必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Brazil

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.161.9.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32181
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.161.9.106.			IN	A

;; AUTHORITY SECTION:
.			475	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062801 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 29 13:30:08 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
106.9.161.131.in-addr.arpa domain name pointer dynamic-131-161-9-106.gptelecomprovedor.net.br.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.9.161.131.in-addr.arpa	name = dynamic-131-161-9-106.gptelecomprovedor.net.br.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
165.227.225.195 attack
Jun 18 09:37:46 NPSTNNYC01T sshd[18878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.225.195
Jun 18 09:37:48 NPSTNNYC01T sshd[18878]: Failed password for invalid user user from 165.227.225.195 port 42414 ssh2
Jun 18 09:41:07 NPSTNNYC01T sshd[19189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.225.195
...
2020-06-19 03:14:26
186.250.200.93 attack
Jun 18 10:36:47 mail.srvfarm.net postfix/smtps/smtpd[1392804]: warning: unknown[186.250.200.93]: SASL PLAIN authentication failed: 
Jun 18 10:36:47 mail.srvfarm.net postfix/smtps/smtpd[1392804]: lost connection after AUTH from unknown[186.250.200.93]
Jun 18 10:42:37 mail.srvfarm.net postfix/smtps/smtpd[1393813]: warning: unknown[186.250.200.93]: SASL PLAIN authentication failed: 
Jun 18 10:42:38 mail.srvfarm.net postfix/smtps/smtpd[1393813]: lost connection after AUTH from unknown[186.250.200.93]
Jun 18 10:45:03 mail.srvfarm.net postfix/smtpd[1388354]: warning: unknown[186.250.200.93]: SASL PLAIN authentication failed:
2020-06-19 03:40:16
197.240.156.178 attackbotsspam
Jun  6 14:39:23 mercury wordpress(www.learnargentinianspanish.com)[27909]: XML-RPC authentication failure for josh from 197.240.156.178
...
2020-06-19 03:38:51
179.125.63.70 attackbotsspam
Jun 18 11:10:54 mail.srvfarm.net postfix/smtps/smtpd[1421519]: warning: unknown[179.125.63.70]: SASL PLAIN authentication failed: 
Jun 18 11:10:55 mail.srvfarm.net postfix/smtps/smtpd[1421519]: lost connection after AUTH from unknown[179.125.63.70]
Jun 18 11:12:41 mail.srvfarm.net postfix/smtps/smtpd[1423172]: warning: unknown[179.125.63.70]: SASL PLAIN authentication failed: 
Jun 18 11:12:41 mail.srvfarm.net postfix/smtps/smtpd[1423172]: lost connection after AUTH from unknown[179.125.63.70]
Jun 18 11:18:01 mail.srvfarm.net postfix/smtpd[1424198]: warning: unknown[179.125.63.70]: SASL PLAIN authentication failed:
2020-06-19 03:35:27
190.181.91.31 attackspambots
Jun 18 11:05:59 mail.srvfarm.net postfix/smtpd[1409123]: warning: unknown[190.181.91.31]: SASL PLAIN authentication failed: 
Jun 18 11:06:00 mail.srvfarm.net postfix/smtpd[1409123]: lost connection after AUTH from unknown[190.181.91.31]
Jun 18 11:09:45 mail.srvfarm.net postfix/smtpd[1409762]: warning: unknown[190.181.91.31]: SASL PLAIN authentication failed: 
Jun 18 11:09:46 mail.srvfarm.net postfix/smtpd[1409762]: lost connection after AUTH from unknown[190.181.91.31]
Jun 18 11:14:58 mail.srvfarm.net postfix/smtps/smtpd[1409843]: warning: unknown[190.181.91.31]: SASL PLAIN authentication failed:
2020-06-19 03:33:14
203.205.195.86 attackbotsspam
Jun 18 10:40:09 mail.srvfarm.net postfix/smtpd[1388903]: lost connection after RCPT from smtpbg701.qq.com[203.205.195.86]
Jun 18 10:41:08 mail.srvfarm.net postfix/smtpd[1387945]: lost connection after RCPT from smtpbg701.qq.com[203.205.195.86]
Jun 18 10:47:49 mail.srvfarm.net postfix/smtpd[1388275]: lost connection after RCPT from smtpbg701.qq.com[203.205.195.86]
Jun 18 10:48:04 mail.srvfarm.net postfix/smtpd[1395544]: lost connection after NOOP from smtpbg701.qq.com[203.205.195.86]
Jun 18 10:48:20 mail.srvfarm.net postfix/smtpd[1395521]: lost connection after RCPT from smtpbg701.qq.com[203.205.195.86]
2020-06-19 03:38:33
49.246.3.250 attack
[Sun Jan 19 21:30:43.411265 2020] [access_compat:error] [pid 7909] [client 49.246.3.250:35450] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2020-06-19 03:14:58
220.130.10.13 attackspambots
2020-06-18T13:12:49.1752461495-001 sshd[51409]: Failed password for invalid user bcd from 220.130.10.13 port 46586 ssh2
2020-06-18T13:31:59.4606521495-001 sshd[52517]: Invalid user postgres from 220.130.10.13 port 48470
2020-06-18T13:31:59.4644091495-001 sshd[52517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-130-10-13.hinet-ip.hinet.net
2020-06-18T13:31:59.4606521495-001 sshd[52517]: Invalid user postgres from 220.130.10.13 port 48470
2020-06-18T13:32:01.6173361495-001 sshd[52517]: Failed password for invalid user postgres from 220.130.10.13 port 48470 ssh2
2020-06-18T13:40:11.6245171495-001 sshd[53014]: Invalid user wzy from 220.130.10.13 port 41098
...
2020-06-19 03:28:13
49.235.83.106 attack
[Tue Dec 10 00:07:35.418765 2019] [access_compat:error] [pid 22626] [client 49.235.83.106:52991] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2020-06-19 03:16:47
89.162.145.131 attackbotsspam
Unauthorized connection attempt from IP address 89.162.145.131 on Port 445(SMB)
2020-06-19 03:53:39
14.29.165.173 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 8 - port: 21266 proto: TCP cat: Misc Attack
2020-06-19 03:13:07
124.196.16.75 attack
Jun 18 13:49:12 ZTCN001 sshd[159548]: Invalid user user1 from 124.196.16.75 port 36492
Jun 18 13:49:12 ZTCN001 sshd[159548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.196.16.75 
Jun 18 13:49:12 ZTCN001 sshd[159548]: Invalid user user1 from 124.196.16.75 port 36492
Jun 18 13:49:15 ZTCN001 sshd[159548]: Failed password for invalid user user1 from 124.196.16.75 port 36492 ssh2
Jun 18 13:51:34 ZTCN001 sshd[159583]: Invalid user vlc from 124.196.16.75 port 57160


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=124.196.16.75
2020-06-19 03:46:30
47.75.126.75 attackbots
[Mon Jan 06 06:22:05.221054 2020] [access_compat:error] [pid 2641] [client 47.75.126.75:52048] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php, referer: http://lukegirvin.co.uk/wp-login.php
...
2020-06-19 03:48:20
198.177.121.2 attackbotsspam
Apr 26 14:06:35 mercury wordpress(lukegirvin.co.uk)[9629]: XML-RPC authentication failure for luke from 198.177.121.2
...
2020-06-19 03:19:34
130.61.61.82 attackspam
2020-04-20T06:37:31.565Z CLOSE host=130.61.61.82 port=39688 fd=4 time=30.028 bytes=51
...
2020-06-19 03:23:18

最近上报的IP列表

188.166.222.236 189.204.35.82 200.125.171.61 186.106.176.231
186.44.216.247 186.192.177.226 136.175.177.213 180.44.139.78
187.152.144.191 41.215.211.112 45.9.231.150 45.189.252.193
138.186.31.76 176.56.107.80 45.5.58.62 85.14.112.37
169.229.220.165 169.229.245.224 185.242.106.183 169.229.254.126