必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.123.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.123.116.			IN	A

;; AUTHORITY SECTION:
.			136	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:30:07 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 116.123.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 116.123.14.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
79.6.229.236 attack
Unauthorized connection attempt detected from IP address 79.6.229.236 to port 81
2020-01-10 19:45:10
171.224.177.141 attackspambots
Unauthorized connection attempt detected from IP address 171.224.177.141 to port 445
2020-01-10 19:22:15
83.97.20.221 attackbotsspam
unauthorized access on port 443 [https] FO
2020-01-10 19:13:34
36.57.89.94 attack
2020-01-09 22:43:34 dovecot_login authenticator failed for (iigtb) [36.57.89.94]:64960 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangmin@lerctr.org)
2020-01-09 22:43:41 dovecot_login authenticator failed for (ivnwj) [36.57.89.94]:64960 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangmin@lerctr.org)
2020-01-09 22:48:50 dovecot_login authenticator failed for (hlrff) [36.57.89.94]:64960 I=[192.147.25.65]:25: 535 Incorrect authentication data
...
2020-01-10 19:27:48
91.185.193.101 attack
T: f2b ssh aggressive 3x
2020-01-10 19:44:38
1.4.198.24 attackspambots
Unauthorized connection attempt from IP address 1.4.198.24 on Port 445(SMB)
2020-01-10 19:34:18
114.119.37.38 attack
445/tcp 1433/tcp...
[2019-12-30/2020-01-10]8pkt,2pt.(tcp)
2020-01-10 19:39:30
186.18.210.119 attackbots
2019-07-08 11:39:03 1hkQ6w-00036c-Hc SMTP connection from \(cpe-186-18-210-119.telecentro-reversos.com.ar\) \[186.18.210.119\]:12868 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 11:39:10 1hkQ73-00036s-9n SMTP connection from \(cpe-186-18-210-119.telecentro-reversos.com.ar\) \[186.18.210.119\]:12939 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 11:39:15 1hkQ78-000374-VU SMTP connection from \(cpe-186-18-210-119.telecentro-reversos.com.ar\) \[186.18.210.119\]:12978 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-10 19:30:44
170.130.187.58 attackbotsspam
[IPBX probe: SIP=tcp/5060]
*(RWIN=1024)(01101146)
2020-01-10 19:11:50
185.176.27.2 attackbotsspam
01/10/2020-06:10:13.409974 185.176.27.2 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-10 19:12:50
137.59.161.22 attack
445/tcp 445/tcp
[2019-11-26/2020-01-10]2pkt
2020-01-10 19:31:13
124.156.50.111 attackspam
SIP/5060 Probe, BF, Hack -
2020-01-10 19:14:48
1.174.128.136 attack
1578631728 - 01/10/2020 05:48:48 Host: 1.174.128.136/1.174.128.136 Port: 445 TCP Blocked
2020-01-10 19:30:07
139.28.223.25 attack
Jan 10 08:34:53 grey postfix/smtpd\[8412\]: NOQUEUE: reject: RCPT from unknown\[139.28.223.25\]: 554 5.7.1 Service unavailable\; Client host \[139.28.223.25\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[139.28.223.25\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-10 19:49:23
112.73.67.137 attack
1433/tcp 445/tcp...
[2019-11-18/2020-01-10]9pkt,2pt.(tcp)
2020-01-10 19:49:47

最近上报的IP列表

106.14.123.132 106.14.123.139 106.14.2.60 106.14.123.158
106.14.123.16 106.14.123.137 106.14.123.156 106.14.2.75
106.14.2.86 106.14.13.28 106.14.13.44 106.14.13.41
106.14.13.76 106.14.13.82 106.14.13.32 106.14.13.46
106.14.13.249 106.14.13.95 106.14.132.11 106.14.13.99