必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Alberton

省份(region): Gauteng

国家(country): South Africa

运营商(isp): Telkom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '105.184.0.0 - 105.184.255.255'

% No abuse contact registered for 105.184.0.0 - 105.184.255.255

inetnum:        105.184.0.0 - 105.184.255.255
netname:        Telkom_Internet_Broadband_105_184
descr:          Addresses used to provide Broadband access to Telkom Internet customer
descr:          Abuse Contact: abuse@telkomsa.net
descr:          Tel: +27 12 3523661
country:        ZA
admin-c:        pb455-afrinic
tech-c:         pb455-afrinic
status:         ASSIGNED PA
remarks:        Abuse Contact: abuse@telkomsa.net
remarks:        Tel: +27 12 3523661
mnt-by:         TF-165-143-0-0-165-149-255-255-MNT
source:         AFRINIC # Filtered
parent:         105.184.0.0 - 105.187.255.255

person:         Pieter Bezuidenhout
address:        Telkom SA Ltd
address:        PO Box 2753
address:        Pretoria
address:        Gauteng
address:        0001
address:        ZA
phone:          tel:+1-111-111-1111
fax-no:         tel:+27-21-311-1111
nic-hdl:        PB455-AFRINIC
remarks:        Abuse complaints can be directed to abuse@saix.net
remarks:        DNS Issues can be directed to dnsadmin@saix.net. Alex, can you see this
abuse-mailbox:  abuse@saix.net
mnt-by:         GENERATED-VBGUTFTPI6D5BTFKNJLKEZOJLKKWX2IX-MNT
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.184.169.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.184.169.132.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050601 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 02:12:41 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
b'132.169.184.105.in-addr.arpa domain name pointer 169-184-105-132.north.dsl.telkomsa.net.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.169.184.105.in-addr.arpa	name = 169-184-105-132.north.dsl.telkomsa.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
68.183.92.52 attackbotsspam
Invalid user samba from 68.183.92.52 port 35526
2020-06-21 06:27:53
61.219.11.153 attackbots
Brute force attack stopped by firewall
2020-06-21 06:49:35
60.13.218.82 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-21 06:50:01
122.51.178.89 attackspambots
Invalid user david from 122.51.178.89 port 44900
2020-06-21 06:42:08
71.228.61.137 attack
Jun 20 23:38:27 mout sshd[11213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.228.61.137  user=pi
Jun 20 23:38:29 mout sshd[11213]: Failed password for pi from 71.228.61.137 port 60032 ssh2
Jun 20 23:38:31 mout sshd[11213]: Connection closed by authenticating user pi 71.228.61.137 port 60032 [preauth]
2020-06-21 06:27:23
45.143.220.243 attackspambots
Multiport scan : 4 ports scanned 5093 5094 5095 5096
2020-06-21 06:52:14
189.196.91.122 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-21 06:57:10
131.100.38.226 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-21 06:41:16
89.248.174.3 attackbotsspam
 TCP (SYN) 89.248.174.3:54479 -> port 8888, len 44
2020-06-21 06:44:39
46.8.173.223 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-21 06:51:59
185.53.88.9 attackbots
06/20/2020-18:37:33.356868 185.53.88.9 Protocol: 17 ET SCAN Sipvicious Scan
2020-06-21 06:38:53
51.255.171.172 attack
SSH Invalid Login
2020-06-21 06:35:49
116.255.139.236 attackbotsspam
SSH Brute Force
2020-06-21 06:24:41
123.207.2.120 attack
SSH Invalid Login
2020-06-21 06:23:01
185.39.11.48 attack
 TCP (SYN) 185.39.11.48:41426 -> port 3389, len 44
2020-06-21 06:39:25

最近上报的IP列表

121.230.89.25 2606:4700:10::ac43:1013 2606:4700:10::6816:3931 2606:4700:10::6816:2890
88.101.166.2 2606:4700:10::6814:9225 2606:4700:10::6816:1680 2606:4700:10::6814:8215
47.92.73.153 39.99.152.129 39.103.129.226 39.99.156.182
162.216.150.11 122.193.247.212 26.33.5.24 100.104.117.141
163.223.86.101 110.77.187.15 2606:4700:10::6814:5461 2606:4700:10::6814:4744