必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kasuga

省份(region): Ōsaka

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.207.106.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43787
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;126.207.106.108.		IN	A

;; AUTHORITY SECTION:
.			175	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032102 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 22 07:00:36 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
108.106.207.126.in-addr.arpa domain name pointer softbank126207106108.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.106.207.126.in-addr.arpa	name = softbank126207106108.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.39.56 attackspambots
2020-08-19T23:51:57.815052linuxbox-skyline sshd[6746]: Invalid user le from 106.13.39.56 port 49744
...
2020-08-20 15:35:20
106.52.22.64 attack
Aug 20 08:30:05 pkdns2 sshd\[7513\]: Invalid user operatore from 106.52.22.64Aug 20 08:30:07 pkdns2 sshd\[7513\]: Failed password for invalid user operatore from 106.52.22.64 port 57702 ssh2Aug 20 08:33:55 pkdns2 sshd\[7654\]: Invalid user user2 from 106.52.22.64Aug 20 08:33:57 pkdns2 sshd\[7654\]: Failed password for invalid user user2 from 106.52.22.64 port 41970 ssh2Aug 20 08:37:37 pkdns2 sshd\[7841\]: Invalid user nancy from 106.52.22.64Aug 20 08:37:39 pkdns2 sshd\[7841\]: Failed password for invalid user nancy from 106.52.22.64 port 54468 ssh2
...
2020-08-20 15:28:05
203.195.132.128 attackbotsspam
Aug 20 04:18:38 game-panel sshd[13245]: Failed password for root from 203.195.132.128 port 55202 ssh2
Aug 20 04:23:52 game-panel sshd[13521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.132.128
Aug 20 04:23:54 game-panel sshd[13521]: Failed password for invalid user edgar from 203.195.132.128 port 53206 ssh2
2020-08-20 15:00:25
164.132.38.166 attackspambots
164.132.38.166 - - [20/Aug/2020:07:31:00 +0100] "POST /wp-login.php HTTP/1.1" 200 2604 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.38.166 - - [20/Aug/2020:07:31:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2580 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
164.132.38.166 - - [20/Aug/2020:07:31:01 +0100] "POST /wp-login.php HTTP/1.1" 200 2577 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-20 14:59:50
218.78.46.81 attackbotsspam
Aug 20 08:25:43 cho sshd[1121387]: Invalid user todd from 218.78.46.81 port 48639
Aug 20 08:25:43 cho sshd[1121387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81 
Aug 20 08:25:43 cho sshd[1121387]: Invalid user todd from 218.78.46.81 port 48639
Aug 20 08:25:45 cho sshd[1121387]: Failed password for invalid user todd from 218.78.46.81 port 48639 ssh2
Aug 20 08:29:57 cho sshd[1121724]: Invalid user laura from 218.78.46.81 port 40896
...
2020-08-20 15:22:59
49.88.112.115 attackspam
Aug 20 03:52:28 *** sshd[1839]: User root from 49.88.112.115 not allowed because not listed in AllowUsers
2020-08-20 15:05:41
181.94.140.145 attackspam
Automatic report - Port Scan Attack
2020-08-20 15:16:41
180.76.108.73 attackbots
Invalid user teamspeak from 180.76.108.73 port 54850
2020-08-20 15:37:56
164.100.145.27 attackspambots
Automatic report - WordPress Brute Force
2020-08-20 15:00:05
103.153.174.8 attackspambots
Bruteforce detected by fail2ban
2020-08-20 15:06:37
104.131.12.67 attack
104.131.12.67 - - [20/Aug/2020:08:10:14 +0200] "GET /wp-login.php HTTP/1.1" 200 8775 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.131.12.67 - - [20/Aug/2020:08:10:15 +0200] "POST /wp-login.php HTTP/1.1" 200 9092 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
104.131.12.67 - - [20/Aug/2020:08:10:16 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-20 15:09:18
159.203.85.196 attackspam
Aug 20 08:37:36 fhem-rasp sshd[24093]: User git from 159.203.85.196 not allowed because not listed in AllowUsers
...
2020-08-20 14:57:47
221.202.193.65 attackbotsspam
Port probing on unauthorized port 23
2020-08-20 15:21:29
220.176.204.91 attack
Aug 20 08:56:45 ip106 sshd[5805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91 
Aug 20 08:56:46 ip106 sshd[5805]: Failed password for invalid user admin123 from 220.176.204.91 port 22396 ssh2
...
2020-08-20 15:11:49
136.243.72.5 attack
Aug 20 08:53:47 relay postfix/smtpd\[3850\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[1582\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[3812\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[2132\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[3293\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[1593\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[2724\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 08:53:47 relay postfix/smtpd\[2258\]: warning: mon.riss
...
2020-08-20 15:07:34

最近上报的IP列表

62.221.77.213 117.227.8.112 54.206.12.232 180.218.105.177
63.168.182.180 101.228.250.204 116.117.219.190 150.243.242.35
179.88.220.97 108.28.213.117 92.137.203.40 181.236.122.247
179.125.81.202 212.36.65.24 83.196.64.33 124.191.121.126
188.106.88.202 131.91.13.109 163.53.205.110 37.29.146.51