必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.81.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51664
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.81.50.			IN	A

;; AUTHORITY SECTION:
.			9	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 05:49:00 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
50.81.213.105.in-addr.arpa domain name pointer 105-213-81-50.access.mtnbusiness.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.81.213.105.in-addr.arpa	name = 105-213-81-50.access.mtnbusiness.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.98.64.229 attackspam
445/tcp 445/tcp 445/tcp...
[2019-08-08/09-02]5pkt,1pt.(tcp)
2019-09-02 13:04:25
87.249.208.14 attackbots
Sep  2 07:19:33 eventyay sshd[9960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.249.208.14
Sep  2 07:19:35 eventyay sshd[9960]: Failed password for invalid user mysql from 87.249.208.14 port 38108 ssh2
Sep  2 07:23:54 eventyay sshd[11051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.249.208.14
...
2019-09-02 13:26:03
83.19.158.250 attack
Sep  1 18:35:56 eddieflores sshd\[23657\]: Invalid user hs from 83.19.158.250
Sep  1 18:35:56 eddieflores sshd\[23657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cxy250.internetdsl.tpnet.pl
Sep  1 18:35:58 eddieflores sshd\[23657\]: Failed password for invalid user hs from 83.19.158.250 port 53872 ssh2
Sep  1 18:40:56 eddieflores sshd\[24178\]: Invalid user v from 83.19.158.250
Sep  1 18:40:56 eddieflores sshd\[24178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cxy250.internetdsl.tpnet.pl
2019-09-02 12:51:08
104.236.28.167 attackbots
Fail2Ban Ban Triggered
2019-09-02 13:41:29
85.21.63.173 attackspam
Sep  1 19:19:20 hcbb sshd\[5916\]: Invalid user casino from 85.21.63.173
Sep  1 19:19:20 hcbb sshd\[5916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.21.63.173
Sep  1 19:19:22 hcbb sshd\[5916\]: Failed password for invalid user casino from 85.21.63.173 port 33070 ssh2
Sep  1 19:23:45 hcbb sshd\[6247\]: Invalid user packet from 85.21.63.173
Sep  1 19:23:45 hcbb sshd\[6247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.21.63.173
2019-09-02 13:25:06
159.65.137.23 attackbots
Sep  2 05:18:31 *** sshd[1846]: Invalid user is from 159.65.137.23
2019-09-02 13:18:51
103.121.117.180 attackspam
Sep  1 18:40:20 php2 sshd\[16165\]: Invalid user master from 103.121.117.180
Sep  1 18:40:20 php2 sshd\[16165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.117.180
Sep  1 18:40:23 php2 sshd\[16165\]: Failed password for invalid user master from 103.121.117.180 port 23840 ssh2
Sep  1 18:47:53 php2 sshd\[16853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.121.117.180  user=root
Sep  1 18:47:54 php2 sshd\[16853\]: Failed password for root from 103.121.117.180 port 31770 ssh2
2019-09-02 12:49:26
51.75.65.72 attackbots
Sep  2 06:25:16 minden010 sshd[11432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.65.72
Sep  2 06:25:18 minden010 sshd[11432]: Failed password for invalid user lorelai from 51.75.65.72 port 44777 ssh2
Sep  2 06:29:06 minden010 sshd[12992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.65.72
...
2019-09-02 13:02:52
122.161.192.206 attackspambots
Sep  2 06:51:07 markkoudstaal sshd[32238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.161.192.206
Sep  2 06:51:10 markkoudstaal sshd[32238]: Failed password for invalid user hadoopuser from 122.161.192.206 port 55904 ssh2
Sep  2 06:56:15 markkoudstaal sshd[370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.161.192.206
2019-09-02 12:57:40
134.73.76.227 attack
Spam mails sent to address hacked/leaked from Nexus Mods in July 2013
2019-09-02 12:58:38
222.154.238.59 attackspam
Sep  2 06:53:01 www5 sshd\[17663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.154.238.59  user=root
Sep  2 06:53:03 www5 sshd\[17663\]: Failed password for root from 222.154.238.59 port 43212 ssh2
Sep  2 06:57:59 www5 sshd\[18493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.154.238.59  user=messagebus
...
2019-09-02 13:05:03
106.12.197.119 attack
Sep  1 18:54:27 web9 sshd\[6406\]: Invalid user formation from 106.12.197.119
Sep  1 18:54:27 web9 sshd\[6406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.197.119
Sep  1 18:54:29 web9 sshd\[6406\]: Failed password for invalid user formation from 106.12.197.119 port 49996 ssh2
Sep  1 18:59:41 web9 sshd\[7385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.197.119  user=root
Sep  1 18:59:43 web9 sshd\[7385\]: Failed password for root from 106.12.197.119 port 38150 ssh2
2019-09-02 13:01:51
51.68.122.190 attack
Sep  2 06:25:35 saschabauer sshd[28619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.190
Sep  2 06:25:37 saschabauer sshd[28619]: Failed password for invalid user cooperation from 51.68.122.190 port 55817 ssh2
2019-09-02 12:50:22
188.235.138.182 attack
xmlrpc attack
2019-09-02 13:56:32
114.247.177.155 attackspambots
Sep  2 07:14:08 vps691689 sshd[10835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.247.177.155
Sep  2 07:14:10 vps691689 sshd[10835]: Failed password for invalid user ts3 from 114.247.177.155 port 60138 ssh2
Sep  2 07:23:56 vps691689 sshd[11102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.247.177.155
...
2019-09-02 13:55:45

最近上报的IP列表

114.97.185.223 34.105.56.29 113.195.170.224 122.187.228.253
120.41.79.1 5.133.123.45 139.227.169.103 45.170.43.1
172.105.128.30 159.89.226.46 165.227.169.86 160.251.21.45
2a01:7e01::f03c:91ff:fe05:d893 128.90.106.158 23.94.247.193 128.90.43.84
103.184.94.128 18.223.196.103 45.57.168.47 191.205.248.196