必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Telecom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
106.75.142.8 attack
Brute conection
2024-03-20 21:23:14
106.75.141.219 attackspam
Invalid user shop from 106.75.141.219 port 48330
2020-10-14 01:34:36
106.75.141.219 attackbots
2020-10-13T00:08:57.751318morrigan.ad5gb.com sshd[907538]: Invalid user cacti from 106.75.141.219 port 46868
2020-10-13 16:45:00
106.75.148.228 attackspam
2020-10-06T21:06:57.195815abusebot.cloudsearch.cf sshd[7796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.228  user=root
2020-10-06T21:06:58.689237abusebot.cloudsearch.cf sshd[7796]: Failed password for root from 106.75.148.228 port 47032 ssh2
2020-10-06T21:10:15.154534abusebot.cloudsearch.cf sshd[7859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.228  user=root
2020-10-06T21:10:16.828747abusebot.cloudsearch.cf sshd[7859]: Failed password for root from 106.75.148.228 port 48412 ssh2
2020-10-06T21:13:37.373932abusebot.cloudsearch.cf sshd[7919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.228  user=root
2020-10-06T21:13:39.113348abusebot.cloudsearch.cf sshd[7919]: Failed password for root from 106.75.148.228 port 49136 ssh2
2020-10-06T21:16:50.977540abusebot.cloudsearch.cf sshd[7975]: pam_unix(sshd:auth): authentication failu
...
2020-10-07 07:30:00
106.75.148.111 attack
Oct  6 22:46:18 vps639187 sshd\[27516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111  user=root
Oct  6 22:46:20 vps639187 sshd\[27516\]: Failed password for root from 106.75.148.111 port 51346 ssh2
Oct  6 22:49:35 vps639187 sshd\[27640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111  user=root
...
2020-10-07 05:02:55
106.75.148.228 attack
2020-10-06T14:28:25.431967billing sshd[7382]: Failed password for root from 106.75.148.228 port 42422 ssh2
2020-10-06T14:30:43.695407billing sshd[12694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.228  user=root
2020-10-06T14:30:45.911894billing sshd[12694]: Failed password for root from 106.75.148.228 port 42822 ssh2
...
2020-10-06 23:55:37
106.75.148.111 attackbotsspam
2020-10-06T14:48:19.774509afi-git.jinr.ru sshd[28461]: Failed password for root from 106.75.148.111 port 39786 ssh2
2020-10-06T14:50:31.423493afi-git.jinr.ru sshd[29149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mailgoesbulkio.live  user=root
2020-10-06T14:50:33.934326afi-git.jinr.ru sshd[29149]: Failed password for root from 106.75.148.111 port 39096 ssh2
2020-10-06T14:52:50.194257afi-git.jinr.ru sshd[30337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mailgoesbulkio.live  user=root
2020-10-06T14:52:52.787230afi-git.jinr.ru sshd[30337]: Failed password for root from 106.75.148.111 port 38402 ssh2
...
2020-10-06 21:10:07
106.75.148.228 attackspam
2020-10-06T14:28:25.431967billing sshd[7382]: Failed password for root from 106.75.148.228 port 42422 ssh2
2020-10-06T14:30:43.695407billing sshd[12694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.228  user=root
2020-10-06T14:30:45.911894billing sshd[12694]: Failed password for root from 106.75.148.228 port 42822 ssh2
...
2020-10-06 15:44:01
106.75.148.111 attackbots
Oct  6 01:20:43 buvik sshd[20982]: Failed password for root from 106.75.148.111 port 44904 ssh2
Oct  6 01:23:00 buvik sshd[21298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111  user=root
Oct  6 01:23:02 buvik sshd[21298]: Failed password for root from 106.75.148.111 port 52878 ssh2
...
2020-10-06 12:51:11
106.75.148.111 attackbots
Oct  5 05:09:07 onepixel sshd[684707]: Failed password for root from 106.75.148.111 port 47396 ssh2
Oct  5 05:11:02 onepixel sshd[685165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111  user=root
Oct  5 05:11:04 onepixel sshd[685165]: Failed password for root from 106.75.148.111 port 43614 ssh2
Oct  5 05:13:03 onepixel sshd[685487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111  user=root
Oct  5 05:13:05 onepixel sshd[685487]: Failed password for root from 106.75.148.111 port 39826 ssh2
2020-10-06 04:27:48
106.75.148.111 attackspambots
Oct  5 05:09:07 onepixel sshd[684707]: Failed password for root from 106.75.148.111 port 47396 ssh2
Oct  5 05:11:02 onepixel sshd[685165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111  user=root
Oct  5 05:11:04 onepixel sshd[685165]: Failed password for root from 106.75.148.111 port 43614 ssh2
Oct  5 05:13:03 onepixel sshd[685487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111  user=root
Oct  5 05:13:05 onepixel sshd[685487]: Failed password for root from 106.75.148.111 port 39826 ssh2
2020-10-05 20:29:16
106.75.148.111 attackspam
Oct  5 04:12:10 onepixel sshd[675223]: Failed password for root from 106.75.148.111 port 47958 ssh2
Oct  5 04:13:56 onepixel sshd[675494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111  user=root
Oct  5 04:13:58 onepixel sshd[675494]: Failed password for root from 106.75.148.111 port 44180 ssh2
Oct  5 04:15:47 onepixel sshd[675764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111  user=root
Oct  5 04:15:50 onepixel sshd[675764]: Failed password for root from 106.75.148.111 port 40394 ssh2
2020-10-05 12:19:34
106.75.148.111 attack
Sep 28 19:17:57 plex-server sshd[4005472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111 
Sep 28 19:17:57 plex-server sshd[4005472]: Invalid user sam from 106.75.148.111 port 53502
Sep 28 19:17:59 plex-server sshd[4005472]: Failed password for invalid user sam from 106.75.148.111 port 53502 ssh2
Sep 28 19:18:26 plex-server sshd[4005677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.148.111  user=root
Sep 28 19:18:28 plex-server sshd[4005677]: Failed password for root from 106.75.148.111 port 58926 ssh2
...
2020-09-29 04:59:50
106.75.146.18 attackbotsspam
Sep 28 00:05:45 iago sshd[26761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.146.18  user=r.r
Sep 28 00:05:47 iago sshd[26761]: Failed password for r.r from 106.75.146.18 port 45398 ssh2
Sep 28 00:05:47 iago sshd[26762]: Received disconnect from 106.75.146.18: 11: Bye Bye


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.75.146.18
2020-09-29 01:18:33
106.75.148.111 attackspambots
106.75.148.111 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 28 08:19:59 server5 sshd[13837]: Failed password for root from 179.243.62.83 port 28333 ssh2
Sep 28 08:17:29 server5 sshd[12669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.158.36  user=root
Sep 28 08:17:31 server5 sshd[12669]: Failed password for root from 180.76.158.36 port 58450 ssh2
Sep 28 08:18:18 server5 sshd[13062]: Failed password for root from 62.171.148.132 port 54724 ssh2
Sep 28 08:14:43 server5 sshd[11724]: Failed password for root from 62.171.148.132 port 44784 ssh2
Sep 28 08:15:55 server5 sshd[12179]: Failed password for root from 106.75.148.111 port 47610 ssh2

IP Addresses Blocked:

179.243.62.83 (BR/Brazil/-)
180.76.158.36 (CN/China/-)
62.171.148.132 (DE/Germany/-)
2020-09-28 21:18:56
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.75.14.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52443
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.75.14.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025103101 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 01 02:30:12 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
169.14.75.106.in-addr.arpa domain name pointer 5964n36l.cn.
169.14.75.106.in-addr.arpa domain name pointer gvdskhj.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.14.75.106.in-addr.arpa	name = 5964n36l.cn.
169.14.75.106.in-addr.arpa	name = gvdskhj.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.34.224.196 attackspam
Jan  9 19:22:16 web9 sshd\[23001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.224.196  user=root
Jan  9 19:22:19 web9 sshd\[23001\]: Failed password for root from 114.34.224.196 port 38272 ssh2
Jan  9 19:25:41 web9 sshd\[23474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.224.196  user=root
Jan  9 19:25:44 web9 sshd\[23474\]: Failed password for root from 114.34.224.196 port 53623 ssh2
Jan  9 19:29:09 web9 sshd\[23988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.34.224.196  user=root
2020-01-10 13:35:47
192.144.164.134 attack
2020-01-10T06:33:02.244880scmdmz1 sshd[4756]: Invalid user cy from 192.144.164.134 port 57484
2020-01-10T06:33:02.247532scmdmz1 sshd[4756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.164.134
2020-01-10T06:33:02.244880scmdmz1 sshd[4756]: Invalid user cy from 192.144.164.134 port 57484
2020-01-10T06:33:04.007409scmdmz1 sshd[4756]: Failed password for invalid user cy from 192.144.164.134 port 57484 ssh2
2020-01-10T06:36:10.003220scmdmz1 sshd[5029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.164.134  user=root
2020-01-10T06:36:11.767501scmdmz1 sshd[5029]: Failed password for root from 192.144.164.134 port 26851 ssh2
...
2020-01-10 13:47:12
91.121.103.175 attackspam
Jan 10 06:10:36 legacy sshd[24244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.103.175
Jan 10 06:10:37 legacy sshd[24244]: Failed password for invalid user ubnt1 from 91.121.103.175 port 57444 ssh2
Jan 10 06:14:10 legacy sshd[24365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.103.175
...
2020-01-10 13:53:50
146.88.240.4 attack
Jan 10 06:47:25 debian-2gb-nbg1-2 kernel: \[894556.710063\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=146.88.240.4 DST=195.201.40.59 LEN=30 TOS=0x00 PREC=0x00 TTL=240 ID=54321 PROTO=UDP SPT=33387 DPT=3283 LEN=10
2020-01-10 13:59:36
49.146.32.83 attack
Unauthorized connection attempt detected from IP address 49.146.32.83 to port 445
2020-01-10 13:50:27
111.231.71.157 attack
Automatic report - Banned IP Access
2020-01-10 13:30:40
185.200.118.70 attackspam
" "
2020-01-10 14:12:56
42.114.242.159 attack
1578632273 - 01/10/2020 05:57:53 Host: 42.114.242.159/42.114.242.159 Port: 445 TCP Blocked
2020-01-10 13:47:33
186.103.181.179 attack
20/1/9@23:57:03: FAIL: Alarm-Network address from=186.103.181.179
...
2020-01-10 14:10:40
23.231.32.72 attack
1,13-14/06 [bc02/m45] PostRequest-Spammer scoring: Lusaka02
2020-01-10 14:06:20
108.191.86.23 attack
Jan 10 05:11:28 ourumov-web sshd\[29938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.191.86.23  user=root
Jan 10 05:11:30 ourumov-web sshd\[29938\]: Failed password for root from 108.191.86.23 port 37456 ssh2
Jan 10 05:58:00 ourumov-web sshd\[535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.191.86.23  user=root
...
2020-01-10 13:41:36
66.172.26.61 attack
[Aegis] @ 2020-01-10 05:58:11  0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2020-01-10 13:33:06
112.85.42.174 attackspam
Jan 10 06:06:23 hosting180 sshd[6646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Jan 10 06:06:25 hosting180 sshd[6646]: Failed password for root from 112.85.42.174 port 18800 ssh2
...
2020-01-10 13:43:46
213.165.171.173 attack
Jan 10 05:58:04 grey postfix/smtpd\[369\]: NOQUEUE: reject: RCPT from c171-173.i02-3.onvol.net\[213.165.171.173\]: 554 5.7.1 Service unavailable\; Client host \[213.165.171.173\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[213.165.171.173\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-10 13:39:37
222.186.173.238 attackspam
Jan 10 06:37:39 v22018076622670303 sshd\[27209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.238  user=root
Jan 10 06:37:41 v22018076622670303 sshd\[27209\]: Failed password for root from 222.186.173.238 port 3778 ssh2
Jan 10 06:37:44 v22018076622670303 sshd\[27209\]: Failed password for root from 222.186.173.238 port 3778 ssh2
...
2020-01-10 13:40:47

最近上报的IP列表

59.82.83.238 59.82.135.18 221.207.34.50 171.8.138.6
117.14.152.174 113.128.64.199 121.43.141.195 81.163.46.156
59.82.135.213 3.255.87.234 78.222.180.71 147.185.132.138
91.232.238.112 4.241.111.42 52.82.108.110 110.42.43.196
165.227.47.218 34.38.45.85 54.205.88.37 54.174.93.161