必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.164.105.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20545
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;69.164.105.206.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 19:46:26 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 206.105.164.69.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 206.105.164.69.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.19.29.200 attack
Port scan: Attack repeated for 24 hours
2020-08-11 06:35:37
23.129.64.187 attackspam
Time:     Mon Aug 10 16:13:21 2020 -0400
IP:       23.129.64.187 (US/United States/-)
Failures: 5 (mod_security)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-08-11 06:29:56
191.54.133.187 attackbots
1597091395 - 08/10/2020 22:29:55 Host: 191.54.133.187/191.54.133.187 Port: 445 TCP Blocked
2020-08-11 06:46:51
123.145.215.68 attackspambots
Auto Detect Rule!
proto TCP (SYN), 123.145.215.68:58181->gjan.info:23, len 40
2020-08-11 06:28:49
220.132.232.230 attack
Auto Detect Rule!
proto TCP (SYN), 220.132.232.230:24643->gjan.info:23, len 40
2020-08-11 06:38:10
213.14.242.70 attackspambots
Port Scan detected!
...
2020-08-11 06:27:41
129.226.67.92 attack
Aug 10 23:31:35 santamaria sshd\[17224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.67.92  user=root
Aug 10 23:31:37 santamaria sshd\[17224\]: Failed password for root from 129.226.67.92 port 48854 ssh2
Aug 10 23:37:42 santamaria sshd\[17342\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.67.92  user=root
...
2020-08-11 06:38:40
163.172.161.31 attackbotsspam
Aug 10 06:01:36 finn sshd[6561]: Did not receive identification string from 163.172.161.31 port 43132
Aug 10 06:01:53 finn sshd[6575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.161.31  user=r.r
Aug 10 06:01:55 finn sshd[6575]: Failed password for r.r from 163.172.161.31 port 56586 ssh2
Aug 10 06:01:55 finn sshd[6575]: Received disconnect from 163.172.161.31 port 56586:11: Normal Shutdown, Thank you for playing [preauth]
Aug 10 06:01:55 finn sshd[6575]: Disconnected from 163.172.161.31 port 56586 [preauth]
Aug 10 06:02:10 finn sshd[6579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.161.31  user=r.r
Aug 10 06:02:12 finn sshd[6579]: Failed password for r.r from 163.172.161.31 port 33826 ssh2
Aug 10 06:02:12 finn sshd[6579]: Received disconnect from 163.172.161.31 port 33826:11: Normal Shutdown, Thank you for playing [preauth]
Aug 10 06:02:12 finn sshd[6579]: Disconnect........
-------------------------------
2020-08-11 06:43:38
51.158.25.220 attackbotsspam
51.158.25.220 - - [11/Aug/2020:00:25:05 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.158.25.220 - - [11/Aug/2020:00:25:06 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.158.25.220 - - [11/Aug/2020:00:25:06 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-11 06:42:21
14.236.6.28 attackspambots
(ftpd) Failed FTP login from 14.236.6.28 (VN/Vietnam/static.vnpt.vn): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Aug 11 01:53:12 ir1 pure-ftpd: (?@14.236.6.28) [WARNING] Authentication failed for user [anonymous]
2020-08-11 06:33:59
45.143.223.128 attack
Did not receive identification string
2020-08-11 06:51:50
110.184.82.88 attack
Unauthorized connection attempt from IP address 110.184.82.88 on Port 445(SMB)
2020-08-11 06:15:25
112.197.32.136 attack
Unauthorized connection attempt from IP address 112.197.32.136 on Port 445(SMB)
2020-08-11 06:41:28
103.210.202.73 attackspambots
firewall-block, port(s): 8080/tcp
2020-08-11 06:23:16
218.92.0.246 attackspambots
Aug 11 00:42:18 dev0-dcde-rnet sshd[20434]: Failed password for root from 218.92.0.246 port 46611 ssh2
Aug 11 00:42:31 dev0-dcde-rnet sshd[20434]: error: maximum authentication attempts exceeded for root from 218.92.0.246 port 46611 ssh2 [preauth]
Aug 11 00:42:36 dev0-dcde-rnet sshd[20449]: Failed password for root from 218.92.0.246 port 5224 ssh2
2020-08-11 06:45:47

最近上报的IP列表

34.50.158.130 52.156.104.50 25.38.62.84 254.231.87.114
228.197.42.5 207.72.168.106 35.34.255.15 204.230.190.200
94.145.23.6 241.68.1.73 209.65.247.182 167.73.89.215
58.97.24.217 243.109.188.250 48.255.193.125 174.150.205.118
150.249.14.90 18.160.102.224 235.163.45.168 47.26.210.104