必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.106.130.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7342
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.106.130.217.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 15:27:14 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
217.130.106.126.in-addr.arpa domain name pointer softbank126106130217.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
217.130.106.126.in-addr.arpa	name = softbank126106130217.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
137.74.115.225 attack
Aug 19 19:35:03 sachi sshd\[21128\]: Invalid user kondor from 137.74.115.225
Aug 19 19:35:03 sachi sshd\[21128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=225.ip-137-74-115.eu
Aug 19 19:35:05 sachi sshd\[21128\]: Failed password for invalid user kondor from 137.74.115.225 port 36282 ssh2
Aug 19 19:39:58 sachi sshd\[21692\]: Invalid user joshua from 137.74.115.225
Aug 19 19:39:58 sachi sshd\[21692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=225.ip-137-74-115.eu
2019-08-20 13:55:30
51.158.20.43 attackbots
5061/udp 5062/udp 5063/udp...
[2019-08-03/19]115pkt,31pt.(udp)
2019-08-20 14:08:39
178.128.156.144 attackbotsspam
Invalid user test from 178.128.156.144 port 55996
2019-08-20 13:57:17
49.234.13.249 attack
Automatic report - Banned IP Access
2019-08-20 13:14:55
185.173.35.57 attackbotsspam
firewall-block, port(s): 5222/tcp
2019-08-20 13:25:36
13.79.27.218 attackbots
Automatic report - Banned IP Access
2019-08-20 13:12:29
204.110.11.135 attack
Aug 20 08:22:11 server sshd\[26797\]: Invalid user corky from 204.110.11.135 port 37907
Aug 20 08:22:11 server sshd\[26797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.110.11.135
Aug 20 08:22:13 server sshd\[26797\]: Failed password for invalid user corky from 204.110.11.135 port 37907 ssh2
Aug 20 08:25:45 server sshd\[943\]: Invalid user charleene from 204.110.11.135 port 54798
Aug 20 08:25:45 server sshd\[943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.110.11.135
2019-08-20 13:39:15
178.33.236.23 attack
Aug 19 18:52:29 kapalua sshd\[10616\]: Invalid user ftpserver from 178.33.236.23
Aug 19 18:52:29 kapalua sshd\[10616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns328667.ip-178-33-236.eu
Aug 19 18:52:32 kapalua sshd\[10616\]: Failed password for invalid user ftpserver from 178.33.236.23 port 34870 ssh2
Aug 19 18:56:20 kapalua sshd\[10971\]: Invalid user dasusr from 178.33.236.23
Aug 19 18:56:20 kapalua sshd\[10971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns328667.ip-178-33-236.eu
2019-08-20 13:11:55
200.165.167.10 attackbotsspam
Aug 19 18:51:31 hiderm sshd\[7031\]: Invalid user avendoria from 200.165.167.10
Aug 19 18:51:31 hiderm sshd\[7031\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.165.167.10
Aug 19 18:51:33 hiderm sshd\[7031\]: Failed password for invalid user avendoria from 200.165.167.10 port 50268 ssh2
Aug 19 18:56:47 hiderm sshd\[7526\]: Invalid user alice from 200.165.167.10
Aug 19 18:56:47 hiderm sshd\[7526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.165.167.10
2019-08-20 13:50:24
115.94.38.82 attackspam
Aug 20 08:03:08 jane sshd\[31554\]: Invalid user zimbra from 115.94.38.82 port 54799
Aug 20 08:03:08 jane sshd\[31554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.94.38.82
Aug 20 08:03:11 jane sshd\[31554\]: Failed password for invalid user zimbra from 115.94.38.82 port 54799 ssh2
...
2019-08-20 14:15:18
45.227.253.114 attackbots
Aug 20 06:40:38 mailserver postfix/anvil[74486]: statistics: max connection rate 2/60s for (smtps:45.227.253.114) at Aug 20 06:39:19
Aug 20 07:47:57 mailserver postfix/smtps/smtpd[74932]: warning: hostname hosting-by.directwebhost.org does not resolve to address 45.227.253.114: hostname nor servname provided, or not known
Aug 20 07:47:57 mailserver postfix/smtps/smtpd[74932]: connect from unknown[45.227.253.114]
Aug 20 07:48:00 mailserver dovecot: auth-worker(74934): sql([hidden],45.227.253.114): Password mismatch
Aug 20 07:48:02 mailserver postfix/smtps/smtpd[74932]: warning: unknown[45.227.253.114]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 07:48:02 mailserver postfix/smtps/smtpd[74932]: lost connection after AUTH from unknown[45.227.253.114]
Aug 20 07:48:02 mailserver postfix/smtps/smtpd[74932]: disconnect from unknown[45.227.253.114]
Aug 20 07:48:02 mailserver postfix/smtps/smtpd[74932]: warning: hostname hosting-by.directwebhost.org does not resolve to address 45.227.253.114: hostname nor ser
2019-08-20 13:51:36
41.230.201.73 attackspambots
23/tcp
[2019-08-20]1pkt
2019-08-20 13:47:15
103.45.111.217 attackspambots
Aug 19 20:05:18 sachi sshd\[24157\]: Invalid user max from 103.45.111.217
Aug 19 20:05:18 sachi sshd\[24157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.111.217
Aug 19 20:05:20 sachi sshd\[24157\]: Failed password for invalid user max from 103.45.111.217 port 41408 ssh2
Aug 19 20:09:17 sachi sshd\[24776\]: Invalid user slib from 103.45.111.217
Aug 19 20:09:17 sachi sshd\[24776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.45.111.217
2019-08-20 14:13:19
40.73.25.111 attack
Aug 20 05:04:05 hcbbdb sshd\[13261\]: Invalid user postgres from 40.73.25.111
Aug 20 05:04:05 hcbbdb sshd\[13261\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.25.111
Aug 20 05:04:08 hcbbdb sshd\[13261\]: Failed password for invalid user postgres from 40.73.25.111 port 47274 ssh2
Aug 20 05:08:58 hcbbdb sshd\[13898\]: Invalid user edu from 40.73.25.111
Aug 20 05:08:58 hcbbdb sshd\[13898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.25.111
2019-08-20 13:22:52
142.234.39.37 attack
08/20/2019-01:10:24.897464 142.234.39.37 Protocol: 6 ET SCAN Potential SSH Scan
2019-08-20 13:11:35

最近上报的IP列表

224.6.161.127 3.176.81.247 26.133.71.143 68.202.141.35
201.132.1.240 128.32.17.226 138.14.112.196 159.31.166.170
128.119.113.156 2.213.181.28 253.99.143.251 98.185.1.111
251.245.170.11 28.251.230.248 252.151.29.139 39.8.173.57
109.225.178.41 79.181.88.134 246.27.107.134 49.195.66.143