必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.140.72
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30739
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.140.72.			IN	A

;; AUTHORITY SECTION:
.			355	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:16:07 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
72.140.213.105.in-addr.arpa domain name pointer 105-213-140-72.access.mtnbusiness.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
72.140.213.105.in-addr.arpa	name = 105-213-140-72.access.mtnbusiness.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
173.239.37.139 attackbotsspam
Sep 29 02:00:08 friendsofhawaii sshd\[975\]: Invalid user nmis from 173.239.37.139
Sep 29 02:00:08 friendsofhawaii sshd\[975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.239.37.139
Sep 29 02:00:10 friendsofhawaii sshd\[975\]: Failed password for invalid user nmis from 173.239.37.139 port 35338 ssh2
Sep 29 02:04:24 friendsofhawaii sshd\[1340\]: Invalid user postmaster from 173.239.37.139
Sep 29 02:04:24 friendsofhawaii sshd\[1340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.239.37.139
2019-09-30 01:20:30
182.86.224.238 attackbots
Automated reporting of FTP Brute Force
2019-09-30 01:21:21
81.134.41.100 attackbots
ssh failed login
2019-09-30 01:43:35
185.137.233.121 attackbots
09/29/2019-08:03:56.955869 185.137.233.121 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-30 01:49:01
200.35.56.89 attackbotsspam
SPAM Delivery Attempt
2019-09-30 01:21:50
175.163.222.187 attack
Unauthorised access (Sep 29) SRC=175.163.222.187 LEN=40 TTL=49 ID=35760 TCP DPT=8080 WINDOW=53614 SYN
2019-09-30 01:49:38
62.99.246.157 attackspam
Sep 29 04:43:07 pl3server sshd[1026488]: Invalid user shei from 62.99.246.157
Sep 29 04:43:07 pl3server sshd[1026488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-99-246-157.static.upcbusiness.at
Sep 29 04:43:09 pl3server sshd[1026488]: Failed password for invalid user shei from 62.99.246.157 port 58004 ssh2
Sep 29 04:43:09 pl3server sshd[1026488]: Received disconnect from 62.99.246.157: 11: Bye Bye [preauth]
Sep 29 05:01:16 pl3server sshd[1052346]: Invalid user web2 from 62.99.246.157
Sep 29 05:01:16 pl3server sshd[1052346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62-99-246-157.static.upcbusiness.at
Sep 29 05:01:18 pl3server sshd[1052346]: Failed password for invalid user web2 from 62.99.246.157 port 35630 ssh2
Sep 29 05:01:18 pl3server sshd[1052346]: Received disconnect from 62.99.246.157: 11: Bye Bye [preauth]
Sep 29 05:05:22 pl3server sshd[1057062]: Invalid user nagios fro........
-------------------------------
2019-09-30 01:37:12
112.111.162.51 attack
8080/tcp
[2019-09-29]1pkt
2019-09-30 01:33:15
43.226.146.112 attackbotsspam
Sep 29 09:37:30 mail sshd\[19117\]: Invalid user nt from 43.226.146.112
Sep 29 09:37:30 mail sshd\[19117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.146.112
...
2019-09-30 01:24:12
94.191.59.106 attack
Sep 29 16:22:02 ns3110291 sshd\[17049\]: Invalid user test123 from 94.191.59.106
Sep 29 16:22:02 ns3110291 sshd\[17049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.59.106 
Sep 29 16:22:04 ns3110291 sshd\[17049\]: Failed password for invalid user test123 from 94.191.59.106 port 35470 ssh2
Sep 29 16:26:51 ns3110291 sshd\[17220\]: Invalid user amavis from 94.191.59.106
Sep 29 16:26:51 ns3110291 sshd\[17220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.59.106 
...
2019-09-30 01:13:17
103.110.89.148 attack
Sep 29 22:24:02 gw1 sshd[10271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.110.89.148
Sep 29 22:24:04 gw1 sshd[10271]: Failed password for invalid user _lldpd from 103.110.89.148 port 45712 ssh2
...
2019-09-30 01:38:01
106.13.144.8 attack
2019-09-29T16:36:36.550883hub.schaetter.us sshd\[27042\]: Invalid user moodle from 106.13.144.8 port 48024
2019-09-29T16:36:36.563111hub.schaetter.us sshd\[27042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8
2019-09-29T16:36:38.927235hub.schaetter.us sshd\[27042\]: Failed password for invalid user moodle from 106.13.144.8 port 48024 ssh2
2019-09-29T16:41:43.924248hub.schaetter.us sshd\[27093\]: Invalid user temp from 106.13.144.8 port 51848
2019-09-29T16:41:43.935471hub.schaetter.us sshd\[27093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8
...
2019-09-30 01:19:06
112.25.142.28 attackbots
Unauthorised access (Sep 29) SRC=112.25.142.28 LEN=40 TOS=0x04 TTL=47 ID=27355 TCP DPT=8080 WINDOW=37356 SYN 
Unauthorised access (Sep 29) SRC=112.25.142.28 LEN=40 TOS=0x04 TTL=49 ID=36844 TCP DPT=8080 WINDOW=58780 SYN 
Unauthorised access (Sep 28) SRC=112.25.142.28 LEN=40 TOS=0x04 TTL=47 ID=26401 TCP DPT=8080 WINDOW=58780 SYN 
Unauthorised access (Sep 27) SRC=112.25.142.28 LEN=40 TOS=0x04 TTL=47 ID=9019 TCP DPT=8080 WINDOW=37356 SYN
2019-09-30 01:41:51
93.116.91.177 attackspam
port scan and connect, tcp 23 (telnet)
2019-09-30 01:47:58
222.185.155.29 attack
" "
2019-09-30 01:10:22

最近上报的IP列表

105.213.140.78 105.213.140.70 105.213.141.35 105.213.141.57
105.213.140.91 105.213.142.109 105.213.142.116 105.213.142.120
105.213.142.57 105.213.143.148 105.213.142.63 105.213.143.228
105.213.142.74 105.213.142.164 105.213.143.29 105.213.148.70
105.213.65.255 105.213.65.42 105.213.65.24 105.213.65.250