必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.106.135.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46064
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.106.135.106.		IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:41:39 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 106.135.106.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.135.106.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.224.93.209 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-18 04:01:42
83.97.20.49 attackbots
11/17/2019-20:25:36.847990 83.97.20.49 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-18 03:31:53
101.89.145.133 attackbotsspam
2019-11-17T15:40:07.028803abusebot-8.cloudsearch.cf sshd\[24167\]: Invalid user home from 101.89.145.133 port 47734
2019-11-18 03:44:57
183.250.204.18 attack
Nov 17 09:52:02 TORMINT sshd\[15943\]: Invalid user password12345678 from 183.250.204.18
Nov 17 09:52:02 TORMINT sshd\[15943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.250.204.18
Nov 17 09:52:04 TORMINT sshd\[15943\]: Failed password for invalid user password12345678 from 183.250.204.18 port 47230 ssh2
...
2019-11-18 03:54:49
43.230.159.194 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-18 03:51:07
121.226.84.1 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/121.226.84.1/ 
 
 CN - 1H : (740)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 121.226.84.1 
 
 CIDR : 121.226.0.0/17 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 ATTACKS DETECTED ASN4134 :  
  1H - 22 
  3H - 58 
  6H - 90 
 12H - 185 
 24H - 318 
 
 DateTime : 2019-11-17 15:39:33 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-18 03:30:06
185.94.111.1 attackbots
17.11.2019 19:45:47 Connection to port 19 blocked by firewall
2019-11-18 03:58:36
42.227.179.166 attackbotsspam
Fail2Ban Ban Triggered
2019-11-18 04:05:00
202.107.238.94 attackspam
$f2bV_matches
2019-11-18 03:51:42
218.24.45.75 attack
218.24.45.75 was recorded 5 times by 5 hosts attempting to connect to the following ports: 8080. Incident counter (4h, 24h, all-time): 5, 5, 156
2019-11-18 03:31:14
195.154.136.224 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: 195-154-136-224.rev.poneytelecom.eu.
2019-11-18 03:39:35
189.71.10.73 attackbotsspam
Automatic report - Port Scan Attack
2019-11-18 04:04:39
178.128.123.111 attackspambots
Nov 17 14:19:32 vtv3 sshd\[2097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.123.111  user=backup
Nov 17 14:19:34 vtv3 sshd\[2097\]: Failed password for backup from 178.128.123.111 port 56288 ssh2
Nov 17 14:23:27 vtv3 sshd\[3153\]: Invalid user lisa from 178.128.123.111 port 37354
Nov 17 14:23:27 vtv3 sshd\[3153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.123.111
Nov 17 14:23:29 vtv3 sshd\[3153\]: Failed password for invalid user lisa from 178.128.123.111 port 37354 ssh2
Nov 17 14:36:44 vtv3 sshd\[6559\]: Invalid user hubbell from 178.128.123.111 port 37032
Nov 17 14:36:44 vtv3 sshd\[6559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.123.111
Nov 17 14:36:46 vtv3 sshd\[6559\]: Failed password for invalid user hubbell from 178.128.123.111 port 37032 ssh2
Nov 17 14:40:58 vtv3 sshd\[7648\]: Invalid user fortunata from 178.128.123.111 port 46336
2019-11-18 03:33:38
162.144.120.123 attack
[munged]::443 162.144.120.123 - - [17/Nov/2019:20:35:18 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.144.120.123 - - [17/Nov/2019:20:35:22 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.144.120.123 - - [17/Nov/2019:20:35:26 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.144.120.123 - - [17/Nov/2019:20:35:28 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.144.120.123 - - [17/Nov/2019:20:35:31 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 162.144.120.123 - - [17/Nov/2019:20:35:34 +0100] "POST /[munged]: HTTP/1.1" 200 9079 "-" "Mozilla/5.
2019-11-18 04:07:18
138.197.89.186 attackspambots
2019-11-17T19:27:47.088917abusebot-7.cloudsearch.cf sshd\[15840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.186  user=operator
2019-11-18 03:37:29

最近上报的IP列表

113.254.143.11 114.106.135.122 114.106.135.134 114.106.135.138
114.106.135.144 114.106.135.141 114.106.135.15 114.106.135.147
114.106.135.152 114.106.135.160 114.106.135.157 114.106.135.150
114.106.135.162 113.254.147.35 114.106.135.165 114.106.135.172
114.106.135.174 114.106.135.179 114.106.135.177 114.106.135.18