必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.130.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.130.75.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:16:02 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
75.130.213.105.in-addr.arpa domain name pointer 105-213-130-75.access.mtnbusiness.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
75.130.213.105.in-addr.arpa	name = 105-213-130-75.access.mtnbusiness.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
110.49.70.244 attackspam
Dec 18 17:09:54 ws25vmsma01 sshd[70023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.70.244
Dec 18 17:09:56 ws25vmsma01 sshd[70023]: Failed password for invalid user presence from 110.49.70.244 port 58676 ssh2
...
2019-12-19 02:10:25
188.213.175.98 attack
Dec 18 19:06:18 microserver sshd[59436]: Invalid user nilshenrik from 188.213.175.98 port 51927
Dec 18 19:06:18 microserver sshd[59436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.175.98
Dec 18 19:06:19 microserver sshd[59436]: Failed password for invalid user nilshenrik from 188.213.175.98 port 51927 ssh2
Dec 18 19:12:12 microserver sshd[60338]: Invalid user arun from 188.213.175.98 port 55043
Dec 18 19:12:12 microserver sshd[60338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.175.98
Dec 18 19:23:42 microserver sshd[62152]: Invalid user monitor from 188.213.175.98 port 33033
Dec 18 19:23:42 microserver sshd[62152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.213.175.98
Dec 18 19:23:43 microserver sshd[62152]: Failed password for invalid user monitor from 188.213.175.98 port 33033 ssh2
Dec 18 19:30:31 microserver sshd[63586]: Invalid user rajespathy from 188.
2019-12-19 02:00:07
186.4.123.139 attackbots
2019-12-18T18:24:06.434076scmdmz1 sshd[31924]: Invalid user duconge from 186.4.123.139 port 32774
2019-12-18T18:24:06.436671scmdmz1 sshd[31924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.123.139
2019-12-18T18:24:06.434076scmdmz1 sshd[31924]: Invalid user duconge from 186.4.123.139 port 32774
2019-12-18T18:24:08.605335scmdmz1 sshd[31924]: Failed password for invalid user duconge from 186.4.123.139 port 32774 ssh2
2019-12-18T18:30:48.390865scmdmz1 sshd[374]: Invalid user 12345 from 186.4.123.139 port 36185
...
2019-12-19 01:47:25
103.3.226.230 attackbotsspam
Dec 18 17:33:17 ns382633 sshd\[30368\]: Invalid user jxd786 from 103.3.226.230 port 51174
Dec 18 17:33:17 ns382633 sshd\[30368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.230
Dec 18 17:33:19 ns382633 sshd\[30368\]: Failed password for invalid user jxd786 from 103.3.226.230 port 51174 ssh2
Dec 18 17:51:31 ns382633 sshd\[1382\]: Invalid user patrickm from 103.3.226.230 port 41774
Dec 18 17:51:31 ns382633 sshd\[1382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.3.226.230
2019-12-19 01:48:30
117.7.234.156 attackbotsspam
1576679690 - 12/18/2019 15:34:50 Host: 117.7.234.156/117.7.234.156 Port: 445 TCP Blocked
2019-12-19 01:50:26
185.38.3.138 attackbotsspam
Dec 18 07:57:59 auw2 sshd\[20714\]: Invalid user warnick from 185.38.3.138
Dec 18 07:57:59 auw2 sshd\[20714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pan0138.panoulu.net
Dec 18 07:58:01 auw2 sshd\[20714\]: Failed password for invalid user warnick from 185.38.3.138 port 46540 ssh2
Dec 18 08:03:24 auw2 sshd\[21289\]: Invalid user romann from 185.38.3.138
Dec 18 08:03:24 auw2 sshd\[21289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pan0138.panoulu.net
2019-12-19 02:12:12
189.4.28.99 attack
Dec 18 18:53:36 cvbnet sshd[4857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.28.99 
Dec 18 18:53:39 cvbnet sshd[4857]: Failed password for invalid user mellow from 189.4.28.99 port 56518 ssh2
...
2019-12-19 02:07:40
104.199.175.58 attackspambots
Dec 18 16:53:41 vps647732 sshd[21765]: Failed password for root from 104.199.175.58 port 39452 ssh2
Dec 18 16:59:40 vps647732 sshd[21956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.199.175.58
...
2019-12-19 01:50:52
222.186.42.4 attackbotsspam
Dec 18 18:12:16 thevastnessof sshd[23456]: Failed password for root from 222.186.42.4 port 28922 ssh2
...
2019-12-19 02:14:41
40.92.23.34 attack
Dec 18 17:34:25 debian-2gb-vpn-nbg1-1 kernel: [1058029.333929] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.23.34 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=230 ID=48564 DF PROTO=TCP SPT=36903 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-19 02:14:19
206.189.72.217 attackbotsspam
Dec 18 16:52:31 game-panel sshd[11626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.72.217
Dec 18 16:52:33 game-panel sshd[11626]: Failed password for invalid user wwPower from 206.189.72.217 port 37100 ssh2
Dec 18 16:57:48 game-panel sshd[11790]: Failed password for root from 206.189.72.217 port 43176 ssh2
2019-12-19 02:15:12
222.186.175.147 attackbotsspam
Dec 18 07:36:25 auw2 sshd\[18413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147  user=root
Dec 18 07:36:27 auw2 sshd\[18413\]: Failed password for root from 222.186.175.147 port 31578 ssh2
Dec 18 07:36:43 auw2 sshd\[18427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147  user=root
Dec 18 07:36:45 auw2 sshd\[18427\]: Failed password for root from 222.186.175.147 port 53392 ssh2
Dec 18 07:36:49 auw2 sshd\[18427\]: Failed password for root from 222.186.175.147 port 53392 ssh2
2019-12-19 01:45:54
174.138.18.157 attackspambots
$f2bV_matches
2019-12-19 01:59:09
146.185.152.182 attackbots
Dec 18 10:18:50 Tower sshd[14467]: Connection from 146.185.152.182 port 42184 on 192.168.10.220 port 22
Dec 18 10:18:51 Tower sshd[14467]: Invalid user hirotoshi from 146.185.152.182 port 42184
Dec 18 10:18:51 Tower sshd[14467]: error: Could not get shadow information for NOUSER
Dec 18 10:18:51 Tower sshd[14467]: Failed password for invalid user hirotoshi from 146.185.152.182 port 42184 ssh2
Dec 18 10:18:51 Tower sshd[14467]: Received disconnect from 146.185.152.182 port 42184:11: Bye Bye [preauth]
Dec 18 10:18:51 Tower sshd[14467]: Disconnected from invalid user hirotoshi 146.185.152.182 port 42184 [preauth]
2019-12-19 01:54:41
152.32.72.122 attackspam
Dec 18 09:54:39 ny01 sshd[15972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.72.122
Dec 18 09:54:42 ny01 sshd[15972]: Failed password for invalid user 123wsx from 152.32.72.122 port 4194 ssh2
Dec 18 10:04:26 ny01 sshd[17449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.72.122
2019-12-19 01:36:08

最近上报的IP列表

105.213.126.62 105.213.125.21 105.213.141.16 105.213.141.184
105.213.141.75 105.213.140.48 105.213.140.36 105.213.140.78
105.213.140.72 105.213.140.70 105.213.141.35 105.213.141.57
105.213.140.91 105.213.142.109 105.213.142.116 105.213.142.120
105.213.142.57 105.213.143.148 105.213.142.63 105.213.143.228