必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.31.106.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.31.106.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 02:02:06 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 106.106.31.121.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 121.31.106.106.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
196.52.84.54 attackspam
hacking into my Netflix account
2020-05-15 03:07:15
154.232.32.248 attack
May 14 14:15:31 mxgate1 postfix/postscreen[6656]: CONNECT from [154.232.32.248]:36040 to [176.31.12.44]:25
May 14 14:15:31 mxgate1 postfix/dnsblog[6660]: addr 154.232.32.248 listed by domain zen.spamhaus.org as 127.0.0.11
May 14 14:15:31 mxgate1 postfix/dnsblog[6660]: addr 154.232.32.248 listed by domain zen.spamhaus.org as 127.0.0.4
May 14 14:15:31 mxgate1 postfix/dnsblog[6660]: addr 154.232.32.248 listed by domain zen.spamhaus.org as 127.0.0.3
May 14 14:15:31 mxgate1 postfix/dnsblog[6661]: addr 154.232.32.248 listed by domain cbl.abuseat.org as 127.0.0.2
May 14 14:15:31 mxgate1 postfix/dnsblog[6659]: addr 154.232.32.248 listed by domain bl.spamcop.net as 127.0.0.2
May 14 14:15:31 mxgate1 postfix/dnsblog[6658]: addr 154.232.32.248 listed by domain b.barracudacentral.org as 127.0.0.2
May 14 14:15:31 mxgate1 postfix/dnsblog[6657]: addr 154.232.32.248 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
May 14 14:15:37 mxgate1 postfix/postscreen[6656]: DNSBL rank 6 for [154.........
-------------------------------
2020-05-15 03:08:44
78.85.219.107 attackspambots
20/5/14@11:24:50: FAIL: Alarm-Network address from=78.85.219.107
20/5/14@11:24:50: FAIL: Alarm-Network address from=78.85.219.107
...
2020-05-15 03:05:51
157.245.233.164 attackbots
157.245.233.164 - - [14/May/2020:14:20:48 +0200] "GET /wp-login.php HTTP/1.1" 200 6539 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.233.164 - - [14/May/2020:14:20:50 +0200] "POST /wp-login.php HTTP/1.1" 200 6790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.233.164 - - [14/May/2020:14:20:51 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-15 03:39:16
157.100.246.106 attack
May 14 08:18:25 cumulus sshd[18421]: Did not receive identification string from 157.100.246.106 port 36716
May 14 08:18:25 cumulus sshd[18422]: Did not receive identification string from 157.100.246.106 port 60103
May 14 08:18:27 cumulus sshd[18424]: Did not receive identification string from 157.100.246.106 port 60124
May 14 08:18:27 cumulus sshd[18423]: Did not receive identification string from 157.100.246.106 port 36765
May 14 08:18:27 cumulus sshd[18426]: Did not receive identification string from 157.100.246.106 port 36771
May 14 08:18:27 cumulus sshd[18425]: Did not receive identification string from 157.100.246.106 port 60121
May 14 08:18:27 cumulus sshd[18427]: Did not receive identification string from 157.100.246.106 port 60120
May 14 08:18:28 cumulus sshd[18428]: Invalid user nagesh from 157.100.246.106 port 60135
May 14 08:18:28 cumulus sshd[18429]: Invalid user nagesh from 157.100.246.106 port 60137
May 14 08:18:28 cumulus sshd[18428]: pam_unix(sshd:auth):........
-------------------------------
2020-05-15 03:31:56
89.204.153.131 attack
[MK-VM1] Blocked by UFW
2020-05-15 03:24:55
128.199.180.63 attackbots
$f2bV_matches
2020-05-15 03:31:32
170.106.38.8 attack
14-5-2020 14:16:30	Unauthorized connection attempt (Brute-Force).
14-5-2020 14:16:30	Connection from IP address: 170.106.38.8 on port: 465


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=170.106.38.8
2020-05-15 03:14:08
203.192.204.168 attackbotsspam
2020-05-14T20:33:13.847508  sshd[24323]: Invalid user namespace from 203.192.204.168 port 46014
2020-05-14T20:33:13.862650  sshd[24323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.192.204.168
2020-05-14T20:33:13.847508  sshd[24323]: Invalid user namespace from 203.192.204.168 port 46014
2020-05-14T20:33:15.858974  sshd[24323]: Failed password for invalid user namespace from 203.192.204.168 port 46014 ssh2
...
2020-05-15 03:07:32
113.87.145.238 attack
(ftpd) Failed FTP login from 113.87.145.238 (CN/China/-): 10 in the last 3600 secs
2020-05-15 03:32:26
123.207.78.83 attack
May 14 20:40:36 vpn01 sshd[27004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.78.83
May 14 20:40:38 vpn01 sshd[27004]: Failed password for invalid user mo from 123.207.78.83 port 37380 ssh2
...
2020-05-15 03:18:38
178.128.144.227 attackspambots
May 14 18:05:15 mail sshd[10754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227  user=ftp
May 14 18:05:16 mail sshd[10754]: Failed password for ftp from 178.128.144.227 port 37768 ssh2
...
2020-05-15 03:12:42
59.90.28.195 attackspam
May 14 14:17:15 vbuntu sshd[25305]: refused connect from 59.90.28.195 (59.90.28.195)
May 14 14:17:17 vbuntu sshd[25306]: refused connect from 59.90.28.195 (59.90.28.195)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=59.90.28.195
2020-05-15 03:21:51
180.244.235.49 attackspambots
SSH bruteforce more then 50 syn to 22 port per 10 seconds.
2020-05-15 03:08:59
193.70.13.25 attack
WEB_SERVER 403 Forbidden
2020-05-15 03:20:11

最近上报的IP列表

149.120.193.17 248.181.96.96 116.157.135.239 21.42.3.77
235.14.0.119 154.38.24.64 230.138.254.20 39.54.153.84
145.236.65.234 174.232.226.225 214.228.154.208 169.150.39.136
137.175.12.107 176.174.100.184 122.11.3.180 50.167.161.60
211.135.210.122 119.220.242.241 60.78.161.244 55.216.171.124