必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
106.14.141.62 attack
Aug 20 23:42:08 cho sshd[1196720]: Failed password for root from 106.14.141.62 port 49004 ssh2
Aug 20 23:43:11 cho sshd[1196789]: Invalid user music1 from 106.14.141.62 port 55026
Aug 20 23:43:11 cho sshd[1196789]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.14.141.62 
Aug 20 23:43:11 cho sshd[1196789]: Invalid user music1 from 106.14.141.62 port 55026
Aug 20 23:43:13 cho sshd[1196789]: Failed password for invalid user music1 from 106.14.141.62 port 55026 ssh2
...
2020-08-21 08:01:48
106.14.120.139 attackspambots
106.14.120.139 - - [20/Jul/2020:06:08:27 +0100] "POST /wp-login.php HTTP/1.1" 200 2109 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
106.14.120.139 - - [20/Jul/2020:06:08:30 +0100] "POST /wp-login.php HTTP/1.1" 200 2155 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
106.14.120.139 - - [20/Jul/2020:06:08:31 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-20 20:31:06
106.14.114.89 attack
port scan and connect, tcp 80 (http)
2020-07-11 20:08:15
106.14.118.130 attack
21 attempts against mh-ssh on flow
2020-06-30 05:45:02
106.14.147.4 attackbotsspam
Trolling for resource vulnerabilities
2020-03-29 02:09:58
106.14.141.166 attack
Unauthorized connection attempt detected from IP address 106.14.141.166 to port 6380 [T]
2020-03-24 21:48:46
106.14.158.154 attack
/info/license.txt
2020-02-28 19:49:50
106.14.199.98 attackspambots
unauthorized connection attempt
2020-02-19 20:44:07
106.14.133.109 attackspambots
Unauthorized connection attempt detected from IP address 106.14.133.109 to port 7001 [T]
2020-02-01 17:57:23
106.14.136.156 attackspambots
Unauthorized connection attempt detected from IP address 106.14.136.156 to port 22 [T]
2020-01-17 07:34:23
106.14.193.239 attackspam
Unauthorized connection attempt detected from IP address 106.14.193.239 to port 9200
2019-12-31 21:54:54
106.14.180.49 attackspam
Unauthorized connection attempt from IP address 106.14.180.49 on Port 445(SMB)
2019-12-31 09:00:08
106.14.195.202 attackbotsspam
2019-12-30 06:21:01 UTC | Pigment Red 122 | mpoxpwxth@gmail.com | https://www.zeyachem.net/pigment-red-122.html | 106.14.195.202 | Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) ) | whoah this weblog is fantastic i really like reading your posts. Keep up the great work! You understand, lots of persons are searching around for this info, you can help them greatly. |
2019-12-30 22:39:53
106.14.199.98 attack
Port 1433 Scan
2019-12-27 21:53:21
106.14.162.163 attackspambots
12/01/2019-23:58:39.297526 106.14.162.163 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-02 13:29:28
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.1.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62698
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.1.67.			IN	A

;; AUTHORITY SECTION:
.			341	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:25:18 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 67.1.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.1.14.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
59.25.197.158 attackspambots
Jan  9 13:19:10 vps46666688 sshd[31018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.25.197.158
Jan  9 13:19:12 vps46666688 sshd[31018]: Failed password for invalid user odoo from 59.25.197.158 port 44686 ssh2
...
2020-01-10 01:07:34
36.78.23.94 attackbotsspam
Automatic report - SSH Brute-Force Attack
2020-01-10 01:20:55
117.50.1.12 attackspambots
detected by Fail2Ban
2020-01-10 01:27:53
129.204.72.57 attack
Unauthorized SSH login attempts
2020-01-10 00:56:54
203.177.39.178 attack
1578575139 - 01/09/2020 14:05:39 Host: 203.177.39.178/203.177.39.178 Port: 445 TCP Blocked
2020-01-10 01:34:00
84.47.43.117 attackbots
Jan  8 10:34:55 entropy sshd[21091]: Invalid user judy from 84.47.43.117
Jan  8 10:34:58 entropy sshd[21091]: Failed password for invalid user judy from 84.47.43.117 port 48996 ssh2
Jan  8 10:35:38 entropy sshd[21137]: Invalid user apache from 84.47.43.117
Jan  8 10:35:41 entropy sshd[21137]: Failed password for invalid user apache from 84.47.43.117 port 53758 ssh2
Jan  8 10:36:21 entropy sshd[21146]: Invalid user oracle from 84.47.43.117
Jan  8 10:36:23 entropy sshd[21146]: Failed password for invalid user oracle from 84.47.43.117 port 57406 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=84.47.43.117
2020-01-10 01:06:10
78.172.5.80 attackbots
Telnet/23 MH Probe, BF, Hack -
2020-01-10 00:58:46
195.251.255.69 attackbots
No harm, just kids learning
2020-01-10 01:14:00
63.81.87.71 attack
Jan  9 15:07:43 grey postfix/smtpd\[5537\]: NOQUEUE: reject: RCPT from talented.vidyad.com\[63.81.87.71\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.71\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.71\]\; from=\ to=\ proto=ESMTP helo=\Jan  9 15:07:43 grey postfix/smtpd\[31906\]: NOQUEUE: reject: RCPT from talented.vidyad.com\[63.81.87.71\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.71\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.71\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-10 01:00:33
81.213.111.13 attackbotsspam
Unauthorized connection attempt detected from IP address 81.213.111.13 to port 81
2020-01-10 01:26:08
92.222.224.189 attack
Jan  9 16:14:34 localhost sshd\[17321\]: Invalid user gdx from 92.222.224.189 port 50870
Jan  9 16:14:34 localhost sshd\[17321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.224.189
Jan  9 16:14:36 localhost sshd\[17321\]: Failed password for invalid user gdx from 92.222.224.189 port 50870 ssh2
2020-01-10 01:00:19
89.148.193.79 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2020-01-10 01:30:49
159.203.190.189 attack
$f2bV_matches
2020-01-10 01:30:06
221.160.100.14 attackspam
...
2020-01-10 01:33:25
81.0.120.26 attackspam
01/09/2020-15:47:43.046916 81.0.120.26 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-01-10 01:04:04

最近上报的IP列表

106.14.10.115 106.14.10.12 106.14.10.111 106.14.10.117
106.14.10.139 106.14.1.85 106.14.10.101 106.14.10.148
106.14.10.144 101.236.33.230 106.14.10.180 106.14.10.211
106.14.10.177 106.14.10.209 106.14.10.195 106.14.10.179
106.14.10.188 106.14.10.249 106.14.10.182 106.14.10.34