必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Mauritius

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.20.43.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48201
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.20.43.53.			IN	A

;; AUTHORITY SECTION:
.			205	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:53:12 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
Host 53.43.20.105.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.43.20.105.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.109.70.98 attackbotsspam
SSH invalid-user multiple login attempts
2020-10-02 20:41:30
220.180.119.192 attackbots
Oct  2 13:18:30 meumeu sshd[1226880]: Invalid user cactiuser from 220.180.119.192 port 49116
Oct  2 13:18:30 meumeu sshd[1226880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.180.119.192 
Oct  2 13:18:30 meumeu sshd[1226880]: Invalid user cactiuser from 220.180.119.192 port 49116
Oct  2 13:18:31 meumeu sshd[1226880]: Failed password for invalid user cactiuser from 220.180.119.192 port 49116 ssh2
Oct  2 13:22:04 meumeu sshd[1227048]: Invalid user monica from 220.180.119.192 port 16507
Oct  2 13:22:04 meumeu sshd[1227048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.180.119.192 
Oct  2 13:22:04 meumeu sshd[1227048]: Invalid user monica from 220.180.119.192 port 16507
Oct  2 13:22:05 meumeu sshd[1227048]: Failed password for invalid user monica from 220.180.119.192 port 16507 ssh2
Oct  2 13:25:37 meumeu sshd[1227253]: Invalid user ubuntu from 220.180.119.192 port 39434
...
2020-10-02 20:14:17
218.92.0.202 attack
2020-10-02T14:11:42.413269rem.lavrinenko.info sshd[24441]: refused connect from 218.92.0.202 (218.92.0.202)
2020-10-02T14:15:05.008945rem.lavrinenko.info sshd[24453]: refused connect from 218.92.0.202 (218.92.0.202)
2020-10-02T14:17:30.980926rem.lavrinenko.info sshd[24454]: refused connect from 218.92.0.202 (218.92.0.202)
2020-10-02T14:18:41.257394rem.lavrinenko.info sshd[24456]: refused connect from 218.92.0.202 (218.92.0.202)
2020-10-02T14:20:50.131862rem.lavrinenko.info sshd[24458]: refused connect from 218.92.0.202 (218.92.0.202)
...
2020-10-02 20:33:06
213.113.9.166 attackspambots
Oct  2 10:04:56 vps639187 sshd\[4273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.113.9.166  user=root
Oct  2 10:04:58 vps639187 sshd\[4277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.113.9.166  user=root
Oct  2 10:04:59 vps639187 sshd\[4273\]: Failed password for root from 213.113.9.166 port 52714 ssh2
...
2020-10-02 20:10:42
195.58.38.143 attackbots
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-10-02 20:17:17
212.79.122.105 attackbots
Oct  1 23:37:37 vps647732 sshd[31032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.79.122.105
Oct  1 23:37:39 vps647732 sshd[31032]: Failed password for invalid user admin2 from 212.79.122.105 port 51198 ssh2
...
2020-10-02 20:28:32
125.121.169.12 attack
Oct  1 20:36:27 CT3029 sshd[7768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.121.169.12  user=r.r
Oct  1 20:36:30 CT3029 sshd[7768]: Failed password for r.r from 125.121.169.12 port 35924 ssh2
Oct  1 20:36:30 CT3029 sshd[7768]: Received disconnect from 125.121.169.12 port 35924:11: Bye Bye [preauth]
Oct  1 20:36:30 CT3029 sshd[7768]: Disconnected from 125.121.169.12 port 35924 [preauth]
Oct  1 20:36:54 CT3029 sshd[7770]: Invalid user tiago from 125.121.169.12 port 39270
Oct  1 20:36:54 CT3029 sshd[7770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.121.169.12


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.121.169.12
2020-10-02 20:17:46
52.172.153.7 attackbots
(PERMBLOCK) 52.172.153.7 (IN/India/-) has had more than 4 temp blocks in the last 86400 secs; Ports: *; Direction: inout; Trigger: LF_PERMBLOCK_COUNT; Logs:
2020-10-02 20:18:52
114.69.249.194 attackspambots
Oct  2 14:27:22 lavrea sshd[126856]: Invalid user jenkins from 114.69.249.194 port 43719
...
2020-10-02 20:27:46
58.56.112.169 attack
Oct  1 20:41:05 jumpserver sshd[421144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.112.169 
Oct  1 20:41:05 jumpserver sshd[421144]: Invalid user pi from 58.56.112.169 port 12041
Oct  1 20:41:07 jumpserver sshd[421144]: Failed password for invalid user pi from 58.56.112.169 port 12041 ssh2
...
2020-10-02 20:09:10
177.106.21.117 attackspambots
1601584836 - 10/01/2020 22:40:36 Host: 177.106.21.117/177.106.21.117 Port: 445 TCP Blocked
2020-10-02 20:36:42
122.51.64.115 attackspambots
SSH login attempts.
2020-10-02 20:15:28
115.73.222.9 attack
IP 115.73.222.9 attacked honeypot on port: 3389 at 10/1/2020 1:40:09 PM
2020-10-02 20:32:48
68.183.110.49 attackspambots
Invalid user admin from 68.183.110.49 port 47952
2020-10-02 20:31:05
46.105.31.249 attack
Oct  2 15:06:49 journals sshd\[20844\]: Invalid user cactiuser from 46.105.31.249
Oct  2 15:06:49 journals sshd\[20844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.31.249
Oct  2 15:06:51 journals sshd\[20844\]: Failed password for invalid user cactiuser from 46.105.31.249 port 44090 ssh2
Oct  2 15:10:03 journals sshd\[21191\]: Invalid user w from 46.105.31.249
Oct  2 15:10:03 journals sshd\[21191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.31.249
...
2020-10-02 20:24:43

最近上报的IP列表

105.20.210.124 105.200.122.40 106.140.198.73 105.20.51.112
105.20.205.94 105.200.171.55 105.20.81.170 105.201.104.195
105.200.142.144 105.200.0.27 105.200.57.122 105.200.170.80
105.20.93.19 105.20.53.21 105.20.157.112 105.20.239.216
105.20.96.254 105.20.49.12 105.200.213.73 105.20.15.141