必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Los Angeles

省份(region): California

国家(country): United States

运营商(isp): AT&T

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.150.74.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65020
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.150.74.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022602 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 10:50:22 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 106.74.150.12.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 106.74.150.12.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.36.150.105 attackspambots
Forbidden directory scan :: 2020/05/03 03:49:19 [error] 33379#33379: *1211814 access forbidden by rule, client: 54.36.150.105, server: [censored_1], request: "GET /crystal-reports/crystal-reports-run-and-email-report-using-crexport-and-blat/ HTTP/1.1", host: "www.[censored_1]"
2020-05-03 18:16:22
181.231.83.162 attack
May  3 12:07:48 pve1 sshd[1652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.231.83.162 
May  3 12:07:50 pve1 sshd[1652]: Failed password for invalid user vnc from 181.231.83.162 port 44133 ssh2
...
2020-05-03 18:18:51
94.140.114.17 attackbotsspam
[02/May/2020:11:35:31 -0400] "GET / HTTP/1.0" "Pandalytics/1.0 (https://domainsbot.com/pandalytics/)"
2020-05-03 18:07:19
162.243.139.215 attack
May  3 10:25:42 *** sshd[19554]: refused connect from 162.243.139.215 (=
162.243.139.215)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=162.243.139.215
2020-05-03 18:13:18
171.101.28.18 attackspam
Automatic report - XMLRPC Attack
2020-05-03 18:02:25
112.66.65.157 attackbots
[portscan] tcp/1433 [MsSQL]
[portscan] tcp/21 [FTP]
[scan/connect: 8 time(s)]
*(RWIN=65535)(05031108)
2020-05-03 17:54:22
157.245.105.149 attackbotsspam
SSH Brute Force
2020-05-03 18:22:04
181.143.186.235 attack
2020-05-03T05:02:38.5688041495-001 sshd[11723]: Invalid user zjy from 181.143.186.235 port 50038
2020-05-03T05:02:40.6624571495-001 sshd[11723]: Failed password for invalid user zjy from 181.143.186.235 port 50038 ssh2
2020-05-03T05:06:50.6083131495-001 sshd[11906]: Invalid user ftptest from 181.143.186.235 port 33144
2020-05-03T05:06:50.6114681495-001 sshd[11906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.186.235
2020-05-03T05:06:50.6083131495-001 sshd[11906]: Invalid user ftptest from 181.143.186.235 port 33144
2020-05-03T05:06:51.9656761495-001 sshd[11906]: Failed password for invalid user ftptest from 181.143.186.235 port 33144 ssh2
...
2020-05-03 18:15:25
117.50.40.36 attack
Invalid user vivian from 117.50.40.36 port 44512
2020-05-03 17:59:33
112.85.42.187 attackspam
May  3 03:49:40 raspberrypi sshd\[24649\]: Failed password for root from 112.85.42.187 port 36012 ssh2May  3 03:49:44 raspberrypi sshd\[24649\]: Failed password for root from 112.85.42.187 port 36012 ssh2May  3 03:49:45 raspberrypi sshd\[24649\]: Failed password for root from 112.85.42.187 port 36012 ssh2
...
2020-05-03 17:53:40
45.55.210.248 attackspam
May  3 12:01:54 ift sshd\[12583\]: Failed password for root from 45.55.210.248 port 54712 ssh2May  3 12:04:06 ift sshd\[12745\]: Failed password for root from 45.55.210.248 port 45193 ssh2May  3 12:06:18 ift sshd\[13200\]: Invalid user jun from 45.55.210.248May  3 12:06:20 ift sshd\[13200\]: Failed password for invalid user jun from 45.55.210.248 port 35674 ssh2May  3 12:08:38 ift sshd\[13519\]: Invalid user ota from 45.55.210.248
...
2020-05-03 17:42:07
150.95.81.40 attackbots
May  3 09:11:37 mellenthin sshd[8571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.81.40
May  3 09:11:39 mellenthin sshd[8571]: Failed password for invalid user administrador from 150.95.81.40 port 46004 ssh2
2020-05-03 18:04:22
101.231.124.6 attackspam
k+ssh-bruteforce
2020-05-03 18:21:09
159.89.46.73 attackspam
[portscan] udp/1900 [ssdp]
*(RWIN=-)(05031108)
2020-05-03 18:17:54
212.119.206.74 attack
May  3 07:47:22 sip sshd[90338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.119.206.74 
May  3 07:47:22 sip sshd[90338]: Invalid user mc from 212.119.206.74 port 46849
May  3 07:47:24 sip sshd[90338]: Failed password for invalid user mc from 212.119.206.74 port 46849 ssh2
...
2020-05-03 18:04:40

最近上报的IP列表

60.67.146.126 5.223.85.90 205.161.161.212 21.51.114.8
47.214.117.185 26.236.175.73 182.152.104.151 196.219.51.203
116.163.252.71 228.248.104.175 118.195.112.8 180.190.75.30
67.170.217.246 226.35.249.143 29.29.219.199 223.166.231.126
244.160.34.105 253.68.166.90 90.157.178.97 168.112.60.219