必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.14.150.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.14.150.5.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 16:23:45 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 5.150.14.106.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.150.14.106.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.190.2 attackspam
Sep 11 07:51:27 router sshd[24176]: Failed password for root from 222.186.190.2 port 22998 ssh2
Sep 11 07:51:32 router sshd[24176]: Failed password for root from 222.186.190.2 port 22998 ssh2
Sep 11 07:51:35 router sshd[24176]: Failed password for root from 222.186.190.2 port 22998 ssh2
Sep 11 07:51:39 router sshd[24176]: Failed password for root from 222.186.190.2 port 22998 ssh2
...
2020-09-11 13:54:51
222.186.173.154 attackspam
Sep 10 22:44:06 dignus sshd[1606]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 11400 ssh2 [preauth]
Sep 10 22:44:11 dignus sshd[1626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Sep 10 22:44:14 dignus sshd[1626]: Failed password for root from 222.186.173.154 port 20218 ssh2
Sep 10 22:44:17 dignus sshd[1626]: Failed password for root from 222.186.173.154 port 20218 ssh2
Sep 10 22:44:26 dignus sshd[1626]: Failed password for root from 222.186.173.154 port 20218 ssh2
...
2020-09-11 13:51:15
188.173.80.134 attackspambots
Sep 11 07:43:01 vmd17057 sshd[9688]: Failed password for root from 188.173.80.134 port 47062 ssh2
...
2020-09-11 13:56:09
192.241.175.48 attack
Sep 11 13:37:56 web1 sshd[1570]: Invalid user onm from 192.241.175.48 port 54170
Sep 11 13:37:56 web1 sshd[1570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.175.48
Sep 11 13:37:56 web1 sshd[1570]: Invalid user onm from 192.241.175.48 port 54170
Sep 11 13:37:58 web1 sshd[1570]: Failed password for invalid user onm from 192.241.175.48 port 54170 ssh2
Sep 11 13:50:50 web1 sshd[6713]: Invalid user ullern from 192.241.175.48 port 56436
Sep 11 13:50:50 web1 sshd[6713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.175.48
Sep 11 13:50:50 web1 sshd[6713]: Invalid user ullern from 192.241.175.48 port 56436
Sep 11 13:50:52 web1 sshd[6713]: Failed password for invalid user ullern from 192.241.175.48 port 56436 ssh2
Sep 11 13:56:52 web1 sshd[9139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.175.48  user=root
Sep 11 13:56:54 web1 sshd[9139]: Fai
...
2020-09-11 13:48:07
111.21.176.74 attackspam
Telnet Server BruteForce Attack
2020-09-11 13:57:27
109.87.18.16 attackbots
Sep 10 20:00:45 ssh2 sshd[16392]: User root from 109.87.18.16 not allowed because not listed in AllowUsers
Sep 10 20:00:45 ssh2 sshd[16392]: Failed password for invalid user root from 109.87.18.16 port 51926 ssh2
Sep 10 20:00:46 ssh2 sshd[16392]: Connection closed by invalid user root 109.87.18.16 port 51926 [preauth]
...
2020-09-11 13:51:30
118.89.108.37 attackbotsspam
Sep 11 04:26:41 jumpserver sshd[37128]: Failed password for invalid user sasse from 118.89.108.37 port 50286 ssh2
Sep 11 04:30:07 jumpserver sshd[37137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.108.37  user=root
Sep 11 04:30:08 jumpserver sshd[37137]: Failed password for root from 118.89.108.37 port 42596 ssh2
...
2020-09-11 13:33:31
106.12.165.253 attackbots
Sep 11 09:09:51 itv-usvr-02 sshd[7944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.165.253  user=root
Sep 11 09:11:26 itv-usvr-02 sshd[7983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.165.253  user=root
Sep 11 09:15:05 itv-usvr-02 sshd[8123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.165.253  user=root
2020-09-11 13:47:20
95.181.172.39 attack
1599757045 - 09/10/2020 18:57:25 Host: 95.181.172.39/95.181.172.39 Port: 623 TCP Blocked
...
2020-09-11 13:59:23
222.186.175.169 attackbots
Sep 11 05:52:40 instance-2 sshd[1846]: Failed password for root from 222.186.175.169 port 25196 ssh2
Sep 11 05:52:44 instance-2 sshd[1846]: Failed password for root from 222.186.175.169 port 25196 ssh2
Sep 11 05:52:48 instance-2 sshd[1846]: Failed password for root from 222.186.175.169 port 25196 ssh2
Sep 11 05:52:52 instance-2 sshd[1846]: Failed password for root from 222.186.175.169 port 25196 ssh2
2020-09-11 13:58:50
118.45.235.83 attackbotsspam
Sep 10 18:57:49 vmd26974 sshd[2464]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.45.235.83
Sep 10 18:57:51 vmd26974 sshd[2464]: Failed password for invalid user user from 118.45.235.83 port 44612 ssh2
...
2020-09-11 13:40:13
103.14.197.226 attack
20/9/10@12:57:10: FAIL: Alarm-Network address from=103.14.197.226
20/9/10@12:57:10: FAIL: Alarm-Network address from=103.14.197.226
...
2020-09-11 14:12:09
116.75.118.164 attackspam
" "
2020-09-11 13:52:46
140.143.5.72 attackbotsspam
Failed password for invalid user ruud from 140.143.5.72 port 58562 ssh2
2020-09-11 13:39:51
142.93.242.246 attackbots
2020-09-10T21:22:23.289766linuxbox-skyline sshd[22496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.242.246  user=root
2020-09-10T21:22:25.282689linuxbox-skyline sshd[22496]: Failed password for root from 142.93.242.246 port 42346 ssh2
...
2020-09-11 13:38:06

最近上报的IP列表

106.14.15.94 106.14.151.151 106.14.151.147 106.14.152.183
106.14.152.248 106.14.153.0 106.14.152.61 106.14.153.125
106.14.154.137 106.14.154.205 106.14.154.39 106.14.155.15
106.14.154.236 106.14.155.117 106.14.155.143 106.14.155.160
125.135.219.68 106.14.156.231 106.14.157.39 106.14.158.168