Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
106.11.155.72 attack
The IP has triggered Cloudflare WAF. CF-Ray: 5415a3d57e8b76fe | WAF_Rule_ID: f6705d4933894b0583ba1042603083f6 | WAF_Kind: firewall | CF_Action: drop | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: theme-suka.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safari/537.36 | CF_DC: LAX. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 06:07:32
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.11.155.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.11.155.14.			IN	A

;; AUTHORITY SECTION:
.			138	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 09:48:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
14.155.11.106.in-addr.arpa domain name pointer shenmaspider-106-11-155-14.crawl.sm.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.155.11.106.in-addr.arpa	name = shenmaspider-106-11-155-14.crawl.sm.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.77.50.25 attackbotsspam
Automatic report - Banned IP Access
2020-07-07 03:26:34
115.72.6.231 attack
Unauthorized connection attempt detected from IP address 115.72.6.231 to port 81
2020-07-07 03:37:01
125.69.68.125 attack
sshd fail2ban
2020-07-07 03:37:36
79.190.172.110 attackbots
Unauthorized connection attempt detected from IP address 79.190.172.110 to port 23
2020-07-07 03:14:00
51.116.191.18 attackbots
Unauthorized connection attempt detected from IP address 51.116.191.18 to port 23
2020-07-07 03:15:46
24.74.131.36 attackspambots
Unauthorized connection attempt detected from IP address 24.74.131.36 to port 23
2020-07-07 03:47:04
138.0.92.230 attack
Unauthorized connection attempt detected from IP address 138.0.92.230 to port 23
2020-07-07 03:33:38
115.201.107.58 attackspam
Unauthorized connection attempt detected from IP address 115.201.107.58 to port 8080
2020-07-07 03:36:23
49.235.37.232 attackbots
(sshd) Failed SSH login from 49.235.37.232 (CN/China/-): 5 in the last 3600 secs
2020-07-07 03:16:19
138.0.92.95 attackbots
Unauthorized connection attempt detected from IP address 138.0.92.95 to port 23
2020-07-07 03:34:12
49.51.160.201 attackspambots
Unauthorized connection attempt detected from IP address 49.51.160.201 to port 515
2020-07-07 03:44:40
80.253.147.65 attack
Unauthorized connection attempt detected from IP address 80.253.147.65 to port 445
2020-07-07 03:13:31
171.250.115.114 attackbots
Unauthorized connection attempt detected from IP address 171.250.115.114 to port 23
2020-07-07 03:29:01
187.12.151.162 attack
Unauthorized connection attempt detected from IP address 187.12.151.162 to port 23
2020-07-07 03:25:47
220.83.12.217 attackbots
Automatic report - Port Scan Attack
2020-07-07 03:22:28

Recently Reported IPs

169.229.225.158 180.76.62.220 180.76.62.245 106.11.158.68
198.148.124.169 169.229.242.206 80.82.64.87 180.76.66.141
169.229.244.11 169.229.242.46 5.183.253.249 186.210.123.163
198.211.28.19 137.226.106.245 137.226.180.215 137.226.245.220
169.229.240.245 180.76.63.210 220.181.124.125 180.76.75.189