必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Managua

省份(region): Managua

国家(country): Nicaragua

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
190.106.130.20 attackbotsspam
"Path Traversal Attack (/../) - Matched Data: /../ found within REQUEST_URI_RAW: /wp-content/plugins/mygallery/myfunctions/mygallerybrowser.php?myPath=../../../../wp-config.php"
2020-08-07 15:53:22
190.106.130.42 attackspambots
20 attempts against mh-misbehave-ban on twig
2020-08-07 02:16:40
190.106.132.172 attack
Unauthorised access (Aug  5) SRC=190.106.132.172 LEN=40 TTL=238 ID=33222 TCP DPT=445 WINDOW=1024 SYN
2019-08-06 00:37:15
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.106.13.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6670
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.106.13.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030600 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 01:13:05 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
68.13.106.190.in-addr.arpa domain name pointer static-190-106-13-68.alfanumeric.com.ni.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.13.106.190.in-addr.arpa	name = static-190-106-13-68.alfanumeric.com.ni.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.38.25.89 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 03:17:05
77.247.110.58 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 02:47:30
106.12.34.188 attackspambots
SSH bruteforce
2019-11-14 03:03:12
168.181.49.192 attackbotsspam
Nov 13 15:47:07 lnxweb61 sshd[6245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.181.49.192
2019-11-14 02:47:50
138.197.195.52 attackbotsspam
Nov 13 19:21:34 serwer sshd\[25602\]: Invalid user user from 138.197.195.52 port 55592
Nov 13 19:21:34 serwer sshd\[25602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.195.52
Nov 13 19:21:36 serwer sshd\[25602\]: Failed password for invalid user user from 138.197.195.52 port 55592 ssh2
...
2019-11-14 02:58:17
112.85.42.227 attack
Nov 13 13:58:38 TORMINT sshd\[4991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
Nov 13 13:58:40 TORMINT sshd\[4991\]: Failed password for root from 112.85.42.227 port 30369 ssh2
Nov 13 13:58:42 TORMINT sshd\[4991\]: Failed password for root from 112.85.42.227 port 30369 ssh2
...
2019-11-14 03:13:41
111.43.223.79 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 03:10:46
179.187.249.161 attack
Unauthorized connection attempt from IP address 179.187.249.161 on Port 445(SMB)
2019-11-14 03:03:39
14.248.97.71 attackspambots
Unauthorized connection attempt from IP address 14.248.97.71 on Port 445(SMB)
2019-11-14 03:05:17
112.140.186.129 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 02:57:55
200.93.148.19 attackbotsspam
frenzy
2019-11-14 03:06:18
190.13.135.44 attackbots
Unauthorized connection attempt from IP address 190.13.135.44 on Port 445(SMB)
2019-11-14 02:50:47
196.192.110.64 attack
Nov 13 06:31:01 auw2 sshd\[30808\]: Invalid user apache from 196.192.110.64
Nov 13 06:31:01 auw2 sshd\[30808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.192.110.64
Nov 13 06:31:03 auw2 sshd\[30808\]: Failed password for invalid user apache from 196.192.110.64 port 34534 ssh2
Nov 13 06:37:50 auw2 sshd\[31382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.192.110.64  user=root
Nov 13 06:37:51 auw2 sshd\[31382\]: Failed password for root from 196.192.110.64 port 44960 ssh2
2019-11-14 03:01:40
180.117.225.48 attack
SASL Brute Force
2019-11-14 02:44:22
128.199.95.163 attackbots
Nov 13 15:41:28 eventyay sshd[22699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.163
Nov 13 15:41:30 eventyay sshd[22699]: Failed password for invalid user 5r4e3w from 128.199.95.163 port 42556 ssh2
Nov 13 15:47:17 eventyay sshd[22796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.95.163
...
2019-11-14 02:43:43

最近上报的IP列表

98.13.238.3 239.131.253.250 46.29.184.219 165.215.27.147
243.97.113.209 52.98.27.244 233.42.63.199 221.115.14.167
154.21.188.185 75.215.95.215 135.224.72.23 120.102.45.218
107.249.5.15 3.211.74.207 126.213.14.102 213.91.152.115
195.214.128.165 89.6.180.242 81.59.33.117 173.77.97.97