必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.152.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18438
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.152.4.			IN	A

;; AUTHORITY SECTION:
.			274	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:17:25 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
4.152.213.105.in-addr.arpa domain name pointer 105-213-152-4.access.mtnbusiness.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.152.213.105.in-addr.arpa	name = 105-213-152-4.access.mtnbusiness.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.38.238.22 attack
Invalid user zen from 51.38.238.22 port 42650
2019-09-02 09:20:37
68.183.150.254 attackspambots
Sep  2 04:46:10 www sshd\[43583\]: Invalid user openldap from 68.183.150.254Sep  2 04:46:13 www sshd\[43583\]: Failed password for invalid user openldap from 68.183.150.254 port 40150 ssh2Sep  2 04:51:07 www sshd\[43834\]: Invalid user recepcao from 68.183.150.254
...
2019-09-02 09:58:50
188.166.241.93 attackspam
$f2bV_matches
2019-09-02 09:21:16
192.241.220.228 attack
Sep  2 00:45:44 vps691689 sshd[31697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.220.228
Sep  2 00:45:46 vps691689 sshd[31697]: Failed password for invalid user gregor from 192.241.220.228 port 35118 ssh2
...
2019-09-02 09:25:54
182.151.7.70 attackspambots
Sep  1 14:33:34 lcdev sshd\[12905\]: Invalid user credit from 182.151.7.70
Sep  1 14:33:34 lcdev sshd\[12905\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.7.70
Sep  1 14:33:36 lcdev sshd\[12905\]: Failed password for invalid user credit from 182.151.7.70 port 57258 ssh2
Sep  1 14:38:09 lcdev sshd\[13335\]: Invalid user passwd from 182.151.7.70
Sep  1 14:38:09 lcdev sshd\[13335\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.151.7.70
2019-09-02 09:58:04
157.230.175.60 attack
2019-09-02T01:42:24.840695abusebot-3.cloudsearch.cf sshd\[26592\]: Invalid user hdfs from 157.230.175.60 port 51246
2019-09-02 10:09:43
104.160.41.215 attackspam
Sep  1 17:27:18 sshgateway sshd\[9732\]: Invalid user user from 104.160.41.215
Sep  1 17:27:18 sshgateway sshd\[9732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.160.41.215
Sep  1 17:27:19 sshgateway sshd\[9732\]: Failed password for invalid user user from 104.160.41.215 port 41302 ssh2
2019-09-02 09:35:09
177.152.35.158 attackspambots
2019-09-02T01:06:24.791073abusebot-3.cloudsearch.cf sshd\[26422\]: Invalid user elizabet from 177.152.35.158 port 31448
2019-09-02 09:21:52
46.29.248.238 attackbots
Sep  1 10:44:48 friendsofhawaii sshd\[3928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.29.248.238  user=root
Sep  1 10:44:50 friendsofhawaii sshd\[3928\]: Failed password for root from 46.29.248.238 port 51834 ssh2
Sep  1 10:45:02 friendsofhawaii sshd\[3928\]: Failed password for root from 46.29.248.238 port 51834 ssh2
Sep  1 10:45:05 friendsofhawaii sshd\[3928\]: Failed password for root from 46.29.248.238 port 51834 ssh2
Sep  1 10:45:34 friendsofhawaii sshd\[4006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.29.248.238  user=root
2019-09-02 09:26:28
13.233.133.116 attackspam
Sep  1 12:17:15 eddieflores sshd\[23682\]: Invalid user git from 13.233.133.116
Sep  1 12:17:15 eddieflores sshd\[23682\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-13-233-133-116.ap-south-1.compute.amazonaws.com
Sep  1 12:17:17 eddieflores sshd\[23682\]: Failed password for invalid user git from 13.233.133.116 port 48039 ssh2
Sep  1 12:21:53 eddieflores sshd\[24086\]: Invalid user lyn from 13.233.133.116
Sep  1 12:21:53 eddieflores sshd\[24086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-13-233-133-116.ap-south-1.compute.amazonaws.com
2019-09-02 09:39:20
124.65.152.14 attackspam
Sep  2 02:32:50 legacy sshd[27774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.65.152.14
Sep  2 02:32:51 legacy sshd[27774]: Failed password for invalid user admin from 124.65.152.14 port 18379 ssh2
Sep  2 02:37:33 legacy sshd[27848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.65.152.14
...
2019-09-02 09:45:13
158.69.193.32 attackbots
2019-08-15T14:14:50.726239wiz-ks3 sshd[9193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.ip-158-69-193.net  user=root
2019-08-15T14:14:52.579762wiz-ks3 sshd[9193]: Failed password for root from 158.69.193.32 port 57044 ssh2
2019-08-15T14:15:09.569891wiz-ks3 sshd[9193]: Failed password for root from 158.69.193.32 port 57044 ssh2
2019-08-15T14:14:50.726239wiz-ks3 sshd[9193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.ip-158-69-193.net  user=root
2019-08-15T14:14:52.579762wiz-ks3 sshd[9193]: Failed password for root from 158.69.193.32 port 57044 ssh2
2019-08-15T14:15:09.569891wiz-ks3 sshd[9193]: Failed password for root from 158.69.193.32 port 57044 ssh2
2019-08-15T14:14:50.726239wiz-ks3 sshd[9193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=32.ip-158-69-193.net  user=root
2019-08-15T14:14:52.579762wiz-ks3 sshd[9193]: Failed password for root from 158.69.193.32 port 57044 s
2019-09-02 10:17:57
193.70.32.148 attackspam
Sep  1 23:41:50 pkdns2 sshd\[11734\]: Invalid user hostmaster from 193.70.32.148Sep  1 23:41:53 pkdns2 sshd\[11734\]: Failed password for invalid user hostmaster from 193.70.32.148 port 36888 ssh2Sep  1 23:45:39 pkdns2 sshd\[11923\]: Invalid user yue from 193.70.32.148Sep  1 23:45:41 pkdns2 sshd\[11923\]: Failed password for invalid user yue from 193.70.32.148 port 52794 ssh2Sep  1 23:49:26 pkdns2 sshd\[12043\]: Invalid user benjamin from 193.70.32.148Sep  1 23:49:28 pkdns2 sshd\[12043\]: Failed password for invalid user benjamin from 193.70.32.148 port 40462 ssh2
...
2019-09-02 09:56:54
118.40.66.186 attackbots
Aug 22 05:18:21 Server10 sshd[21495]: Invalid user postgres from 118.40.66.186 port 30838
Aug 22 05:18:21 Server10 sshd[21495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.40.66.186
Aug 22 05:18:23 Server10 sshd[21495]: Failed password for invalid user postgres from 118.40.66.186 port 30838 ssh2
2019-09-02 09:31:41
167.99.13.51 attackspambots
Sep  2 02:47:40 itv-usvr-02 sshd[15298]: Invalid user sergey from 167.99.13.51 port 49826
Sep  2 02:47:40 itv-usvr-02 sshd[15298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.13.51
Sep  2 02:47:40 itv-usvr-02 sshd[15298]: Invalid user sergey from 167.99.13.51 port 49826
Sep  2 02:47:41 itv-usvr-02 sshd[15298]: Failed password for invalid user sergey from 167.99.13.51 port 49826 ssh2
Sep  2 02:55:36 itv-usvr-02 sshd[15315]: Invalid user bird from 167.99.13.51 port 44756
2019-09-02 10:25:34

最近上报的IP列表

105.213.152.187 105.213.151.34 105.213.151.245 105.213.152.39
105.213.153.62 105.213.153.118 105.213.153.102 105.213.153.76
105.213.154.137 105.247.187.29 105.213.154.176 105.213.154.230
105.213.154.212 105.213.154.211 105.213.155.10 105.213.154.86
105.213.154.179 105.213.155.169 105.213.154.30 105.213.155.14