城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.75.141.219 | attackspam | Invalid user shop from 106.75.141.219 port 48330 |
2020-10-14 01:34:36 |
| 106.75.141.219 | attackbots | 2020-10-13T00:08:57.751318morrigan.ad5gb.com sshd[907538]: Invalid user cacti from 106.75.141.219 port 46868 |
2020-10-13 16:45:00 |
| 106.75.141.160 | attack | Brute-force attempt banned |
2020-09-14 21:05:31 |
| 106.75.141.160 | attackbots | $f2bV_matches |
2020-09-14 12:58:35 |
| 106.75.141.160 | attack | SSH Brute-Force Attack |
2020-09-14 04:59:22 |
| 106.75.141.223 | attackbotsspam |
|
2020-09-10 21:56:08 |
| 106.75.141.223 | attackspambots |
|
2020-09-10 13:36:55 |
| 106.75.141.223 | attack |
|
2020-09-10 04:19:39 |
| 106.75.141.160 | attackbots | SSH login attempts. |
2020-09-08 00:34:29 |
| 106.75.141.160 | attack | Sep 7 09:21:15 ip106 sshd[27329]: Failed password for root from 106.75.141.160 port 44922 ssh2 Sep 7 09:23:58 ip106 sshd[27423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160 ... |
2020-09-07 16:03:10 |
| 106.75.141.160 | attack | Sep 6 18:27:07 ns382633 sshd\[3463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160 user=root Sep 6 18:27:09 ns382633 sshd\[3463\]: Failed password for root from 106.75.141.160 port 50476 ssh2 Sep 6 18:50:24 ns382633 sshd\[7607\]: Invalid user ggggg from 106.75.141.160 port 40336 Sep 6 18:50:24 ns382633 sshd\[7607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160 Sep 6 18:50:26 ns382633 sshd\[7607\]: Failed password for invalid user ggggg from 106.75.141.160 port 40336 ssh2 |
2020-09-07 08:25:20 |
| 106.75.141.223 | attackbots | " " |
2020-09-06 01:06:12 |
| 106.75.141.223 | attackbots | " " |
2020-09-05 16:37:01 |
| 106.75.141.202 | attackbots | SSH auth scanning - multiple failed logins |
2020-08-28 17:58:24 |
| 106.75.141.48 | attackspambots | 2020-08-26 13:40:37 unexpected disconnection while reading SMTP command from online-mails.com [106.75.141.48]:34000 I=[10.100.18.25]:25 2020-08-26 14:11:16 unexpected disconnection while reading SMTP command from online-mails.com [106.75.141.48]:51844 I=[10.100.18.25]:25 2020-08-26 14:52:10 unexpected disconnection while reading SMTP command from online-mails.com [106.75.141.48]:47470 I=[10.100.18.25]:25 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=106.75.141.48 |
2020-08-27 16:20:46 |
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '106.75.0.0 - 106.75.255.255'
% Abuse contact for '106.75.0.0 - 106.75.255.255' is 'jacky.jia@ucloud.cn'
inetnum: 106.75.0.0 - 106.75.255.255
netname: UCLOUD-NET
descr: Shanghai UCloud Information Technology Company Limited
country: CN
admin-c: JJ2197-AP
tech-c: JJ2197-AP
abuse-c: AC1601-AP
status: ALLOCATED PORTABLE
mnt-by: MAINT-CNNIC-AP
mnt-irt: IRT-UCLOUD-NET-CN
mnt-lower: MAINT-CNNIC-AP
mnt-routes: MAINT-CNNIC-AP
last-modified: 2023-11-28T00:56:50Z
source: APNIC
irt: IRT-UCLOUD-NET-CN
address: 2nd Floor 3rd Building No.200 EAST Guoding Road,Yangpu District,Shanghai
e-mail: jacky.jia@ucloud.cn
abuse-mailbox: jacky.jia@ucloud.cn
admin-c: JJ2197-AP
tech-c: JJ2197-AP
auth: # Filtered
mnt-by: MAINT-CNNIC-AP
last-modified: 2025-11-18T00:35:05Z
source: APNIC
role: ABUSE CNNICCN
country: ZZ
address: Beijing, China
phone: +000000000
e-mail: ipas@cnnic.cn
admin-c: IP50-AP
tech-c: IP50-AP
nic-hdl: AC1601-AP
remarks: Generated from irt object IRT-CNNIC-CN
remarks: ipas@cnnic.cn is invalid
abuse-mailbox: ipas@cnnic.cn
mnt-by: APNIC-ABUSE
last-modified: 2025-09-19T17:20:32Z
source: APNIC
person: Jinhui Jia
e-mail: hegui@ucloud.cn
address: 510,SOHO B,Zhongguancun,Haidian, Beijing
phone: +86-13811069300
country: CN
mnt-by: MAINT-CNNIC-AP
nic-hdl: JJ2197-AP
last-modified: 2022-03-23T06:19:21Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.75.141.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22190
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.75.141.82. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020300 1800 900 604800 86400
;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 04 01:30:04 CST 2026
;; MSG SIZE rcvd: 106
82.141.75.106.in-addr.arpa domain name pointer hmbpctz.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
82.141.75.106.in-addr.arpa name = hmbpctz.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 181.123.104.93 | attackspam | Spam |
2020-03-05 23:06:35 |
| 79.1.80.83 | attackspam | Mar 5 14:54:49 MK-Soft-VM4 sshd[6087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.1.80.83 Mar 5 14:54:51 MK-Soft-VM4 sshd[6087]: Failed password for invalid user test2 from 79.1.80.83 port 49966 ssh2 ... |
2020-03-05 23:07:04 |
| 113.173.54.25 | attackspam | suspicious action Thu, 05 Mar 2020 10:35:02 -0300 |
2020-03-05 22:56:38 |
| 167.172.225.71 | attackbotsspam | Jan 19 08:45:08 odroid64 sshd\[30065\]: Invalid user cs from 167.172.225.71 Jan 19 08:45:08 odroid64 sshd\[30065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.225.71 ... |
2020-03-05 23:28:12 |
| 167.172.252.106 | attackbotsspam | Nov 29 12:40:28 odroid64 sshd\[27916\]: Invalid user support from 167.172.252.106 Nov 29 12:40:28 odroid64 sshd\[27916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.252.106 ... |
2020-03-05 23:22:02 |
| 187.110.64.198 | attack | SSH Authentication Attempts Exceeded |
2020-03-05 23:24:37 |
| 5.62.60.17 | attackbots | GET /owa/auth/logon.aspx?replaceCurrent=1&url= HTTP/1.1 |
2020-03-05 23:18:43 |
| 113.190.246.42 | attackbotsspam | suspicious action Thu, 05 Mar 2020 10:34:51 -0300 |
2020-03-05 23:14:36 |
| 157.230.190.1 | attackspam | Mar 5 10:06:31 server sshd\[4676\]: Invalid user impala from 157.230.190.1 Mar 5 10:06:31 server sshd\[4676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.1 Mar 5 10:06:33 server sshd\[4676\]: Failed password for invalid user impala from 157.230.190.1 port 53180 ssh2 Mar 5 16:34:54 server sshd\[14936\]: Invalid user webadmin from 157.230.190.1 Mar 5 16:34:54 server sshd\[14936\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.190.1 ... |
2020-03-05 23:07:59 |
| 139.59.71.104 | attack | Mar 5 14:49:38 sigma sshd\[9898\]: Invalid user openmail from 139.59.71.104Mar 5 14:49:40 sigma sshd\[9898\]: Failed password for invalid user openmail from 139.59.71.104 port 56858 ssh2 ... |
2020-03-05 22:59:43 |
| 107.158.44.150 | attackbots | Mar 5 14:34:51 grey postfix/smtpd\[29460\]: NOQUEUE: reject: RCPT from unknown\[107.158.44.150\]: 554 5.7.1 Service unavailable\; Client host \[107.158.44.150\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[107.158.44.150\]\; from=\ |
2020-03-05 23:12:53 |
| 41.33.187.162 | attackbots | 445/tcp [2020-03-05]1pkt |
2020-03-05 23:23:45 |
| 103.26.79.146 | attack | 3306/tcp [2020-03-05]1pkt |
2020-03-05 22:54:23 |
| 142.93.73.89 | attackspambots | CMS (WordPress or Joomla) login attempt. |
2020-03-05 22:56:16 |
| 77.35.158.176 | attackbotsspam | suspicious action Thu, 05 Mar 2020 10:34:41 -0300 |
2020-03-05 23:34:53 |