connect, tcp 443 (https)
2019-11-23 16:39:10
106.75.157.9 attackspambots
Invalid user kopp from 106.75.157.9 port 47106
2019-11-23 16:55:37
213.32.92.57 attackbots
Nov 23 07:27:13 dedicated sshd[21375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.92.57  user=root
Nov 23 07:27:15 dedicated sshd[21375]: Failed password for root from 213.32.92.57 port 44226 ssh2
2019-11-23 16:53:11
203.112.223.54 attackbots
23.11.2019 07:27:43 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-11-23 16:36:30
87.236.95.206 attackspam
Lines containing failures of 87.236.95.206
Nov 21 00:29:20 own sshd[6384]: Invalid user test from 87.236.95.206 port 35865
Nov 21 00:29:20 own sshd[6384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.236.95.206
Nov 21 00:29:22 own sshd[6384]: Failed password for invalid user test from 87.236.95.206 port 35865 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=87.236.95.206
2019-11-23 17:00:47
112.85.42.87 attackbots
Nov 22 22:43:42 sachi sshd\[29217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
Nov 22 22:43:44 sachi sshd\[29217\]: Failed password for root from 112.85.42.87 port 55250 ssh2
Nov 22 22:44:24 sachi sshd\[29260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
Nov 22 22:44:26 sachi sshd\[29260\]: Failed password for root from 112.85.42.87 port 41401 ssh2
Nov 22 22:45:05 sachi sshd\[29310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2019-11-23 16:50:07
124.188.225.212 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/124.188.225.212/ 
 
 AU - 1H : (15)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN135887 
 
 IP : 124.188.225.212 
 
 CIDR : 124.188.0.0/14 
 
 PREFIX COUNT : 44 
 
 UNIQUE IP COUNT : 4004608 
 
 
 ATTACKS DETECTED ASN135887 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-11-23 07:27:15 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-23 16:51:22

最近上报的IP列表

106.75.162.24 254.95.224.202 106.75.173.24 106.75.209.139
106.75.21.125 106.75.214.162 106.75.218.10 106.75.218.92
106.75.223.132 106.75.223.68 106.75.226.208 106.75.226.215
106.75.227.87 106.75.229.244 106.75.231.106 106.75.232.176
106.75.236.110 106.75.237.12 106.75.237.242 242.211.172.123