必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.213.135.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.213.135.106.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 13:58:11 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
106.135.213.126.in-addr.arpa domain name pointer ai126213135106.77.access-internet.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.135.213.126.in-addr.arpa	name = ai126213135106.77.access-internet.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.16.136.26 attack
Unauthorized connection attempt from IP address 61.16.136.26 on Port 445(SMB)
2019-07-08 03:35:35
167.250.217.224 attackbotsspam
SMTP-sasl brute force
...
2019-07-08 03:05:03
185.148.243.162 attack
Brute force attempt
2019-07-08 03:18:23
115.42.64.136 attackspambots
TCP port 25 (SMTP) attempt blocked by hMailServer IP-check. Country not allowed to use this service.
2019-07-08 03:04:33
103.114.106.181 attack
Jul  7 20:32:47 lcl-usvr-01 sshd[20318]: Invalid user ftp from 103.114.106.181
2019-07-08 03:25:14
146.185.175.132 attack
Jul  7 11:58:49 server sshd\[46582\]: Invalid user admin from 146.185.175.132
Jul  7 11:58:49 server sshd\[46582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.175.132
Jul  7 11:58:51 server sshd\[46582\]: Failed password for invalid user admin from 146.185.175.132 port 50610 ssh2
...
2019-07-08 03:26:35
194.230.189.151 attackspam
''
2019-07-08 03:24:10
2.187.37.9 attackbotsspam
[portscan] Port scan
2019-07-08 03:11:08
198.20.175.131 attackspambots
[portscan] Port scan
2019-07-08 03:02:48
184.154.74.66 attackspam
port scan and connect, tcp 3128 (squid-http)
2019-07-08 02:58:33
129.213.97.191 attackspam
2019-07-07T16:06:23.332333scmdmz1 sshd\[2569\]: Invalid user angel from 129.213.97.191 port 53328
2019-07-07T16:06:23.336370scmdmz1 sshd\[2569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.97.191
2019-07-07T16:06:25.296054scmdmz1 sshd\[2569\]: Failed password for invalid user angel from 129.213.97.191 port 53328 ssh2
...
2019-07-08 03:17:13
201.150.90.94 attackspam
SMTP-sasl brute force
...
2019-07-08 03:02:13
191.53.221.226 attack
Brute force attempt
2019-07-08 03:28:18
97.77.253.106 attack
Unauthorized connection attempt from IP address 97.77.253.106 on Port 445(SMB)
2019-07-08 03:40:32
189.56.82.108 attackspam
Unauthorized connection attempt from IP address 189.56.82.108 on Port 445(SMB)
2019-07-08 03:31:14

最近上报的IP列表

148.188.122.211 82.178.246.35 51.187.204.131 14.124.253.70
129.83.34.126 127.199.211.226 103.29.163.63 172.119.255.222
141.30.115.116 70.2.113.152 145.44.105.74 164.24.130.184
92.69.199.123 22.59.201.160 235.95.79.139 227.77.208.12
189.198.100.58 247.117.94.8 44.52.223.42 170.186.5.77