必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
23.111.147.162 attackspam
13473/tcp
[2020-04-12]1pkt
2020-04-13 08:46:22
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       23.111.12.0 - 23.111.15.255
CIDR:           23.111.12.0/22
NetName:        APNIC
NetHandle:      NET-23-111-12-0-1
Parent:         NET23 (NET-23-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2017-07-20
Updated:        2017-07-20
Ref:            https://rdap.arin.net/registry/ip/23.111.12.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois://whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '23.111.14.0 - 23.111.15.255'

% Abuse contact for '23.111.14.0 - 23.111.15.255' is 'abuse@sg.leaseweb.com'

inetnum:        23.111.14.0 - 23.111.15.255
netname:        LSW-SG
descr:          Leaseweb Asia Pacific pte. ltd.
country:        SG
admin-c:        LAPP1-AP
tech-c:         LAPP1-AP
abuse-c:        AL1457-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-LSW-SG
mnt-irt:        IRT-LSW-SG
last-modified:  2024-07-26T09:10:45Z
source:         APNIC

irt:            IRT-LSW-SG
address:        18B Keong Saik Road, Singapore 089125
e-mail:         apnic@sg.leaseweb.com
abuse-mailbox:  abuse@sg.leaseweb.com
admin-c:        LAPP1-AP
tech-c:         LAPP1-AP
auth:           # Filtered
remarks:        abuse@sg.leaseweb.com was validated on 2025-11-04
remarks:        apnic@sg.leaseweb.com was validated on 2026-02-09
mnt-by:         MAINT-LSW-SG
last-modified:  2026-02-09T11:19:56Z
source:         APNIC

role:           ABUSE LSWSG
country:        ZZ
address:        18B Keong Saik Road, Singapore 089125
phone:          +000000000
e-mail:         apnic@sg.leaseweb.com
admin-c:        LAPP1-AP
tech-c:         LAPP1-AP
nic-hdl:        AL1457-AP
remarks:        Generated from irt object IRT-LSW-SG
remarks:        abuse@sg.leaseweb.com was validated on 2025-11-04
remarks:        apnic@sg.leaseweb.com was validated on 2026-02-09
abuse-mailbox:  abuse@sg.leaseweb.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-09T11:20:10Z
source:         APNIC

role:           Leaseweb Asia Pacific pte ltd administrator
address:        18B Keong Saik Road, Singapore 089125
country:        SG
phone:          +65 3158 7350
e-mail:         apnic@sg.leaseweb.com
admin-c:        LAPP1-AP
tech-c:         LAPP1-AP
nic-hdl:        LAPP1-AP
mnt-by:         MAINT-LSW-SG
notify:         noc@network.leaseweb.com
last-modified:  2016-06-06T09:03:53Z
source:         APNIC

% Information related to '23.111.14.0/23AS59253'

route:          23.111.14.0/23
origin:         AS59253
descr:          LEASEWEB SINGAPORE PTE. LTD.
                1 Tai Seng Avenue, Tai Seng Exchange, Tower A #04-13
                536464, Singapore
mnt-by:         MAINT-LSW-SG
last-modified:  2025-12-05T14:22:40Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.111.14.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46300
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;23.111.14.190.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 24 13:01:14 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
190.14.111.23.in-addr.arpa domain name pointer l609.scanner.modat.io.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
190.14.111.23.in-addr.arpa	name = l609.scanner.modat.io.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
130.61.242.104 attack
Automated report (2020-06-21T20:11:58+08:00). Scraper detected at this address.
2020-06-22 01:46:52
49.149.69.214 attackspam
1592741517 - 06/21/2020 14:11:57 Host: 49.149.69.214/49.149.69.214 Port: 445 TCP Blocked
2020-06-22 01:46:35
184.154.189.90 attackspam
Unauthorized connection attempt detected from IP address 184.154.189.90 to port 175
2020-06-22 02:06:26
124.115.214.183 attack
Fail2Ban Ban Triggered
2020-06-22 01:46:14
112.85.42.104 attack
2020-06-21T17:52:23.299592abusebot-6.cloudsearch.cf sshd[17704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104  user=root
2020-06-21T17:52:25.129705abusebot-6.cloudsearch.cf sshd[17704]: Failed password for root from 112.85.42.104 port 64250 ssh2
2020-06-21T17:52:27.151524abusebot-6.cloudsearch.cf sshd[17704]: Failed password for root from 112.85.42.104 port 64250 ssh2
2020-06-21T17:52:23.299592abusebot-6.cloudsearch.cf sshd[17704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.104  user=root
2020-06-21T17:52:25.129705abusebot-6.cloudsearch.cf sshd[17704]: Failed password for root from 112.85.42.104 port 64250 ssh2
2020-06-21T17:52:27.151524abusebot-6.cloudsearch.cf sshd[17704]: Failed password for root from 112.85.42.104 port 64250 ssh2
2020-06-21T17:52:23.299592abusebot-6.cloudsearch.cf sshd[17704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse
...
2020-06-22 01:53:33
91.121.221.195 attackspam
Jun 21 07:42:52 dignus sshd[26837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.221.195
Jun 21 07:42:54 dignus sshd[26837]: Failed password for invalid user ftp from 91.121.221.195 port 57442 ssh2
Jun 21 07:46:07 dignus sshd[27080]: Invalid user nagios from 91.121.221.195 port 56674
Jun 21 07:46:07 dignus sshd[27080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.221.195
Jun 21 07:46:09 dignus sshd[27080]: Failed password for invalid user nagios from 91.121.221.195 port 56674 ssh2
...
2020-06-22 01:37:13
42.103.52.66 attackbotsspam
Jun 21 14:54:24 ns41 sshd[29420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.103.52.66
2020-06-22 01:52:24
212.70.149.50 attack
Jun 21 19:24:59 mail postfix/smtpd\[24841\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 21 19:55:23 mail postfix/smtpd\[25855\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 21 19:55:54 mail postfix/smtpd\[25855\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Jun 21 19:56:26 mail postfix/smtpd\[26113\]: warning: unknown\[212.70.149.50\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-06-22 01:56:23
61.177.172.143 attackbots
2020-06-21T19:47:08.278774ns386461 sshd\[31376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.143  user=root
2020-06-21T19:47:09.862525ns386461 sshd\[31376\]: Failed password for root from 61.177.172.143 port 31654 ssh2
2020-06-21T19:47:14.642571ns386461 sshd\[31376\]: Failed password for root from 61.177.172.143 port 31654 ssh2
2020-06-21T19:47:17.842402ns386461 sshd\[31376\]: Failed password for root from 61.177.172.143 port 31654 ssh2
2020-06-21T19:47:21.534575ns386461 sshd\[31376\]: Failed password for root from 61.177.172.143 port 31654 ssh2
...
2020-06-22 01:47:55
213.32.23.58 attackspambots
Jun 21 17:05:57 vpn01 sshd[14904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.23.58
Jun 21 17:05:59 vpn01 sshd[14904]: Failed password for invalid user support from 213.32.23.58 port 53914 ssh2
...
2020-06-22 01:41:55
82.145.157.199 attackbots
Honeypot attack, port: 5555, PTR: 82-145-157-199.network.biggnet.net.
2020-06-22 01:59:50
51.75.142.122 attack
2020-06-21T14:40:58.285973n23.at sshd[3764014]: Invalid user di from 51.75.142.122 port 46942
2020-06-21T14:41:00.332814n23.at sshd[3764014]: Failed password for invalid user di from 51.75.142.122 port 46942 ssh2
2020-06-21T14:47:20.384898n23.at sshd[3769109]: Invalid user dvd from 51.75.142.122 port 33998
...
2020-06-22 01:30:34
171.232.171.169 attackbotsspam
20/6/21@08:11:53: FAIL: Alarm-Network address from=171.232.171.169
20/6/21@08:11:53: FAIL: Alarm-Network address from=171.232.171.169
...
2020-06-22 01:51:31
111.39.204.136 attackspam
Jun 21 16:28:04 buvik sshd[460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.39.204.136
Jun 21 16:28:07 buvik sshd[460]: Failed password for invalid user kk from 111.39.204.136 port 57650 ssh2
Jun 21 16:30:31 buvik sshd[851]: Invalid user nikolas from 111.39.204.136
...
2020-06-22 02:00:50
106.75.119.202 attackspambots
Invalid user ryan from 106.75.119.202 port 51245
2020-06-22 02:02:28

最近上报的IP列表

2001:41d0:801:2000::5add 2606:4700:10::6816:1122 2606:4700:10::6814:6975 2606:4700:10::ac43:2594
2606:4700:10::6814:6492 192.252.185.77 35.203.210.36 113.215.188.177
162.216.150.145 121.230.89.94 2606:4700:10::6816:4080 2606:4700:10::6814:5385
2606:4700:10::6814:7049 61.1.196.167 185.45.82.130 185.248.85.22
47.128.123.102 2606:4700:10::6814:8698 121.234.219.88 2606:4700:10::6816:4944