必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Cairo

省份(region): Al Qahirah

国家(country): Egypt

运营商(isp): Etisalat

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '105.206.128.0 - 105.206.255.255'

% No abuse contact registered for 105.206.128.0 - 105.206.255.255

inetnum:        105.206.128.0 - 105.206.255.255
netname:        EM-5
descr:          Network used for 3G Web Users
country:        EG
org:            ORG-EM1-AFRINIC
admin-c:        SMM2-AFRINIC
tech-c:         SMM2-AFRINIC
status:         ASSIGNED PA
remarks:        For any abuse, please direct your queries to IP.Abuse@etisalat.com
mnt-by:         etisalat-mnt
mnt-lower:      Sherif-Magdy-MNT
source:         AFRINIC # Filtered
parent:         105.200.0.0 - 105.207.255.255

organisation:   ORG-EM1-AFRINIC
org-name:       ETISALAT MISR
org-type:       LIR
country:        EG
address:        Etisalat Misr
address:        S4, Down Town, 90th Street,
address:        5th Compound,
address:        New Cairo, Egypt.
address:        Cairo 11835
phone:          tel:+20-2-35381889
phone:          tel:+20-2-35381889
phone:          tel:+20-2-35381889
phone:          tel:+20-2-35381889
phone:          tel:+20-111-152-2422
fax-no:         tel:+20-2-35381072
admin-c:        HS27-AFRINIC
admin-c:        AFE1-AFRINIC
admin-c:        HM65-AFRINIC
tech-c:         HS27-AFRINIC
tech-c:         AFE1-AFRINIC
tech-c:         LM52-AFRINIC
tech-c:         HM65-AFRINIC
mnt-ref:        AFRINIC-HM-MNT
mnt-ref:        etisalat-mnt
mnt-by:         AFRINIC-HM-MNT
source:         AFRINIC # Filtered

person:         Sherif Magdy Mohamed
nic-hdl:        SMM2-AFRINIC
address:        Etisalat Misr
address:        S4, Down Town, 90th Street,
address:        5th Compound,
address:        New Cairo, Egypt.
address:        Cairo 11835
address:        Egypt
phone:          tel:+20-2-35381000
fax-no:         tel:+20-2-35381072
mnt-by:         GENERATED-BDVY6DBBH98KLPSUIXSD5SUX8WDCVXTF-MNT
source:         AFRINIC # Filtered

% Information related to '105.206.213.0/24as36992'

route:          105.206.213.0/24
descr:          Etisalat Misr Mobile BB
origin:         as36992
mnt-by:         etisalat-mnt
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.206.213.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41908
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.206.213.242.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050200 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 18:21:47 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
b'242.213.206.105.in-addr.arpa domain name pointer host-105.206.213.242.etisalat.com.eg.
'
NSLOOKUP信息:
b'242.213.206.105.in-addr.arpa	name = host-105.206.213.242.etisalat.com.eg.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
211.253.10.96 attack
Sep 28 14:42:14 ip106 sshd[13540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.253.10.96 
Sep 28 14:42:16 ip106 sshd[13540]: Failed password for invalid user support from 211.253.10.96 port 57066 ssh2
...
2020-09-29 07:18:29
45.6.24.24 attack
SSH/22 MH Probe, BF, Hack -
2020-09-29 06:46:08
129.211.124.120 attackspambots
Sep 29 00:13:14 marvibiene sshd[787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.124.120 
Sep 29 00:13:16 marvibiene sshd[787]: Failed password for invalid user pat from 129.211.124.120 port 58436 ssh2
Sep 29 00:19:10 marvibiene sshd[1110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.124.120
2020-09-29 07:00:17
103.29.219.20 attack
Wordpress login attempts
2020-09-29 07:01:15
92.221.145.57 attackspambots
20 attempts against mh-misbehave-ban on ice
2020-09-29 07:17:24
192.99.149.195 attackspam
192.99.149.195 - - [28/Sep/2020:21:20:14 +0200] "GET /wp-login.php HTTP/1.1" 200 8796 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.99.149.195 - - [28/Sep/2020:21:20:15 +0200] "POST /wp-login.php HTTP/1.1" 200 9047 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.99.149.195 - - [28/Sep/2020:21:20:16 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-29 06:54:08
107.170.227.141 attackspambots
bruteforce detected
2020-09-29 07:09:03
182.151.204.23 attackspam
Sep 29 00:21:03 rotator sshd\[5410\]: Failed password for root from 182.151.204.23 port 41992 ssh2Sep 29 00:22:52 rotator sshd\[5425\]: Invalid user landspace from 182.151.204.23Sep 29 00:22:55 rotator sshd\[5425\]: Failed password for invalid user landspace from 182.151.204.23 port 40794 ssh2Sep 29 00:24:55 rotator sshd\[5442\]: Invalid user git from 182.151.204.23Sep 29 00:24:56 rotator sshd\[5442\]: Failed password for invalid user git from 182.151.204.23 port 39610 ssh2Sep 29 00:26:46 rotator sshd\[6198\]: Failed password for root from 182.151.204.23 port 38386 ssh2
...
2020-09-29 07:15:33
218.92.0.246 attackbotsspam
Failed password for invalid user from 218.92.0.246 port 57896 ssh2
2020-09-29 06:49:21
79.124.62.86 attack
*Port Scan* detected from 79.124.62.86 (BG/Bulgaria/-). 11 hits in the last 195 seconds
2020-09-29 07:09:23
180.76.149.15 attackbots
reported through recidive - multiple failed attempts(SSH)
2020-09-29 07:16:41
139.59.61.103 attackbotsspam
Sep 29 00:07:59 *hidden* sshd[21038]: Invalid user sql from 139.59.61.103 port 49496 Sep 29 00:07:59 *hidden* sshd[21038]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.61.103 Sep 29 00:08:00 *hidden* sshd[21038]: Failed password for invalid user sql from 139.59.61.103 port 49496 ssh2
2020-09-29 06:53:36
107.189.11.160 attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-09-29 07:15:11
51.79.35.114 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 38 - port: 50924 proto: udp cat: Misc Attackbytes: 60
2020-09-29 06:59:50
89.115.245.50 attackspambots
89.115.245.50 - - [28/Sep/2020:21:32:59 +0200] "POST /wp-login.php HTTP/1.0" 200 4794 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-29 06:52:08

最近上报的IP列表

216.36.85.227 43.160.219.206 60.20.182.43 161.97.163.222
5.34.216.110 2606:4700:10::6816:4553 2606:4700:10::6814:8396 2606:4700:10::6816:1571
142.93.175.52 65.172.0.223 130.89.78.31 12.212.169.104
51.68.186.168 2606:4700:10::6816:101 2606:4700:10::6816:4265 2606:4700:10::ac43:2654
153.75.247.232 166.88.26.78 2606:4700:10::6816:1056 2606:4700:10::6816:2717