必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Batna City

省份(region): Batna

国家(country): Algeria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '105.106.64.0 - 105.106.95.255'

% No abuse contact registered for 105.106.64.0 - 105.106.95.255

inetnum:        105.106.64.0 - 105.106.95.255
netname:        BATNA
descr:          EASY BARNA
country:        DZ
admin-c:        SD6-AFRINIC
tech-c:         SD6-AFRINIC
status:         ASSIGNED PA
mnt-by:         DJAWEB-MNT
source:         AFRINIC # Filtered
parent:         105.96.0.0 - 105.111.255.255

person:         Security Departement
address:        Alger
phone:          tel:+213-21-91-12-24
fax-no:         tel:+213-21-91-12-08
nic-hdl:        SD6-AFRINIC
mnt-by:         GENERATED-IRIXFFLWUREDGEB9HMRODGUJH3OJCIPE-MNT
source:         AFRINIC # Filtered

% Information related to '105.96.0.0/12AS36947'

route:          105.96.0.0/12
descr:          Algerie Telecom
origin:         AS36947
mnt-by:         DJAWEB-MNT
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.106.79.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.106.79.143.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042501 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 26 03:17:39 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 143.79.106.105.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.79.106.105.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
182.135.10.233 attackspambots
445/tcp
[2019-06-21]1pkt
2019-06-22 04:27:12
187.199.29.217 attackspambots
SS5,WP GET /wp-login.php
2019-06-22 04:26:08
103.41.146.207 attackspambots
Request: "GET / HTTP/1.1"
2019-06-22 04:46:04
183.61.128.188 attack
2019-06-21T21:46:18.962181centos sshd\[28456\]: Invalid user kun from 183.61.128.188 port 54984
2019-06-21T21:46:18.972923centos sshd\[28456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.61.128.188
2019-06-21T21:46:21.034677centos sshd\[28456\]: Failed password for invalid user kun from 183.61.128.188 port 54984 ssh2
2019-06-22 04:45:36
185.254.120.6 attackspambots
Jun 21 21:46:36 * sshd[19398]: Failed password for root from 185.254.120.6 port 43027 ssh2
Jun 21 21:46:36 * sshd[19398]: error: Received disconnect from 185.254.120.6 port 43027:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
2019-06-22 04:35:36
92.119.237.3 attackbots
NAME : ISANET-Customers1 CIDR : 92.119.236.0/23 DDoS attack Albania - block certain countries :) IP: 92.119.237.3  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 04:18:17
91.205.210.82 attackbotsspam
Jun 21 21:39:46 mail kernel: \[191531.626448\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=91.205.210.82 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=242 ID=48607 DF PROTO=TCP SPT=26165 DPT=23 WINDOW=14600 RES=0x00 SYN URGP=0 
Jun 21 21:40:55 mail kernel: \[191600.622641\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=91.205.210.82 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=242 ID=58811 DF PROTO=TCP SPT=49836 DPT=7547 WINDOW=14600 RES=0x00 SYN URGP=0 
Jun 21 21:46:38 mail kernel: \[191943.621421\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=91.205.210.82 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=242 ID=6602 DF PROTO=TCP SPT=59278 DPT=8291 WINDOW=14600 RES=0x00 SYN URGP=0
2019-06-22 04:32:56
138.118.100.245 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 04:39:44
154.223.171.112 attackbotsspam
445/tcp
[2019-06-21]1pkt
2019-06-22 04:41:58
58.140.223.27 attackbots
20 attempts against mh-ssh on sonic.magehost.pro
2019-06-22 04:47:00
196.52.43.112 attackspam
Request: "GET / HTTP/1.0"
2019-06-22 04:21:06
18.188.164.133 attackspam
/wp-login.php
2019-06-22 04:10:16
192.144.221.221 attackbotsspam
Jun 22 04:46:29 martinbaileyphotography sshd\[10373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.221.221  user=root
Jun 22 04:46:31 martinbaileyphotography sshd\[10373\]: Failed password for root from 192.144.221.221 port 59086 ssh2
Jun 22 04:46:33 martinbaileyphotography sshd\[10431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.221.221  user=root
Jun 22 04:46:35 martinbaileyphotography sshd\[10431\]: Failed password for root from 192.144.221.221 port 59290 ssh2
Jun 22 04:46:36 martinbaileyphotography sshd\[10492\]: Invalid user pi from 192.144.221.221 port 59504
...
2019-06-22 04:35:07
64.180.64.240 attackspam
Hit on /wp-login.php
2019-06-22 04:53:32
72.48.210.139 attackspam
Lines containing failures of 72.48.210.139
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.207424+01:00 ticdesk sshd[6008]: Invalid user pi from 72.48.210.139 port 55772
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.390686+01:00 ticdesk sshd[6008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.210.139 
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.406120+01:00 ticdesk sshd[6008]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.210.139 user=pi
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.443772+01:00 ticdesk sshd[6010]: Invalid user pi from 72.48.210.139 port 55774
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.626195+01:00 ticdesk sshd[6010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.210.139 
/var/log/apache/pucorp.org.log:2019-06-21T17:07:12.627843+01:00 ticdesk sshd[6010]: pam_sss(sshd:auth): authenticat........
------------------------------
2019-06-22 04:40:30

最近上报的IP列表

201.19.155.61 218.106.207.221 2606:4700:10::6816:794 2606:4700:10::6816:165
2606:4700:10::6814:5423 2606:4700:10::6816:1659 165.140.238.64 160.119.76.21
159.223.38.45 129.121.38.216 25.217.185.55 234.193.57.221
193.24.123.118 110.78.150.155 2606:4700:10::6814:7899 2606:4700:10::6814:5571
14.212.68.129 118.193.40.131 147.185.133.212 43.230.106.23