必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.91.121.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57090
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.91.121.106.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 03:56:25 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
Host 106.121.91.11.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.121.91.11.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
123.135.127.85 attackspam
TCP 3389 (RDP)
2019-12-16 23:38:58
221.235.184.78 attackbotsspam
Dec 16 16:28:43 debian-2gb-nbg1-2 kernel: \[162907.066104\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=221.235.184.78 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=10718 PROTO=TCP SPT=53817 DPT=3384 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-16 23:32:45
134.209.24.143 attackbots
Dec 16 15:48:07 h2177944 sshd\[17867\]: Invalid user palmby from 134.209.24.143 port 39022
Dec 16 15:48:07 h2177944 sshd\[17867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.24.143
Dec 16 15:48:09 h2177944 sshd\[17867\]: Failed password for invalid user palmby from 134.209.24.143 port 39022 ssh2
Dec 16 15:53:17 h2177944 sshd\[17974\]: Invalid user splanjpd from 134.209.24.143 port 46740
Dec 16 15:53:17 h2177944 sshd\[17974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.24.143
...
2019-12-16 23:13:29
14.250.6.244 attackbotsspam
Unauthorized connection attempt from IP address 14.250.6.244 on Port 445(SMB)
2019-12-16 22:57:06
170.130.187.42 attackspam
TCP 3389 (RDP)
2019-12-16 23:36:34
95.174.111.233 attackbots
Unauthorized connection attempt from IP address 95.174.111.233 on Port 445(SMB)
2019-12-16 23:10:12
79.124.62.34 attackspam
Dec 16 18:20:05 debian-2gb-vpn-nbg1-1 kernel: [887974.864963] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=79.124.62.34 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=27182 PROTO=TCP SPT=59401 DPT=3388 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-16 23:29:45
182.156.234.90 attack
Unauthorized connection attempt from IP address 182.156.234.90 on Port 445(SMB)
2019-12-16 23:29:24
45.134.179.241 attackspam
TCP 3389 (RDP)
2019-12-16 23:31:52
218.92.0.203 attack
Dec 16 14:44:02 zeus sshd[15390]: Failed password for root from 218.92.0.203 port 43058 ssh2
Dec 16 14:44:06 zeus sshd[15390]: Failed password for root from 218.92.0.203 port 43058 ssh2
Dec 16 14:45:51 zeus sshd[15438]: Failed password for root from 218.92.0.203 port 43202 ssh2
Dec 16 14:45:54 zeus sshd[15438]: Failed password for root from 218.92.0.203 port 43202 ssh2
2019-12-16 22:54:24
222.186.175.169 attackspam
Dec 16 16:02:23 meumeu sshd[13215]: Failed password for root from 222.186.175.169 port 14038 ssh2
Dec 16 16:02:26 meumeu sshd[13215]: Failed password for root from 222.186.175.169 port 14038 ssh2
Dec 16 16:02:38 meumeu sshd[13215]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 14038 ssh2 [preauth]
...
2019-12-16 23:03:49
42.112.51.75 attack
Unauthorized connection attempt from IP address 42.112.51.75 on Port 445(SMB)
2019-12-16 23:02:33
119.93.231.192 attackbots
Unauthorized connection attempt from IP address 119.93.231.192 on Port 445(SMB)
2019-12-16 23:11:32
27.117.163.21 attack
DATE:2019-12-16 15:45:37,IP:27.117.163.21,MATCHES:10,PORT:ssh
2019-12-16 23:20:42
66.172.100.3 attackbotsspam
Dec 16 16:07:16 localhost sshd\[28095\]: Invalid user moriah from 66.172.100.3 port 35380
Dec 16 16:07:16 localhost sshd\[28095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.172.100.3
Dec 16 16:07:18 localhost sshd\[28095\]: Failed password for invalid user moriah from 66.172.100.3 port 35380 ssh2
2019-12-16 23:16:58

最近上报的IP列表

11.92.106.103 11.90.195.33 11.93.43.47 11.90.56.227
11.91.98.24 11.91.250.7 11.90.150.83 11.91.97.114
11.90.225.125 11.90.150.78 11.90.209.194 11.90.150.90
11.90.150.77 11.90.157.246 11.93.91.155 11.92.152.98
11.90.251.93 11.91.22.134 11.90.184.69 11.91.73.119