Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.106.57.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.106.57.101.			IN	A

;; AUTHORITY SECTION:
.			169	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024093002 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 01 20:43:22 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 101.57.106.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 101.57.106.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.102.54.199 attackbots
Sep 12 22:06:30 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.54.199, lip=192.168.100.101, session=\<9RQwViOvxgBeZjbH\>\
Sep 12 22:09:53 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.54.199, lip=192.168.100.101, session=\\
Sep 12 22:12:27 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.54.199, lip=192.168.100.101, session=\\
Sep 12 22:16:42 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.54.199, lip=192.168.100.101, session=\\
Sep 12 22:20:40 pop3-login: Info: Aborted login \(auth failed, 1 attempts in 2 secs\): user=\, method=PLAIN, rip=94.102.54.199, lip=192.168.100.101, session=\\
Sep 12 22:
2020-09-13 05:31:36
43.229.153.156 attack
5x Failed Password
2020-09-13 05:33:53
167.172.152.143 attackspambots
Sep 12 22:29:42 prox sshd[1148]: Failed password for root from 167.172.152.143 port 51700 ssh2
Sep 12 22:37:30 prox sshd[8943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.152.143
2020-09-13 05:28:42
124.41.252.47 attackbots
Fail2Ban Ban Triggered
2020-09-13 05:15:13
112.85.42.185 attackbots
2020-09-13T00:06:13.704109lavrinenko.info sshd[961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185  user=root
2020-09-13T00:06:15.326216lavrinenko.info sshd[961]: Failed password for root from 112.85.42.185 port 63060 ssh2
2020-09-13T00:06:13.704109lavrinenko.info sshd[961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185  user=root
2020-09-13T00:06:15.326216lavrinenko.info sshd[961]: Failed password for root from 112.85.42.185 port 63060 ssh2
2020-09-13T00:06:18.207124lavrinenko.info sshd[961]: Failed password for root from 112.85.42.185 port 63060 ssh2
...
2020-09-13 05:17:09
222.186.169.194 attackspam
Failed password for invalid user from 222.186.169.194 port 49702 ssh2
2020-09-13 05:12:28
84.33.109.107 attack
Invalid user pi from 84.33.109.107 port 42000
2020-09-13 05:37:43
111.229.142.192 attackbotsspam
Sep 12 21:38:05 ns382633 sshd\[18406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.142.192  user=root
Sep 12 21:38:07 ns382633 sshd\[18406\]: Failed password for root from 111.229.142.192 port 49152 ssh2
Sep 12 21:49:43 ns382633 sshd\[20551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.142.192  user=root
Sep 12 21:49:45 ns382633 sshd\[20551\]: Failed password for root from 111.229.142.192 port 40256 ssh2
Sep 12 21:53:43 ns382633 sshd\[21435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.142.192  user=root
2020-09-13 05:19:55
217.182.205.27 attack
Sep 12 17:15:23 NPSTNNYC01T sshd[6592]: Failed password for root from 217.182.205.27 port 42904 ssh2
Sep 12 17:18:59 NPSTNNYC01T sshd[6950]: Failed password for root from 217.182.205.27 port 47246 ssh2
...
2020-09-13 05:25:51
102.132.211.164 attackbots
Sep 12 18:58:32 fhem-rasp sshd[18244]: User pi from 102.132.211.164 not allowed because not listed in AllowUsers
Sep 12 18:58:32 fhem-rasp sshd[18245]: User pi from 102.132.211.164 not allowed because not listed in AllowUsers
...
2020-09-13 05:24:24
49.205.247.143 attackspambots
1599929904 - 09/12/2020 18:58:24 Host: 49.205.247.143/49.205.247.143 Port: 445 TCP Blocked
2020-09-13 05:33:24
111.72.196.38 attackspam
Sep 12 19:49:18 srv01 postfix/smtpd\[7688\]: warning: unknown\[111.72.196.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 19:52:46 srv01 postfix/smtpd\[3454\]: warning: unknown\[111.72.196.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 19:53:00 srv01 postfix/smtpd\[3454\]: warning: unknown\[111.72.196.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 19:53:16 srv01 postfix/smtpd\[3454\]: warning: unknown\[111.72.196.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 19:53:35 srv01 postfix/smtpd\[3454\]: warning: unknown\[111.72.196.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-13 05:08:51
209.45.40.93 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-13 05:13:31
88.91.13.216 attackspambots
Invalid user ervisor from 88.91.13.216 port 59176
2020-09-13 05:27:22
5.188.206.34 attack
Sep 12 22:10:46 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=5.188.206.34 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=20702 PROTO=TCP SPT=53102 DPT=42030 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 12 22:15:55 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=5.188.206.34 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=456 PROTO=TCP SPT=53102 DPT=64875 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 12 22:16:19 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=5.188.206.34 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=38462 PROTO=TCP SPT=53102 DPT=46985 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 12 22:18:51 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=5.188.206.34 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=11675 PROTO=TCP SPT=53102 DPT=59565 WINDOW=1024 RES=0x00 SYN URGP=0 Sep 12 22:22:28 *hidden* kerne
...
2020-09-13 05:27:36

Recently Reported IPs

239.154.59.137 15.67.194.82 132.185.5.130 81.141.173.115
7.184.183.210 100.78.86.154 172.249.178.247 52.83.15.22
6.162.232.60 126.70.147.64 231.35.50.218 55.30.89.167
241.190.213.23 2003:6:375:5455:106c:67e1:d34e:1fb3 54.178.70.112 181.223.85.211
135.153.43.36 103.99.176.169 172.168.47.71 103.99.176.69