必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '102.129.128.0 - 102.129.255.255'

% Abuse contact for '102.129.128.0 - 102.129.255.255' is 'report@abuseradar.com'

inetnum:        102.129.128.0 - 102.129.255.255
netname:        Internet-Utilities-Africa-PTY-LTD-v4-3
descr:          DET Africa (Pty) LTD
country:        ZA
org:            ORG-DAL1-AFRINIC
admin-c:        PZ8-AFRINIC
admin-c:        VG4-AFRINIC
admin-c:        PU9-AFRINIC
admin-c:        ER12-AFRINIC
admin-c:        GM62-AFRINIC
tech-c:         PZ8-AFRINIC
tech-c:         VN17-AFRINIC
tech-c:         RK62-AFRINIC
tech-c:         PU9-AFRINIC
tech-c:         ER12-AFRINIC
tech-c:         GM62-AFRINIC
status:         ALLOCATED PA
mnt-by:         AFRINIC-HM-MNT
mnt-lower:      netutils-mnt
mnt-domains:    netutils-mnt
mnt-irt:        IRT-NETUTILS
source:         AFRINIC # Filtered
parent:         102.0.0.0 - 102.255.255.255

organisation:   ORG-DAL1-AFRINIC
org-name:       Internet Utilities Africa (PTY) LTD
org-type:       LIR
country:        ZA
address:        300 Acacia Road
address:        Gauteng (2194)
phone:          tel:+27-10-595-1279
phone:          tel:+44-151-528-5820
phone:          tel:+44-37069908833
phone:          tel:+370-699-08833
admin-c:        PU9-AFRINIC
admin-c:        ER12-AFRINIC
admin-c:        GM62-AFRINIC
admin-c:        VG4-AFRINIC
admin-c:        PZ8-AFRINIC
tech-c:         PU9-AFRINIC
tech-c:         ER12-AFRINIC
tech-c:         GM62-AFRINIC
tech-c:         RK62-AFRINIC
tech-c:         VN17-AFRINIC
tech-c:         PZ8-AFRINIC
mnt-ref:        AFRINIC-HM-MNT
mnt-ref:        DAL1-MNT
mnt-by:         AFRINIC-HM-MNT
source:         AFRINIC # Filtered

person:         Edvinas Rackauskas
nic-hdl:        ER12-AFRINIC
address:        Ground Floor, 4 Victoria Square, St Albans, Hertfordshire
address:        United Kingdom
address:        London
address:        Other
abuse-mailbox:  report@abuseradar.com
phone:          tel:+44-330-808-0975
mnt-by:         IPXO-MNT
source:         AFRINIC # Filtered

person:         Gintare Mikolaviciute
address:        Ground Floor, 4 Victoria Square, St Albans, address: Hertfordshire
address:        London
address:        United Kingdom
phone:          tel:+370-699-08833
nic-hdl:        GM62-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-QNNY6JPVCAHRHXWCMZTWCGYBYPSNHWKW-MNT

person:         Paulius Urbonas
address:        Ground Floor, 4 Victoria Square, St Albans, Hertfordshire
address:        London
address:        United Kingdom
phone:          tel:+370-699-08833
nic-hdl:        PU9-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-ZYI6LN9JYTSFUIZ1PE5MAU8U58WFHQHK-MNT

person:         Paulius Zaura
address:        Ground Floor, 4 Victoria Square, St Albans, address: Hertfordshire
address:        London
address:        United Kingdom
phone:          tel:+370-699-08833
nic-hdl:        PZ8-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-PYEUHBXKJ43AUEHY1FEFVRTC0W65OTPE-MNT

person:         Rugile Katiliute
address:        Ground Floor, 4 Victoria Square, St Albans, Hertfordshire
address:        London
address:        United Kingdom
phone:          tel:+370-658-96325
nic-hdl:        RK62-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-P1UMN3XW6HENYKFOKUXPMEQSLOTWLEL5-MNT

person:         Vincentas Grinius
nic-hdl:        VG4-AFRINIC
address:        300 Acacia Road
address:        Darrenwood
address:        Randburg
address:        Gauteng 2194
address:        South Africa
address:        Randburg
address:        Other
phone:          tel:+27-10-595-1279
mnt-by:         IPXO-MNT
source:         AFRINIC # Filtered

person:         Vladislav Novickas
address:        Ground Floor, 4 Victoria Square, St Albans, Hertfordshire
address:        London
address:        United Kingdom
phone:          tel:+44-37069908833
nic-hdl:        VN17-AFRINIC
source:         AFRINIC # Filtered
mnt-by:         GENERATED-RBL5LVAWDNMCLANKL7SLLCJBDGLLKRBL-MNT

% Information related to '102.129.165.0/24AS329184'

route:          102.129.165.0/24
origin:         AS329184
descr:          IPXO
mnt-by:         DAL1-MNT
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.129.165.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1005
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.129.165.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110500 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 05 22:54:52 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 86.165.129.102.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 86.165.129.102.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
115.84.179.214 attackbotsspam
Unauthorized connection attempt from IP address 115.84.179.214 on Port 445(SMB)
2020-05-09 21:21:32
51.75.140.153 attack
SSH-BruteForce
2020-05-09 20:59:10
216.244.66.227 attackspam
20 attempts against mh-misbehave-ban on plane
2020-05-09 20:56:25
183.63.87.236 attack
$f2bV_matches
2020-05-09 21:23:40
101.91.205.181 attack
Unauthorized connection attempt detected from IP address 101.91.205.181 to port 6380 [T]
2020-05-09 21:15:29
185.143.75.157 attackspam
May  9 04:58:22 v22019058497090703 postfix/smtpd[403]: warning: unknown[185.143.75.157]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  9 04:59:02 v22019058497090703 postfix/smtpd[403]: warning: unknown[185.143.75.157]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  9 04:59:45 v22019058497090703 postfix/smtpd[403]: warning: unknown[185.143.75.157]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-09 21:11:55
183.88.38.16 attack
1585235485 - 03/26/2020 16:11:25 Host: 183.88.38.16/183.88.38.16 Port: 445 TCP Blocked
2020-05-09 21:00:12
54.39.22.191 attackbotsspam
odoo8
...
2020-05-09 21:38:28
177.125.164.225 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-09 21:40:20
159.89.177.46 attackspambots
May  9 02:18:12 xeon sshd[19726]: Failed password for invalid user computer from 159.89.177.46 port 49546 ssh2
2020-05-09 21:24:14
222.186.180.130 attackbots
May  9 04:54:26 santamaria sshd\[14323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
May  9 04:54:28 santamaria sshd\[14323\]: Failed password for root from 222.186.180.130 port 20656 ssh2
May  9 04:54:30 santamaria sshd\[14323\]: Failed password for root from 222.186.180.130 port 20656 ssh2
...
2020-05-09 21:26:01
58.87.120.53 attackbots
2020-05-09T00:42:38.178234abusebot-5.cloudsearch.cf sshd[25979]: Invalid user xqf from 58.87.120.53 port 47252
2020-05-09T00:42:38.185882abusebot-5.cloudsearch.cf sshd[25979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53
2020-05-09T00:42:38.178234abusebot-5.cloudsearch.cf sshd[25979]: Invalid user xqf from 58.87.120.53 port 47252
2020-05-09T00:42:40.092278abusebot-5.cloudsearch.cf sshd[25979]: Failed password for invalid user xqf from 58.87.120.53 port 47252 ssh2
2020-05-09T00:46:45.379022abusebot-5.cloudsearch.cf sshd[25982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53  user=root
2020-05-09T00:46:47.195057abusebot-5.cloudsearch.cf sshd[25982]: Failed password for root from 58.87.120.53 port 45858 ssh2
2020-05-09T00:50:38.742572abusebot-5.cloudsearch.cf sshd[25988]: Invalid user pk from 58.87.120.53 port 44376
...
2020-05-09 20:47:23
159.89.171.121 attack
May  9 04:31:10 host sshd[55957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=www.letsthankyou.com  user=root
May  9 04:31:12 host sshd[55957]: Failed password for root from 159.89.171.121 port 39460 ssh2
...
2020-05-09 21:19:38
222.186.180.41 attack
May  9 04:58:32 minden010 sshd[8221]: Failed password for root from 222.186.180.41 port 21676 ssh2
May  9 04:58:35 minden010 sshd[8221]: Failed password for root from 222.186.180.41 port 21676 ssh2
May  9 04:58:38 minden010 sshd[8221]: Failed password for root from 222.186.180.41 port 21676 ssh2
May  9 04:58:41 minden010 sshd[8221]: Failed password for root from 222.186.180.41 port 21676 ssh2
...
2020-05-09 21:20:39
94.102.52.57 attackbots
Fail2Ban Ban Triggered
2020-05-09 21:25:22

最近上报的IP列表

61.179.178.103 42.239.183.99 42.234.43.72 42.234.196.236
39.190.132.80 36.159.176.39 223.88.63.62 211.156.80.139
183.253.146.200 183.241.182.186 183.198.193.57 175.44.80.169
135.237.126.195 120.243.114.199 120.230.23.102 106.8.142.109
218.248.90.37 218.248.90.69 37.78.233.130 135.237.127.161