必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Nigeria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '102.217.236.0 - 102.217.236.255'

% No abuse contact registered for 102.217.236.0 - 102.217.236.255

inetnum:        102.217.236.0 - 102.217.236.255
netname:        KAOPUCLOUD-ZA
descr:          KAOPUCLOUD Data Center
country:        ZA
admin-c:        HW11-AFRINIC
tech-c:         HW11-AFRINIC
status:         ASSIGNED PA
mnt-by:         KCL2-MNT
source:         AFRINIC # Filtered
parent:         102.217.236.0 - 102.217.239.255

person:         Hongjie Wu
nic-hdl:        HW11-AFRINIC
address:        12 Bolaji Taylor Street , off Obawde road, Aruna, Ogba Ikeja, Lagos Nigeria
address:        lagos
address:        Nigeria
phone:          tel:+86-152-8005-6043
phone:          tel:+86-189-7940-1626
mnt-by:         GENERATED-HLQNCEBQDWZGA5QX1NYMY2COCDHUWMXZ-MNT
source:         AFRINIC # Filtered

% Information related to '102.217.236.0/24AS138915'

route:          102.217.236.0/24
origin:         AS138915
descr:          Kaopu Cloud Inc Data Center
mnt-by:         KCL2-MNT
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.217.236.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.217.236.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 18:59:25 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 7.236.217.102.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.236.217.102.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
111.161.74.100 attackbots
Mar 29 06:44:22 host sshd[15919]: Invalid user delta from 111.161.74.100 port 44006
...
2020-03-29 16:00:38
49.234.207.124 attackspam
Invalid user kernel from 49.234.207.124 port 50754
2020-03-29 15:43:54
69.201.151.98 attack
Childish website spammer LOSER!~
2020-03-29 15:58:56
5.135.182.84 attackspam
Invalid user number1 from 5.135.182.84 port 56040
2020-03-29 15:20:07
77.88.55.70 attack
SSH login attempts.
2020-03-29 15:17:48
125.227.130.2 attackbotsspam
Mar 28 18:50:43 server sshd\[3562\]: Failed password for invalid user test from 125.227.130.2 port 57031 ssh2
Mar 29 09:40:17 server sshd\[24527\]: Invalid user cacti from 125.227.130.2
Mar 29 09:40:17 server sshd\[24527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125-227-130-2.hinet-ip.hinet.net 
Mar 29 09:40:19 server sshd\[24527\]: Failed password for invalid user cacti from 125.227.130.2 port 61864 ssh2
Mar 29 09:42:14 server sshd\[24868\]: Invalid user test from 125.227.130.2
...
2020-03-29 15:14:53
120.132.6.27 attack
Invalid user mqc from 120.132.6.27 port 43498
2020-03-29 15:58:35
171.38.219.187 attack
SSH login attempts.
2020-03-29 15:42:27
117.34.72.48 attack
2020-03-29T04:07:56.046602abusebot-3.cloudsearch.cf sshd[9702]: Invalid user ejp from 117.34.72.48 port 44590
2020-03-29T04:07:56.052444abusebot-3.cloudsearch.cf sshd[9702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.72.48
2020-03-29T04:07:56.046602abusebot-3.cloudsearch.cf sshd[9702]: Invalid user ejp from 117.34.72.48 port 44590
2020-03-29T04:07:57.849386abusebot-3.cloudsearch.cf sshd[9702]: Failed password for invalid user ejp from 117.34.72.48 port 44590 ssh2
2020-03-29T04:11:19.003277abusebot-3.cloudsearch.cf sshd[10040]: Invalid user qbu from 117.34.72.48 port 40830
2020-03-29T04:11:19.008514abusebot-3.cloudsearch.cf sshd[10040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.72.48
2020-03-29T04:11:19.003277abusebot-3.cloudsearch.cf sshd[10040]: Invalid user qbu from 117.34.72.48 port 40830
2020-03-29T04:11:21.006272abusebot-3.cloudsearch.cf sshd[10040]: Failed password for invalid
...
2020-03-29 15:47:39
106.13.58.178 attackbotsspam
2020-03-29T05:53:39.978978v22018076590370373 sshd[22796]: Invalid user pya from 106.13.58.178 port 50018
2020-03-29T05:53:39.985043v22018076590370373 sshd[22796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.58.178
2020-03-29T05:53:39.978978v22018076590370373 sshd[22796]: Invalid user pya from 106.13.58.178 port 50018
2020-03-29T05:53:42.465614v22018076590370373 sshd[22796]: Failed password for invalid user pya from 106.13.58.178 port 50018 ssh2
2020-03-29T05:58:06.511894v22018076590370373 sshd[9297]: Invalid user pz from 106.13.58.178 port 53574
...
2020-03-29 15:15:12
197.253.19.74 attackbotsspam
Mar 28 21:21:50 php1 sshd\[19380\]: Invalid user kjj from 197.253.19.74
Mar 28 21:21:50 php1 sshd\[19380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.19.74
Mar 28 21:21:52 php1 sshd\[19380\]: Failed password for invalid user kjj from 197.253.19.74 port 51378 ssh2
Mar 28 21:26:37 php1 sshd\[19798\]: Invalid user nancy from 197.253.19.74
Mar 28 21:26:37 php1 sshd\[19798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.253.19.74
2020-03-29 15:37:22
194.26.29.130 attack
Mar 29 09:18:41 debian-2gb-nbg1-2 kernel: \[7725384.012097\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.130 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=53257 PROTO=TCP SPT=56278 DPT=3834 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-29 15:22:38
116.196.104.100 attackspambots
SSH login attempts.
2020-03-29 15:28:15
223.9.42.236 attack
SSH login attempts.
2020-03-29 16:02:01
1.202.114.147 attack
Unauthorized connection attempt detected from IP address 1.202.114.147 to port 2222
2020-03-29 15:48:21

最近上报的IP列表

35.198.216.19 67.207.93.150 144.52.197.172 108.181.22.243
218.140.54.73 14.188.83.127 142.93.157.146 64.227.2.203
134.199.200.219 61.136.144.34 234.63.172.29 56.58.58.239
139.135.40.4 23.225.213.68 231.191.77.188 144.31.48.59
43.128.103.68 172.234.203.40 74.7.243.242 74.7.241.181