必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Spain

运营商(isp): Orange

主机名(hostname): unknown

机构(organization): Orange Espagne SA

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.106.208.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51510
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.106.208.93.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019073101 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 01 02:22:40 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
93.208.106.212.in-addr.arpa has no PTR record
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
93.208.106.212.in-addr.arpa	name = 93.208.106.212.static.jazztel.es.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
2.39.173.20 attackspam
Automatic report - Banned IP Access
2019-11-08 19:34:11
49.88.112.72 attackspambots
Nov  8 13:42:23 sauna sshd[60356]: Failed password for root from 49.88.112.72 port 38949 ssh2
...
2019-11-08 19:53:24
68.183.193.46 attack
Automatic report - Banned IP Access
2019-11-08 19:49:51
106.12.13.138 attack
Nov  7 21:25:12 auw2 sshd\[28592\]: Invalid user radiusd from 106.12.13.138
Nov  7 21:25:12 auw2 sshd\[28592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.138
Nov  7 21:25:14 auw2 sshd\[28592\]: Failed password for invalid user radiusd from 106.12.13.138 port 38936 ssh2
Nov  7 21:29:51 auw2 sshd\[28990\]: Invalid user deploy from 106.12.13.138
Nov  7 21:29:51 auw2 sshd\[28990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.138
2019-11-08 20:06:07
45.93.247.24 attackspam
Nov  8 16:14:38 our-server-hostname postfix/smtpd[17424]: connect from unknown[45.93.247.24]
Nov x@x
Nov  8 16:14:41 our-server-hostname postfix/smtpd[17424]: 2E37EA40086: client=unknown[45.93.247.24]
Nov  8 16:14:42 our-server-hostname postfix/smtpd[18514]: 0A28AA4008E: client=unknown[127.0.0.1], orig_client=unknown[45.93.247.24]
Nov  8 16:14:42 our-server-hostname amavis[20063]: (20063-10) Passed CLEAN, [45.93.247.24] [45.93.247.24] , mail_id: fyS3H198N3+T, Hhostnames: -, size: 17706, queued_as: 0A28AA4008E, 147 ms
Nov x@x
Nov  8 16:14:42 our-server-hostname postfix/smtpd[17424]: 71ED2A40086: client=unknown[45.93.247.24]
Nov  8 16:14:43 our-server-hostname postfix/smtpd[18423]: 4B38AA4009E: client=unknown[127.0.0.1], orig_client=unknown[45.93.247.24]
Nov  8 16:14:43 our-server-hostname amavis[18818]: (18818-13) Passed CLEAN, [45.93.247.24] [45.93.247.24] , mail_id: 4LD5yrbApUvp, Hhostnames: -, size: 17548, queued_as: 4B38AA4009E, 135 ms
Nov x@x
Nov  8 16:14:........
-------------------------------
2019-11-08 19:44:53
104.248.121.67 attack
Nov  8 09:23:58 venus sshd\[11610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.121.67  user=root
Nov  8 09:23:59 venus sshd\[11610\]: Failed password for root from 104.248.121.67 port 34825 ssh2
Nov  8 09:27:47 venus sshd\[11650\]: Invalid user !! from 104.248.121.67 port 53846
...
2019-11-08 19:45:23
106.12.58.4 attackbots
2019-11-08T10:24:51.879396shield sshd\[28197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.58.4  user=root
2019-11-08T10:24:53.762480shield sshd\[28197\]: Failed password for root from 106.12.58.4 port 34272 ssh2
2019-11-08T10:29:22.812998shield sshd\[28618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.58.4  user=root
2019-11-08T10:29:24.901413shield sshd\[28618\]: Failed password for root from 106.12.58.4 port 41298 ssh2
2019-11-08T10:33:58.735558shield sshd\[29129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.58.4  user=root
2019-11-08 20:04:29
185.153.199.2 attackbots
Nov  8 12:56:16 mc1 kernel: \[4500469.276484\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.153.199.2 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=55544 PROTO=TCP SPT=52282 DPT=4550 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  8 12:58:06 mc1 kernel: \[4500578.502811\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.153.199.2 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=10255 PROTO=TCP SPT=52282 DPT=54389 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  8 12:59:05 mc1 kernel: \[4500637.680685\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.153.199.2 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=32464 PROTO=TCP SPT=52282 DPT=101 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-08 20:01:30
218.28.168.4 attackbots
Nov  8 11:59:59 mail sshd[30576]: Invalid user zebra from 218.28.168.4
Nov  8 11:59:59 mail sshd[30576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.168.4
Nov  8 11:59:59 mail sshd[30576]: Invalid user zebra from 218.28.168.4
Nov  8 12:00:01 mail sshd[30576]: Failed password for invalid user zebra from 218.28.168.4 port 13383 ssh2
Nov  8 12:22:20 mail sshd[1197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.168.4  user=root
Nov  8 12:22:22 mail sshd[1197]: Failed password for root from 218.28.168.4 port 16284 ssh2
...
2019-11-08 19:24:13
106.13.196.80 attack
Nov  8 03:52:50 plusreed sshd[24952]: Invalid user mongod from 106.13.196.80
...
2019-11-08 19:32:29
223.241.116.15 attack
Nov  8 01:04:28 eola postfix/smtpd[16949]: connect from unknown[223.241.116.15]
Nov  8 01:04:29 eola postfix/smtpd[16949]: NOQUEUE: reject: RCPT from unknown[223.241.116.15]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Nov  8 01:04:29 eola postfix/smtpd[16949]: disconnect from unknown[223.241.116.15] ehlo=1 mail=1 rcpt=0/1 quhostname=1 commands=3/4
Nov  8 01:04:30 eola postfix/smtpd[16949]: connect from unknown[223.241.116.15]
Nov  8 01:04:32 eola postfix/smtpd[16949]: lost connection after AUTH from unknown[223.241.116.15]
Nov  8 01:04:32 eola postfix/smtpd[16949]: disconnect from unknown[223.241.116.15] ehlo=1 auth=0/1 commands=1/2
Nov  8 01:04:32 eola postfix/smtpd[16949]: connect from unknown[223.241.116.15]
Nov  8 01:04:33 eola postfix/smtpd[16949]: lost connection after AUTH from unknown[223.241.116.15]
Nov  8 01:04:33 eola postfix/smtpd[16949]: disconnect from unknown[223.241.116.15] ehlo=1 auth=0/1 commands=1/2
No........
-------------------------------
2019-11-08 19:28:14
1.161.161.240 attackspam
Nov  8 07:24:07 host proftpd[3004]: 0.0.0.0 (1.161.161.240[1.161.161.240]) - USER anonymous: no such user found from 1.161.161.240 [1.161.161.240] to 62.210.146.38:21
...
2019-11-08 19:40:57
94.191.20.179 attackspambots
Nov  8 12:09:23 icinga sshd[26065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.20.179
Nov  8 12:09:26 icinga sshd[26065]: Failed password for invalid user pass from 94.191.20.179 port 33264 ssh2
...
2019-11-08 19:40:08
188.165.255.8 attack
Nov  8 14:12:59 server sshd\[16530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns380964.ip-188-165-255.eu  user=root
Nov  8 14:13:01 server sshd\[16530\]: Failed password for root from 188.165.255.8 port 37686 ssh2
Nov  8 14:29:46 server sshd\[20669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns380964.ip-188-165-255.eu  user=root
Nov  8 14:29:48 server sshd\[20669\]: Failed password for root from 188.165.255.8 port 33950 ssh2
Nov  8 14:32:53 server sshd\[21611\]: Invalid user kr from 188.165.255.8
...
2019-11-08 19:58:00
192.96.216.133 attackbots
xmlrpc attack
2019-11-08 19:58:53

最近上报的IP列表

147.235.55.54 174.104.40.86 72.245.13.222 120.248.240.221
146.11.126.171 143.199.247.195 198.100.190.207 53.211.210.130
148.77.166.208 145.255.52.246 208.207.124.38 161.70.92.25
96.181.126.60 86.44.187.81 65.33.51.11 208.49.212.6
188.71.81.134 113.219.127.228 134.6.38.35 89.251.204.179