必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
106.11.158.90 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5413e8898fa576b6 | WAF_Rule_ID: f6705d4933894b0583ba1042603083f6 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: disqus.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 04:43:40
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.11.158.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47175
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.11.158.14.			IN	A

;; AUTHORITY SECTION:
.			542	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 22:24:59 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
14.158.11.106.in-addr.arpa domain name pointer shenmaspider-106-11-158-14.crawl.sm.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.158.11.106.in-addr.arpa	name = shenmaspider-106-11-158-14.crawl.sm.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
112.245.240.220 attack
Bot Attempts to access systems. Many different URL attempts and heavy use of PHP
2020-03-24 02:38:11
102.190.239.124 attackspam
2020-03-23T16:46:37.550572  sshd[21087]: Invalid user debian from 102.190.239.124 port 53540
2020-03-23T16:46:38.883862  sshd[21087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.190.239.124
2020-03-23T16:46:37.550572  sshd[21087]: Invalid user debian from 102.190.239.124 port 53540
2020-03-23T16:46:40.549304  sshd[21087]: Failed password for invalid user debian from 102.190.239.124 port 53540 ssh2
...
2020-03-24 02:31:28
137.220.138.137 attack
Mar 23 18:11:14 vmd48417 sshd[25181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.220.138.137
2020-03-24 02:58:20
112.112.7.202 attackspambots
$f2bV_matches
2020-03-24 02:54:28
128.72.181.5 attackspam
Unauthorized connection attempt from IP address 128.72.181.5 on Port 445(SMB)
2020-03-24 03:11:20
185.147.215.12 attackbots
[2020-03-23 13:17:26] NOTICE[1148] chan_sip.c: Registration from '' failed for '185.147.215.12:60692' - Wrong password
[2020-03-23 13:17:26] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-03-23T13:17:26.512-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="7466",SessionID="0x7fd82c530768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.215.12/60692",Challenge="5726a1bf",ReceivedChallenge="5726a1bf",ReceivedHash="4bc7df838db3bac2fa5d42efe7745817"
[2020-03-23 13:17:48] NOTICE[1148] chan_sip.c: Registration from '' failed for '185.147.215.12:49322' - Wrong password
[2020-03-23 13:17:48] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-03-23T13:17:48.447-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8342",SessionID="0x7fd82c40aa58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.147.21
...
2020-03-24 02:36:11
200.87.133.138 attackbotsspam
Unauthorized connection attempt from IP address 200.87.133.138 on Port 445(SMB)
2020-03-24 03:03:20
5.137.20.134 attackbots
Automatic report - Port Scan Attack
2020-03-24 02:32:40
220.88.1.208 attack
DATE:2020-03-23 19:20:22, IP:220.88.1.208, PORT:ssh SSH brute force auth (docker-dc)
2020-03-24 02:56:29
46.229.168.146 attackspam
The IP has triggered Cloudflare WAF. CF-Ray: 5781f6c42e8acee4 | WAF_Rule_ID: asn | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: searchEngine | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (compatible; SemrushBot/6~bl; +http://www.semrush.com/bot.html) | CF_DC: IAD. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-03-24 03:10:34
96.70.41.109 attackbots
Mar 23 19:24:30 raspberrypi sshd[21380]: Failed password for daemon from 96.70.41.109 port 62631 ssh2
2020-03-24 03:10:16
45.143.220.28 attackbots
45.143.220.28 was recorded 7 times by 2 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 7, 25, 168
2020-03-24 03:02:27
45.143.220.19 attackbotsspam
[2020-03-23 15:04:25] NOTICE[1148][C-00015ecc] chan_sip.c: Call from '' (45.143.220.19:63335) to extension '011442037695508' rejected because extension not found in context 'public'.
[2020-03-23 15:04:25] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-23T15:04:25.045-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442037695508",SessionID="0x7fd82c43c848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.19/63335",ACLName="no_extension_match"
[2020-03-23 15:05:59] NOTICE[1148][C-00015ecd] chan_sip.c: Call from '' (45.143.220.19:65280) to extension '9011442037695508' rejected because extension not found in context 'public'.
[2020-03-23 15:05:59] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-23T15:05:59.297-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011442037695508",SessionID="0x7fd82c530768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UD
...
2020-03-24 03:09:21
167.172.57.75 attack
SSH brute force attempt
2020-03-24 02:41:23
41.242.102.66 attackbotsspam
Mar 23 18:51:08 * sshd[23725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.242.102.66
Mar 23 18:51:11 * sshd[23725]: Failed password for invalid user squid from 41.242.102.66 port 51784 ssh2
2020-03-24 02:56:01

最近上报的IP列表

106.11.157.99 106.11.158.81 106.11.159.86 106.11.211.219
106.11.211.254 106.11.35.100 106.11.40.32 106.11.40.57
106.11.43.160 106.11.47.19 106.110.215.88 106.110.35.123
106.111.200.216 106.111.39.184 106.111.67.64 106.111.89.235
106.111.89.51 106.112.124.174 106.112.125.190 237.44.172.144