必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.140.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24193
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.140.48.			IN	A

;; AUTHORITY SECTION:
.			355	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:16:07 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
48.140.213.105.in-addr.arpa domain name pointer 105-213-140-48.access.mtnbusiness.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.140.213.105.in-addr.arpa	name = 105-213-140-48.access.mtnbusiness.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.42.117 attackbots
Sep  7 17:50:04 areeb-Workstation sshd[9814]: Failed password for root from 222.186.42.117 port 11812 ssh2
...
2019-09-07 20:20:49
81.22.45.225 attack
Unauthorized connection attempt from IP address 81.22.45.225 on Port 3389(RDP)
2019-09-07 19:38:05
182.127.72.69 attack
Lines containing failures of 182.127.72.69
Sep  7 11:27:03 shared09 sshd[757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.127.72.69  user=r.r
Sep  7 11:27:05 shared09 sshd[757]: Failed password for r.r from 182.127.72.69 port 59315 ssh2
Sep  7 11:27:07 shared09 sshd[757]: Failed password for r.r from 182.127.72.69 port 59315 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=182.127.72.69
2019-09-07 20:12:01
184.105.139.91 attackspambots
firewall-block, port(s): 11211/udp
2019-09-07 20:14:16
218.98.26.174 attack
Sep  7 13:22:32 v22018053744266470 sshd[27216]: Failed password for root from 218.98.26.174 port 26365 ssh2
Sep  7 13:22:43 v22018053744266470 sshd[27232]: Failed password for root from 218.98.26.174 port 12356 ssh2
...
2019-09-07 19:46:45
2.236.242.44 attackbotsspam
Sep  7 13:13:51 mail sshd\[3170\]: Invalid user mine from 2.236.242.44 port 50253
Sep  7 13:13:51 mail sshd\[3170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.236.242.44
Sep  7 13:13:54 mail sshd\[3170\]: Failed password for invalid user mine from 2.236.242.44 port 50253 ssh2
Sep  7 13:20:39 mail sshd\[3993\]: Invalid user devops from 2.236.242.44 port 52751
Sep  7 13:20:39 mail sshd\[3993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.236.242.44
2019-09-07 19:42:40
2.227.250.104 attackbotsspam
Sep  7 07:38:01 xtremcommunity sshd\[30551\]: Invalid user 1qazxsw2 from 2.227.250.104 port 51176
Sep  7 07:38:01 xtremcommunity sshd\[30551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.227.250.104
Sep  7 07:38:03 xtremcommunity sshd\[30551\]: Failed password for invalid user 1qazxsw2 from 2.227.250.104 port 51176 ssh2
Sep  7 07:42:14 xtremcommunity sshd\[30729\]: Invalid user hduser from 2.227.250.104 port 39268
Sep  7 07:42:14 xtremcommunity sshd\[30729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.227.250.104
...
2019-09-07 19:43:08
187.177.103.148 attackspambots
Sep  7 12:51:35 mail postfix/smtpd\[23651\]: NOQUEUE: reject: RCPT from 187-177-103-148.dynamic.axtel.net\[187.177.103.148\]: 554 5.7.1 Service unavailable\; Client host \[187.177.103.148\] blocked using zen.spamhaus.org\; https://www.spamhaus.org/query/ip/187.177.103.148\; from=\ to=\ proto=ESMTP helo=\<187-177-103-148.dynamic.axtel.net\>\
2019-09-07 19:32:37
177.185.241.131 attackbots
Sep  7 15:10:53 site3 sshd\[146474\]: Invalid user weblogic123 from 177.185.241.131
Sep  7 15:10:53 site3 sshd\[146474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.241.131
Sep  7 15:10:55 site3 sshd\[146474\]: Failed password for invalid user weblogic123 from 177.185.241.131 port 43501 ssh2
Sep  7 15:16:30 site3 sshd\[146514\]: Invalid user hadoop from 177.185.241.131
Sep  7 15:16:30 site3 sshd\[146514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.185.241.131
...
2019-09-07 20:23:39
183.157.170.156 attackbotsspam
port scan and connect, tcp 22 (ssh)
2019-09-07 19:43:39
73.93.102.54 attack
Automated report - ssh fail2ban:
Sep 7 13:54:52 authentication failure 
Sep 7 13:54:54 wrong password, user=nagios, port=51168, ssh2
Sep 7 13:59:34 authentication failure
2019-09-07 20:02:43
95.31.249.107 attack
Sep  7 13:40:43 vps01 sshd[12527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.31.249.107
Sep  7 13:40:46 vps01 sshd[12527]: Failed password for invalid user ftp from 95.31.249.107 port 36739 ssh2
2019-09-07 20:00:07
202.189.252.196 attackspam
Unauthorized connection attempt from IP address 202.189.252.196 on Port 445(SMB)
2019-09-07 20:15:42
159.65.239.104 attack
$f2bV_matches
2019-09-07 19:52:24
185.176.221.147 attackspam
" "
2019-09-07 19:32:53

最近上报的IP列表

105.213.141.75 105.213.140.36 105.213.140.78 105.213.140.72
105.213.140.70 105.213.141.35 105.213.141.57 105.213.140.91
105.213.142.109 105.213.142.116 105.213.142.120 105.213.142.57
105.213.143.148 105.213.142.63 105.213.143.228 105.213.142.74
105.213.142.164 105.213.143.29 105.213.148.70 105.213.65.255