必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Utsunomiya

省份(region): Totigi (Tochigi)

国家(country): Japan

运营商(isp): KDDI Corporation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.106.134.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38605
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.106.134.157.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023042300 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 23 15:09:43 CST 2023
;; MSG SIZE  rcvd: 108
HOST信息:
157.134.106.121.in-addr.arpa domain name pointer KD121106134157.ppp-bb.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.134.106.121.in-addr.arpa	name = KD121106134157.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.84.182.203 attack
WordPress wp-login brute force :: 185.84.182.203 0.124 BYPASS [18/Oct/2019:06:53:40  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-18 04:14:32
106.12.33.80 attackspambots
Oct 15 21:34:03 penfold sshd[15355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.80  user=r.r
Oct 15 21:34:06 penfold sshd[15355]: Failed password for r.r from 106.12.33.80 port 34128 ssh2
Oct 15 21:34:06 penfold sshd[15355]: Received disconnect from 106.12.33.80 port 34128:11: Bye Bye [preauth]
Oct 15 21:34:06 penfold sshd[15355]: Disconnected from 106.12.33.80 port 34128 [preauth]
Oct 15 21:40:47 penfold sshd[15583]: Invalid user net from 106.12.33.80 port 50562
Oct 15 21:40:47 penfold sshd[15583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.80 
Oct 15 21:40:49 penfold sshd[15583]: Failed password for invalid user net from 106.12.33.80 port 50562 ssh2
Oct 15 21:40:49 penfold sshd[15583]: Received disconnect from 106.12.33.80 port 50562:11: Bye Bye [preauth]
Oct 15 21:40:49 penfold sshd[15583]: Disconnected from 106.12.33.80 port 50562 [preauth]


........
----------------------------------------------
2019-10-18 04:01:09
222.186.175.161 attackspam
SSH bruteforce
2019-10-18 04:13:17
183.6.105.243 attack
SSH Brute-Forcing (ownc)
2019-10-18 04:17:07
106.13.65.18 attackspambots
2019-10-17T19:47:22.983526abusebot-5.cloudsearch.cf sshd\[8837\]: Invalid user francesco from 106.13.65.18 port 60608
2019-10-18 03:48:06
222.186.173.142 attack
SSH brutforce
2019-10-18 03:45:47
148.70.250.207 attackbotsspam
Oct 17 22:11:39 dedicated sshd[14371]: Failed password for root from 148.70.250.207 port 36628 ssh2
Oct 17 22:11:36 dedicated sshd[14371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.250.207  user=root
Oct 17 22:11:39 dedicated sshd[14371]: Failed password for root from 148.70.250.207 port 36628 ssh2
Oct 17 22:16:15 dedicated sshd[14985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.250.207  user=root
Oct 17 22:16:16 dedicated sshd[14985]: Failed password for root from 148.70.250.207 port 55664 ssh2
2019-10-18 04:25:36
193.49.64.54 attackbots
Oct 16 01:56:08 cumulus sshd[4716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.49.64.54  user=r.r
Oct 16 01:56:10 cumulus sshd[4716]: Failed password for r.r from 193.49.64.54 port 52200 ssh2
Oct 16 01:56:10 cumulus sshd[4716]: Received disconnect from 193.49.64.54 port 52200:11: Bye Bye [preauth]
Oct 16 01:56:10 cumulus sshd[4716]: Disconnected from 193.49.64.54 port 52200 [preauth]
Oct 16 02:08:38 cumulus sshd[5064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.49.64.54  user=r.r
Oct 16 02:08:40 cumulus sshd[5064]: Failed password for r.r from 193.49.64.54 port 45550 ssh2
Oct 16 02:08:40 cumulus sshd[5064]: Received disconnect from 193.49.64.54 port 45550:11: Bye Bye [preauth]
Oct 16 02:08:40 cumulus sshd[5064]: Disconnected from 193.49.64.54 port 45550 [preauth]
Oct 16 02:12:12 cumulus sshd[5278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh r........
-------------------------------
2019-10-18 03:45:25
188.166.220.17 attackbotsspam
$f2bV_matches
2019-10-18 04:09:04
45.80.65.83 attackspambots
2019-10-17T19:53:52.496008abusebot-2.cloudsearch.cf sshd\[16727\]: Invalid user adajacobs123 from 45.80.65.83 port 39972
2019-10-18 04:05:50
192.95.53.5 attack
Oct 17 09:47:06 sachi sshd\[16614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sat.trix.hosting  user=root
Oct 17 09:47:07 sachi sshd\[16614\]: Failed password for root from 192.95.53.5 port 38086 ssh2
Oct 17 09:50:33 sachi sshd\[16894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sat.trix.hosting  user=root
Oct 17 09:50:35 sachi sshd\[16894\]: Failed password for root from 192.95.53.5 port 49086 ssh2
Oct 17 09:54:02 sachi sshd\[17158\]: Invalid user armaserver from 192.95.53.5
2019-10-18 03:56:31
103.247.13.222 attack
Oct 14 18:55:08 ghostname-secure sshd[29660]: reveeclipse mapping checking getaddrinfo for ip-222-13-247.terabhostname.net.id [103.247.13.222] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 18:55:08 ghostname-secure sshd[29660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.247.13.222  user=r.r
Oct 14 18:55:10 ghostname-secure sshd[29660]: Failed password for r.r from 103.247.13.222 port 39170 ssh2
Oct 14 18:55:10 ghostname-secure sshd[29660]: Received disconnect from 103.247.13.222: 11: Bye Bye [preauth]
Oct 14 19:07:16 ghostname-secure sshd[29881]: reveeclipse mapping checking getaddrinfo for ip-222-13-247.terabhostname.net.id [103.247.13.222] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 14 19:07:16 ghostname-secure sshd[29881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.247.13.222  user=r.r
Oct 14 19:07:18 ghostname-secure sshd[29881]: Failed password for r.r from 103.247.13.222 por........
-------------------------------
2019-10-18 03:47:20
103.5.134.39 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-10-18 03:57:45
212.156.115.58 attack
2019-10-17T19:53:33.978346abusebot-2.cloudsearch.cf sshd\[16722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.115.58  user=root
2019-10-18 04:20:42
220.168.85.66 attack
10/17/2019-21:53:38.348004 220.168.85.66 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-18 04:16:22

最近上报的IP列表

119.246.226.165 68.1.15.255 62.18.92.20 92.63.196.24
111.0.23.0 144.191.13.22 115.207.169.117 101.159.120.154
90.158.227.22 21.193.174.211 210.219.253.249 124.200.27.98
236.39.218.160 109.75.234.237 43.229.231.4 240e:388:2d03:1900:bdd2:91f2:aff:e12c
232.6.181.75 138.199.9.104 143.30.160.154 47.33.130.124