必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       23.106.48.0 - 23.106.55.255
CIDR:           23.106.48.0/21
NetName:        APNIC
NetHandle:      NET-23-106-48-0-2
Parent:         NET23 (NET-23-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2022-09-26
Updated:        2022-09-26
Ref:            https://rdap.arin.net/registry/ip/23.106.48.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  https://apps.db.ripe.net/db-web-ui/query

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '23.106.52.0 - 23.106.55.255'

% Abuse contact for '23.106.52.0 - 23.106.55.255' is 'abuse@sg.leaseweb.com'

inetnum:        23.106.52.0 - 23.106.55.255
netname:        LSW-SG-SIN10-2
descr:          Leaseweb Asia Pacific Pte. Ltd.
country:        SG
admin-c:        LAPP1-AP
tech-c:         LAPP1-AP
abuse-c:        AL1457-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-LSW-SG
mnt-irt:        IRT-LSW-SG
last-modified:  2024-07-25T09:50:30Z
source:         APNIC

irt:            IRT-LSW-SG
address:        18B Keong Saik Road, Singapore 089125
e-mail:         apnic@sg.leaseweb.com
abuse-mailbox:  abuse@sg.leaseweb.com
admin-c:        LAPP1-AP
tech-c:         LAPP1-AP
auth:           # Filtered
remarks:        abuse@sg.leaseweb.com was validated on 2025-04-29
remarks:        apnic@sg.leaseweb.com was validated on 2025-05-30
mnt-by:         MAINT-LSW-SG
last-modified:  2025-09-04T07:02:04Z
source:         APNIC

role:           ABUSE LSWSG
country:        ZZ
address:        18B Keong Saik Road, Singapore 089125
phone:          +000000000
e-mail:         apnic@sg.leaseweb.com
admin-c:        LAPP1-AP
tech-c:         LAPP1-AP
nic-hdl:        AL1457-AP
remarks:        Generated from irt object IRT-LSW-SG
remarks:        abuse@sg.leaseweb.com was validated on 2025-04-29
remarks:        apnic@sg.leaseweb.com was validated on 2025-05-30
abuse-mailbox:  abuse@sg.leaseweb.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-05-30T11:09:05Z
source:         APNIC

role:           Leaseweb Asia Pacific pte ltd administrator
address:        18B Keong Saik Road, Singapore 089125
country:        SG
phone:          +65 3158 7350
e-mail:         apnic@sg.leaseweb.com
admin-c:        LAPP1-AP
tech-c:         LAPP1-AP
nic-hdl:        LAPP1-AP
mnt-by:         MAINT-LSW-SG
notify:         noc@network.leaseweb.com
last-modified:  2016-06-06T09:03:53Z
source:         APNIC

% Information related to '23.106.48.0/21AS59253'

route:          23.106.48.0/21
origin:         AS59253
descr:          LEASEWEB SINGAPORE PTE. LTD.
                18B Keong Saik Road
                Singapore, 089125
mnt-by:         MAINT-LWS-SG
last-modified:  2025-01-13T14:09:57Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.106.54.151
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24940
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;23.106.54.151.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100702 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 08 08:31:16 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
151.54.106.23.in-addr.arpa domain name pointer l70.scanner.modat.io.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
151.54.106.23.in-addr.arpa	name = l70.scanner.modat.io.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.62.33.138 attackspam
Jan  2 01:05:04 lnxweb61 sshd[412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.33.138
2020-01-02 09:07:21
103.84.194.245 attack
Jan  2 00:50:32 mail1 sshd\[20945\]: Invalid user info from 103.84.194.245 port 45892
Jan  2 00:50:32 mail1 sshd\[20945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.194.245
Jan  2 00:50:34 mail1 sshd\[20945\]: Failed password for invalid user info from 103.84.194.245 port 45892 ssh2
Jan  2 01:01:24 mail1 sshd\[25788\]: Invalid user soulfree from 103.84.194.245 port 40644
Jan  2 01:01:24 mail1 sshd\[25788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.194.245
...
2020-01-02 08:31:36
160.16.196.174 attackbotsspam
Jan  2 01:04:16 lnxded64 sshd[30380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.16.196.174
2020-01-02 09:06:23
222.186.180.130 attack
Unauthorized connection attempt detected from IP address 222.186.180.130 to port 22
2020-01-02 08:56:40
61.73.231.207 attack
$f2bV_matches
2020-01-02 08:48:01
58.215.13.154 attack
B: Magento admin pass test (wrong country)
2020-01-02 08:34:07
213.82.114.206 attackbotsspam
Jan  2 00:07:13 ks10 sshd[7114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.82.114.206 
Jan  2 00:07:15 ks10 sshd[7114]: Failed password for invalid user webmaster from 213.82.114.206 port 59810 ssh2
...
2020-01-02 08:40:51
46.101.105.55 attack
Jan  2 01:44:09 localhost sshd\[3942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.105.55  user=root
Jan  2 01:44:11 localhost sshd\[3942\]: Failed password for root from 46.101.105.55 port 56426 ssh2
Jan  2 01:47:13 localhost sshd\[5008\]: Invalid user doroteya from 46.101.105.55 port 59894
2020-01-02 08:51:16
106.12.24.193 attackspambots
SSH-BruteForce
2020-01-02 09:02:02
202.164.48.202 attackbotsspam
Invalid user handall from 202.164.48.202 port 47393
2020-01-02 08:48:42
106.54.124.250 attack
$f2bV_matches
2020-01-02 08:33:19
112.85.42.227 attack
Jan  1 19:20:45 TORMINT sshd\[26573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.227  user=root
Jan  1 19:20:46 TORMINT sshd\[26573\]: Failed password for root from 112.85.42.227 port 27466 ssh2
Jan  1 19:20:48 TORMINT sshd\[26573\]: Failed password for root from 112.85.42.227 port 27466 ssh2
...
2020-01-02 08:30:44
185.156.73.57 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-01-02 08:41:57
222.189.178.146 attackbotsspam
Automatic report - Port Scan Attack
2020-01-02 09:03:14
116.196.82.52 attackspam
Unauthorized SSH login attempts
2020-01-02 09:03:39

最近上报的IP列表

144.172.106.240 103.237.86.188 115.227.19.81 40.124.186.156
119.181.18.97 162.216.149.249 198.235.24.218 42.234.17.151
42.224.158.96 222.139.119.206 182.127.137.140 123.152.164.193
120.82.93.17 120.14.81.143 116.133.79.121 111.166.155.225
110.244.91.130 139.5.10.106 159.144.215.218 146.190.105.69