必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Johannesburg

省份(region): Gauteng

国家(country): South Africa

运营商(isp): MTN

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.64.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57204
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.64.212.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030100 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 15:48:43 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
212.64.213.105.in-addr.arpa domain name pointer 105-213-64-212.access.mtnbusiness.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.64.213.105.in-addr.arpa	name = 105-213-64-212.access.mtnbusiness.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.57.145.133 attack
Aug 22 19:33:34 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 12 secs\): user=\, method=PLAIN, rip=85.57.145.133, lip=10.64.89.208, session=\
Aug 22 19:33:34 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 10 secs\): user=\, method=PLAIN, rip=85.57.145.133, lip=10.64.89.208, session=\
Aug 22 19:46:28 WHD8 dovecot: pop3-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=85.57.145.133, lip=10.64.89.208, session=\
Aug 22 19:46:31 WHD8 dovecot: pop3-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=85.57.145.133, lip=10.64.89.208, session=\
Aug 22 19:59:33 WHD8 dovecot: pop3-login: Disconnected \(auth failed, 1 attempts in 65 secs\): user=\, method=PLA
...
2020-08-23 03:29:04
187.23.135.185 attackbotsspam
SSH Brute-Forcing (server1)
2020-08-23 03:34:42
45.57.138.250 attack
Registration form abuse
2020-08-23 03:39:30
94.10.215.17 attack
Aug 22 21:26:03 webhost01 sshd[13114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.10.215.17
Aug 22 21:26:05 webhost01 sshd[13114]: Failed password for invalid user lwl from 94.10.215.17 port 47570 ssh2
...
2020-08-23 03:58:23
219.240.99.110 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-23 03:27:29
187.214.3.5 attackspam
Aug 22 21:19:23 meumeu sshd[94319]: Invalid user wubin from 187.214.3.5 port 38664
Aug 22 21:19:23 meumeu sshd[94319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.214.3.5 
Aug 22 21:19:23 meumeu sshd[94319]: Invalid user wubin from 187.214.3.5 port 38664
Aug 22 21:19:24 meumeu sshd[94319]: Failed password for invalid user wubin from 187.214.3.5 port 38664 ssh2
Aug 22 21:22:37 meumeu sshd[94392]: Invalid user testuser from 187.214.3.5 port 57258
Aug 22 21:22:37 meumeu sshd[94392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.214.3.5 
Aug 22 21:22:37 meumeu sshd[94392]: Invalid user testuser from 187.214.3.5 port 57258
Aug 22 21:22:40 meumeu sshd[94392]: Failed password for invalid user testuser from 187.214.3.5 port 57258 ssh2
Aug 22 21:25:52 meumeu sshd[94489]: Invalid user prueba from 187.214.3.5 port 47628
...
2020-08-23 03:33:13
213.55.2.212 attackspam
2020-08-22 10:07:49.161901-0500  localhost sshd[13203]: Failed password for invalid user user from 213.55.2.212 port 48298 ssh2
2020-08-23 03:51:23
178.46.212.65 attackbotsspam
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-23 03:20:36
113.131.24.212 attackspam
Portscan detected
2020-08-23 03:52:33
49.232.191.67 attack
Aug 22 21:42:32 vps647732 sshd[20517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.191.67
Aug 22 21:42:34 vps647732 sshd[20517]: Failed password for invalid user vertica from 49.232.191.67 port 35470 ssh2
...
2020-08-23 03:53:56
115.159.153.180 attackspam
Aug 22 20:24:40 dev0-dcde-rnet sshd[28135]: Failed password for root from 115.159.153.180 port 51452 ssh2
Aug 22 20:26:03 dev0-dcde-rnet sshd[28149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.153.180
Aug 22 20:26:06 dev0-dcde-rnet sshd[28149]: Failed password for invalid user marconi from 115.159.153.180 port 58642 ssh2
2020-08-23 03:27:42
149.72.243.180 attack
Lines containing failures of 149.72.243.180
Aug 20 20:52:09 penfold postfix/smtpd[16848]: connect from wrqvfpbq.outbound-mail.sendgrid.net[149.72.243.180]
Aug 20 20:52:09 penfold postfix/smtpd[16848]: Anonymous TLS connection established from wrqvfpbq.outbound-mail.sendgrid.net[149.72.243.180]: TLSv1.2 whostnameh cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bhostnames)
Aug 20 20:52:10 penfold postfix/smtpd[16848]: 12EC720201: client=wrqvfpbq.outbound-mail.sendgrid.net[149.72.243.180]
Aug 20 20:52:10 penfold opendkim[18979]: 12EC720201: wrqvfpbq.outbound-mail.sendgrid.net [149.72.243.180] not internal
Aug 20 20:52:13 penfold postfix/smtpd[16866]: connect from wrqvfpbq.outbound-mail.sendgrid.net[149.72.243.180]
Aug 20 20:52:13 penfold postfix/smtpd[16866]: Anonymous TLS connection established from wrqvfpbq.outbound-mail.sendgrid.net[149.72.243.180]: TLS
.... truncated .... 
Lines containing failures of 149.72.243.180
Aug 20 20:52:09 penfold postfix/smtpd[16848]: connect fro........
------------------------------
2020-08-23 03:50:49
218.250.189.201 attackspam
SSH login attempts.
2020-08-23 03:38:26
106.112.178.247 attackbotsspam
Lines containing failures of 106.112.178.247
Aug 20 19:32:13 kmh-vmh-001-fsn03 sshd[9692]: Invalid user abdul from 106.112.178.247 port 36822
Aug 20 19:32:13 kmh-vmh-001-fsn03 sshd[9692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.112.178.247 
Aug 20 19:32:15 kmh-vmh-001-fsn03 sshd[9692]: Failed password for invalid user abdul from 106.112.178.247 port 36822 ssh2
Aug 20 19:32:19 kmh-vmh-001-fsn03 sshd[9692]: Received disconnect from 106.112.178.247 port 36822:11: Bye Bye [preauth]
Aug 20 19:32:19 kmh-vmh-001-fsn03 sshd[9692]: Disconnected from invalid user abdul 106.112.178.247 port 36822 [preauth]
Aug 20 19:36:21 kmh-vmh-001-fsn03 sshd[18985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.112.178.247  user=r.r
Aug 20 19:36:22 kmh-vmh-001-fsn03 sshd[18985]: Failed password for r.r from 106.112.178.247 port 41846 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=
2020-08-23 03:31:14
221.149.43.38 attack
Invalid user pi from 221.149.43.38 port 35848
2020-08-23 03:33:51

最近上报的IP列表

105.213.64.181 104.22.79.176 105.213.64.205 105.213.64.219
105.213.64.242 105.213.64.228 105.213.64.198 105.213.64.237
105.213.64.5 105.213.64.34 105.213.64.6 105.213.64.31
105.213.64.57 105.213.83.65 105.213.83.75 105.213.84.186
105.213.83.90 105.213.83.5 105.213.83.62 105.213.84.11