必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Mendham

省份(region): New Jersey

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.6.106.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.6.106.206.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 08:10:43 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 206.106.6.134.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 134.6.106.206.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.97.116.222 attack
Sep 13 21:55:59 hosting sshd[27810]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.97.116.222  user=root
Sep 13 21:56:01 hosting sshd[27810]: Failed password for root from 185.97.116.222 port 57958 ssh2
...
2020-09-14 05:29:26
192.99.11.223 attackspam
[munged]::443 192.99.11.223 - - [13/Sep/2020:20:22:49 +0200] "POST /[munged]: HTTP/1.1" 200 9199 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 192.99.11.223 - - [13/Sep/2020:20:22:51 +0200] "POST /[munged]: HTTP/1.1" 200 9199 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 192.99.11.223 - - [13/Sep/2020:20:22:52 +0200] "POST /[munged]: HTTP/1.1" 200 9199 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 192.99.11.223 - - [13/Sep/2020:20:22:53 +0200] "POST /[munged]: HTTP/1.1" 200 9199 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 192.99.11.223 - - [13/Sep/2020:20:22:54 +0200] "POST /[munged]: HTTP/1.1" 200 9199 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 192.99.11.223 - - [13/Sep/2020:20:22:56 +0200] "POST /[munged]: HTTP/1.1" 200 9199 "-" "Mozilla/5.0 (X11; Ubun
2020-09-14 05:34:28
125.16.205.18 attackspambots
Sep 13 20:01:21 santamaria sshd\[1952\]: Invalid user alec from 125.16.205.18
Sep 13 20:01:21 santamaria sshd\[1952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.16.205.18
Sep 13 20:01:23 santamaria sshd\[1952\]: Failed password for invalid user alec from 125.16.205.18 port 34482 ssh2
...
2020-09-14 05:24:45
68.183.64.174 attackspam
68.183.64.174 - - [13/Sep/2020:19:10:34 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.64.174 - - [13/Sep/2020:19:10:36 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.64.174 - - [13/Sep/2020:19:10:37 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-14 05:23:45
191.242.217.110 attackbots
Sep 13 21:45:42 ncomp sshd[21995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.242.217.110  user=root
Sep 13 21:45:44 ncomp sshd[21995]: Failed password for root from 191.242.217.110 port 49484 ssh2
Sep 13 21:53:38 ncomp sshd[22145]: Invalid user viki from 191.242.217.110 port 39848
2020-09-14 05:24:18
176.31.182.125 attack
Sep 13 19:00:28 vps333114 sshd[28449]: Failed password for root from 176.31.182.125 port 37066 ssh2
Sep 13 19:04:35 vps333114 sshd[28538]: Invalid user richetti from 176.31.182.125
...
2020-09-14 05:14:55
119.45.199.173 attackbotsspam
20 attempts against mh-ssh on mist
2020-09-14 05:22:51
112.85.42.72 attack
Sep 13 20:28:54 localhost sshd[530774]: Failed password for root from 112.85.42.72 port 53107 ssh2
Sep 13 20:28:48 localhost sshd[530774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.72  user=root
Sep 13 20:28:50 localhost sshd[530774]: Failed password for root from 112.85.42.72 port 53107 ssh2
Sep 13 20:28:54 localhost sshd[530774]: Failed password for root from 112.85.42.72 port 53107 ssh2
Sep 13 20:28:57 localhost sshd[530774]: Failed password for root from 112.85.42.72 port 53107 ssh2
...
2020-09-14 05:23:20
185.147.215.14 attackbotsspam
[2020-09-13 17:09:11] NOTICE[1239] chan_sip.c: Registration from '' failed for '185.147.215.14:55140' - Wrong password
[2020-09-13 17:09:11] SECURITY[1264] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-13T17:09:11.340-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1210",SessionID="0x7f4d480d6c18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.215.14/55140",Challenge="18f9b54c",ReceivedChallenge="18f9b54c",ReceivedHash="3ac0efa79d24f01f0cfab0420886a7be"
[2020-09-13 17:15:39] NOTICE[1239] chan_sip.c: Registration from '' failed for '185.147.215.14:52552' - Wrong password
[2020-09-13 17:15:39] SECURITY[1264] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-13T17:15:39.960-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="180",SessionID="0x7f4d481e2018",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.215.
...
2020-09-14 05:37:55
36.112.136.33 attackspam
2020-09-13T14:14:28.898775morrigan.ad5gb.com sshd[1704339]: Invalid user yabuki from 36.112.136.33 port 38444
2020-09-14 05:05:33
51.77.137.230 attackspambots
Sep 13 22:51:46 [host] sshd[309]: Invalid user law
Sep 13 22:51:46 [host] sshd[309]: pam_unix(sshd:au
Sep 13 22:51:48 [host] sshd[309]: Failed password
2020-09-14 05:33:42
222.186.31.166 attackbotsspam
Sep 14 02:25:17 gw1 sshd[30763]: Failed password for root from 222.186.31.166 port 13494 ssh2
Sep 14 02:25:19 gw1 sshd[30763]: Failed password for root from 222.186.31.166 port 13494 ssh2
...
2020-09-14 05:30:01
118.89.231.109 attack
Sep 13 22:22:37 server sshd[53422]: Failed password for root from 118.89.231.109 port 36351 ssh2
Sep 13 22:25:31 server sshd[54197]: Failed password for invalid user NetLinx from 118.89.231.109 port 60874 ssh2
Sep 13 22:28:26 server sshd[55100]: Failed password for invalid user ranger from 118.89.231.109 port 57171 ssh2
2020-09-14 05:31:47
41.193.122.77 attackbots
41.193.122.77 (ZA/South Africa/-), 3 distributed sshd attacks on account [pi] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 13 15:51:04 internal2 sshd[16630]: Invalid user pi from 181.57.152.138 port 40086
Sep 13 15:51:04 internal2 sshd[16634]: Invalid user pi from 181.57.152.138 port 40090
Sep 13 16:30:19 internal2 sshd[16681]: Invalid user pi from 41.193.122.77 port 42354

IP Addresses Blocked:

181.57.152.138 (CO/Colombia/static-ip-18157152138.cable.net.co)
2020-09-14 05:29:38
168.63.212.45 attackspambots
Detected by ModSecurity. Host header is an IP address, Request URI: //ip-redirect/
2020-09-14 05:11:30

最近上报的IP列表

45.200.171.179 59.74.45.59 196.243.51.49 247.217.144.152
72.112.177.85 200.201.170.234 57.6.166.149 253.33.103.21
174.71.85.249 30.178.14.210 75.240.70.181 9.225.179.246
77.83.71.44 103.8.151.97 13.43.158.155 41.87.2.230
51.178.143.90 139.167.30.121 1.227.178.104 36.122.60.97