必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '106.112.0.0 - 106.119.255.255'

% Abuse contact for '106.112.0.0 - 106.119.255.255' is 'anti-spam@chinatelecom.cn'

inetnum:        106.112.0.0 - 106.119.255.255
netname:        CHINANET-HE
descr:          CHINANET hebei province network
descr:          China Telecom
descr:          No.31,jingrong street
descr:          Beijing 100032
country:        CN
admin-c:        CH93-AP
tech-c:         BR3-AP
abuse-c:        AC1573-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
notify:         g-noc.he@chinatelecom.cn
mnt-by:         APNIC-HM
mnt-lower:      MAINT-CHINANET-HE
mnt-routes:     MAINT-CHINANET-HE
mnt-irt:        IRT-CHINANET-CN
last-modified:  2021-06-15T08:05:39Z
source:         APNIC

irt:            IRT-CHINANET-CN
address:        No.31 ,jingrong street,beijing
address:        100032
e-mail:         anti-spam@chinatelecom.cn
abuse-mailbox:  anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
auth:           # Filtered
remarks:        anti-spam@chinatelecom.cn was validated on 2025-04-24
mnt-by:         MAINT-CHINANET
last-modified:  2025-09-04T00:59:42Z
source:         APNIC

role:           ABUSE CHINANETCN
country:        ZZ
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +000000000
e-mail:         anti-spam@chinatelecom.cn
admin-c:        CH93-AP
tech-c:         CH93-AP
nic-hdl:        AC1573-AP
remarks:        Generated from irt object IRT-CHINANET-CN
remarks:        anti-spam@chinatelecom.cn was validated on 2025-04-24
abuse-mailbox:  anti-spam@chinatelecom.cn
mnt-by:         APNIC-ABUSE
last-modified:  2025-04-24T03:21:54Z
source:         APNIC

person:         Bin Ren
nic-hdl:        BR3-AP
e-mail:         g-noc.he@chinatelecom.cn
address:        NO.69 KunLun avenue, Shijiazhuang 050000 China
phone:          +86-311-85211771
fax-no:         +86-311-85202145
country:        CN
mnt-by:         MAINT-CHINANET-HE
last-modified:  2019-03-20T02:47:26Z
source:         APNIC

person:         Chinanet Hostmaster
nic-hdl:        CH93-AP
e-mail:         anti-spam@chinatelecom.cn
address:        No.31 ,jingrong street,beijing
address:        100032
phone:          +86-10-58501724
fax-no:         +86-10-58501724
country:        CN
mnt-by:         MAINT-CHINANET
last-modified:  2022-02-28T06:53:44Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.119.57.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6424
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.119.57.69.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025101000 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 10 20:42:15 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 69.57.119.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 69.57.119.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
63.240.240.74 attack
Sep  9 18:16:59 friendsofhawaii sshd\[26260\]: Invalid user webuser from 63.240.240.74
Sep  9 18:16:59 friendsofhawaii sshd\[26260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74
Sep  9 18:17:01 friendsofhawaii sshd\[26260\]: Failed password for invalid user webuser from 63.240.240.74 port 51515 ssh2
Sep  9 18:22:40 friendsofhawaii sshd\[26747\]: Invalid user test from 63.240.240.74
Sep  9 18:22:40 friendsofhawaii sshd\[26747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=63.240.240.74
2019-09-10 12:27:53
157.230.216.203 attackbots
firewall-block, port(s): 80/tcp
2019-09-10 13:02:29
218.98.40.138 attack
SSH Brute Force, server-1 sshd[3626]: Failed password for root from 218.98.40.138 port 29599 ssh2
2019-09-10 12:21:42
138.68.208.157 attack
09/09/2019-21:20:20.000896 138.68.208.157 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-09-10 12:42:27
49.232.32.188 attackbots
Sep 10 07:10:43 www sshd\[2571\]: Invalid user ubuntu from 49.232.32.188
Sep 10 07:10:43 www sshd\[2571\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.32.188
Sep 10 07:10:45 www sshd\[2571\]: Failed password for invalid user ubuntu from 49.232.32.188 port 48090 ssh2
...
2019-09-10 12:27:02
106.13.94.96 attackbotsspam
Sep 10 07:27:30 www sshd\[2895\]: Invalid user duser from 106.13.94.96
Sep 10 07:27:30 www sshd\[2895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.94.96
Sep 10 07:27:32 www sshd\[2895\]: Failed password for invalid user duser from 106.13.94.96 port 44534 ssh2
...
2019-09-10 12:43:07
139.59.94.203 attack
fail2ban honeypot
2019-09-10 12:42:03
31.46.32.20 attack
Sending SPAM email
2019-09-10 12:38:08
184.105.247.254 attack
scan z
2019-09-10 12:52:10
62.173.140.192 attackspam
Web application attack detected by fail2ban
2019-09-10 12:44:05
113.161.91.130 attackbots
Unauthorised access (Sep 10) SRC=113.161.91.130 LEN=52 TTL=115 ID=32549 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-10 12:26:10
51.75.147.100 attack
Sep 10 06:42:35 srv206 sshd[17147]: Invalid user postgres from 51.75.147.100
...
2019-09-10 12:55:59
218.98.40.141 attackspam
2019-09-10T03:24:42.290163Z 91440ca7f8fe New connection: 218.98.40.141:58719 (172.17.0.7:2222) [session: 91440ca7f8fe]
2019-09-10T04:08:00.595851Z 915085539553 New connection: 218.98.40.141:36749 (172.17.0.7:2222) [session: 915085539553]
2019-09-10 12:18:53
203.110.90.195 attackbotsspam
Sep  9 18:22:15 hiderm sshd\[30318\]: Invalid user ftptest from 203.110.90.195
Sep  9 18:22:15 hiderm sshd\[30318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.90.195
Sep  9 18:22:17 hiderm sshd\[30318\]: Failed password for invalid user ftptest from 203.110.90.195 port 60293 ssh2
Sep  9 18:29:23 hiderm sshd\[31009\]: Invalid user postgres from 203.110.90.195
Sep  9 18:29:23 hiderm sshd\[31009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.110.90.195
2019-09-10 12:34:58
209.235.67.48 attackbots
$f2bV_matches
2019-09-10 12:56:32

最近上报的IP列表

167.94.138.161 180.153.197.104 20.169.108.13 206.42.225.250
58.212.237.216 124.31.104.181 159.0.75.209 159.0.75.81
159.0.75.76 43.199.229.129 54.83.151.136 52.72.114.140
42.236.17.214 27.185.229.20 47.92.132.12 47.92.113.136
47.92.224.96 142.93.107.221 39.98.33.79 39.103.128.74