必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.140.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40017
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.140.141.		IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 20:49:19 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
141.140.213.105.in-addr.arpa domain name pointer 105-213-140-141.access.mtnbusiness.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.140.213.105.in-addr.arpa	name = 105-213-140-141.access.mtnbusiness.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.253.240.63 attackspambots
Unauthorized connection attempt from IP address 180.253.240.63 on Port 445(SMB)
2019-09-10 03:45:33
110.136.71.217 attackspambots
Unauthorized connection attempt from IP address 110.136.71.217 on Port 445(SMB)
2019-09-10 03:34:15
141.98.9.67 attackspambots
Sep  9 21:08:03 webserver postfix/smtpd\[5088\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 21:08:46 webserver postfix/smtpd\[5088\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 21:09:28 webserver postfix/smtpd\[5088\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 21:10:10 webserver postfix/smtpd\[5088\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  9 21:10:52 webserver postfix/smtpd\[5088\]: warning: unknown\[141.98.9.67\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-10 03:15:24
59.120.189.234 attackbotsspam
Sep  9 19:11:52 MK-Soft-VM6 sshd\[12047\]: Invalid user admin from 59.120.189.234 port 36030
Sep  9 19:11:52 MK-Soft-VM6 sshd\[12047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.120.189.234
Sep  9 19:11:54 MK-Soft-VM6 sshd\[12047\]: Failed password for invalid user admin from 59.120.189.234 port 36030 ssh2
...
2019-09-10 03:33:36
136.228.161.66 attackbotsspam
Sep  9 09:17:29 lcprod sshd\[25993\]: Invalid user rodomantsev from 136.228.161.66
Sep  9 09:17:29 lcprod sshd\[25993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.66
Sep  9 09:17:30 lcprod sshd\[25993\]: Failed password for invalid user rodomantsev from 136.228.161.66 port 60780 ssh2
Sep  9 09:24:43 lcprod sshd\[26613\]: Invalid user ts3bot from 136.228.161.66
Sep  9 09:24:43 lcprod sshd\[26613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=136.228.161.66
2019-09-10 03:28:59
13.235.234.228 attack
Sep 10 02:09:02 webhost01 sshd[4595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.235.234.228
Sep 10 02:09:04 webhost01 sshd[4595]: Failed password for invalid user mailtest from 13.235.234.228 port 58638 ssh2
...
2019-09-10 03:25:54
200.72.249.139 attackbots
Sep  9 19:20:20 www_kotimaassa_fi sshd[14914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.72.249.139
Sep  9 19:20:22 www_kotimaassa_fi sshd[14914]: Failed password for invalid user ts3server from 200.72.249.139 port 30031 ssh2
...
2019-09-10 03:49:42
178.128.87.245 attackspambots
2019-09-09T17:32:26.656863abusebot-4.cloudsearch.cf sshd\[5298\]: Invalid user test from 178.128.87.245 port 39918
2019-09-10 03:28:41
45.172.33.87 attack
Original Message
Message ID	<5d7637d7.1c69fb81.9eb73.6050SMTPIN_ADDED_MISSING@mx.google.com>
Created at:	Mon, Sep 9, 2019 at 1:27 AM (Delivered after 10997 seconds)
From:	Horacio Sloan 
To:
Subject:	ERECTION PACKS
SPF:	NEUTRAL with IP 45.172.33.87 Learn more
2019-09-10 03:20:34
62.216.233.132 attackspambots
Sep  9 21:29:04 legacy sshd[25771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.216.233.132
Sep  9 21:29:06 legacy sshd[25771]: Failed password for invalid user testftp from 62.216.233.132 port 63792 ssh2
Sep  9 21:33:57 legacy sshd[25888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.216.233.132
...
2019-09-10 03:48:37
183.4.43.121 attackbots
Unauthorized connection attempt from IP address 183.4.43.121 on Port 445(SMB)
2019-09-10 03:22:15
182.76.6.222 attackbotsspam
2019-09-09T20:48:45.264061stark.klein-stark.info sshd\[19510\]: Invalid user oracle from 182.76.6.222 port 58314
2019-09-09T20:48:45.273152stark.klein-stark.info sshd\[19510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.76.6.222
2019-09-09T20:48:47.512651stark.klein-stark.info sshd\[19510\]: Failed password for invalid user oracle from 182.76.6.222 port 58314 ssh2
...
2019-09-10 03:56:47
103.52.52.22 attackspam
Sep  9 21:08:33 server sshd\[18743\]: Invalid user support from 103.52.52.22 port 50788
Sep  9 21:08:33 server sshd\[18743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.52.52.22
Sep  9 21:08:35 server sshd\[18743\]: Failed password for invalid user support from 103.52.52.22 port 50788 ssh2
Sep  9 21:15:27 server sshd\[25430\]: Invalid user test7 from 103.52.52.22 port 52871
Sep  9 21:15:27 server sshd\[25430\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.52.52.22
2019-09-10 03:32:43
78.24.222.140 attack
Sep  9 14:03:50 Tower sshd[6668]: Connection from 78.24.222.140 port 43844 on 192.168.10.220 port 22
Sep  9 14:03:51 Tower sshd[6668]: Invalid user tester from 78.24.222.140 port 43844
Sep  9 14:03:51 Tower sshd[6668]: error: Could not get shadow information for NOUSER
Sep  9 14:03:51 Tower sshd[6668]: Failed password for invalid user tester from 78.24.222.140 port 43844 ssh2
Sep  9 14:03:52 Tower sshd[6668]: Received disconnect from 78.24.222.140 port 43844:11: Bye Bye [preauth]
Sep  9 14:03:52 Tower sshd[6668]: Disconnected from invalid user tester 78.24.222.140 port 43844 [preauth]
2019-09-10 03:11:30
45.55.176.173 attackspam
Sep  9 15:31:40 ny01 sshd[10614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.176.173
Sep  9 15:31:43 ny01 sshd[10614]: Failed password for invalid user ftpuser from 45.55.176.173 port 52098 ssh2
Sep  9 15:37:41 ny01 sshd[11661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.176.173
2019-09-10 03:50:54

最近上报的IP列表

105.213.140.246 105.213.136.116 101.132.152.251 101.132.153.140
101.132.153.147 55.0.149.204 101.132.153.157 141.171.10.156
105.213.155.54 105.213.156.92 105.213.156.33 105.213.156.36
105.213.156.77 105.213.155.32 105.213.155.219 105.213.156.187
105.213.155.201 105.213.157.122 105.213.155.235 105.213.155.184