必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.99.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60745
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.99.116.			IN	A

;; AUTHORITY SECTION:
.			595	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:17:30 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
116.99.213.105.in-addr.arpa domain name pointer 105-213-99-116.access.mtnbusiness.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.99.213.105.in-addr.arpa	name = 105-213-99-116.access.mtnbusiness.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
110.166.82.138 attackbots
Jul  7 14:05:30 gestao sshd[4805]: Failed password for root from 110.166.82.138 port 60572 ssh2
Jul  7 14:09:52 gestao sshd[4947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.166.82.138 
Jul  7 14:09:54 gestao sshd[4947]: Failed password for invalid user ubuntu from 110.166.82.138 port 50288 ssh2
...
2020-07-08 00:41:32
208.109.53.185 attackbots
Brute-force general attack.
2020-07-08 00:53:03
62.30.143.227 attackbots
$f2bV_matches
2020-07-08 00:51:57
186.250.200.87 attackspambots
(smtpauth) Failed SMTP AUTH login from 186.250.200.87 (BR/Brazil/186-250-200-87.ibl.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-07 16:29:16 plain authenticator failed for ([186.250.200.87]) [186.250.200.87]: 535 Incorrect authentication data (set_id=info)
2020-07-08 00:35:42
157.55.39.71 attackspambots
Automatic report - Banned IP Access
2020-07-08 00:18:37
54.36.98.129 attackspam
Jul  7 17:18:42 gestao sshd[7721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.98.129 
Jul  7 17:18:45 gestao sshd[7721]: Failed password for invalid user amine from 54.36.98.129 port 55450 ssh2
Jul  7 17:21:51 gestao sshd[7749]: Failed password for root from 54.36.98.129 port 52424 ssh2
...
2020-07-08 00:28:07
46.38.150.47 attackbotsspam
2020-07-07 18:49:07 dovecot_login authenticator failed for \(User\) \[46.38.150.47\]: 535 Incorrect authentication data \(set_id=socio@no-server.de\)
2020-07-07 18:49:20 dovecot_login authenticator failed for \(User\) \[46.38.150.47\]: 535 Incorrect authentication data \(set_id=socio@no-server.de\)
2020-07-07 18:49:24 dovecot_login authenticator failed for \(User\) \[46.38.150.47\]: 535 Incorrect authentication data \(set_id=katelyn@no-server.de\)
2020-07-07 18:49:44 dovecot_login authenticator failed for \(User\) \[46.38.150.47\]: 535 Incorrect authentication data \(set_id=rus@no-server.de\)
2020-07-07 18:49:48 dovecot_login authenticator failed for \(User\) \[46.38.150.47\]: 535 Incorrect authentication data \(set_id=katelyn@no-server.de\)
...
2020-07-08 00:52:49
185.112.184.174 attackbotsspam
Hit honeypot r.
2020-07-08 00:47:10
107.174.236.228 attackbots
0,95-07/08 [bc04/m132] PostRequest-Spammer scoring: harare01
2020-07-08 00:38:14
221.209.17.222 attack
SSH BruteForce Attack
2020-07-08 00:31:15
107.174.66.229 attackspambots
(sshd) Failed SSH login from 107.174.66.229 (US/United States/107-174-66-229-host.colocrossing.com): 5 in the last 3600 secs
2020-07-08 00:36:47
192.99.5.94 attackbotsspam
192.99.5.94 - - [07/Jul/2020:17:04:30 +0100] "POST /wp-login.php HTTP/1.1" 200 5874 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.5.94 - - [07/Jul/2020:17:06:44 +0100] "POST /wp-login.php HTTP/1.1" 200 5874 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.5.94 - - [07/Jul/2020:17:08:49 +0100] "POST /wp-login.php HTTP/1.1" 200 5874 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-07-08 00:17:13
171.231.246.193 attack
1594123164 - 07/07/2020 13:59:24 Host: 171.231.246.193/171.231.246.193 Port: 445 TCP Blocked
2020-07-08 00:33:45
200.41.86.59 attackspam
Jul  7 15:26:55 OPSO sshd\[28711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.41.86.59  user=root
Jul  7 15:26:58 OPSO sshd\[28711\]: Failed password for root from 200.41.86.59 port 44760 ssh2
Jul  7 15:30:30 OPSO sshd\[29361\]: Invalid user debian from 200.41.86.59 port 41538
Jul  7 15:30:30 OPSO sshd\[29361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.41.86.59
Jul  7 15:30:33 OPSO sshd\[29361\]: Failed password for invalid user debian from 200.41.86.59 port 41538 ssh2
2020-07-08 00:21:22
129.204.23.5 attackbotsspam
Jul  7 14:07:13 django-0 sshd[20736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.23.5  user=root
Jul  7 14:07:15 django-0 sshd[20736]: Failed password for root from 129.204.23.5 port 50900 ssh2
...
2020-07-08 00:48:05

最近上报的IP列表

105.213.99.114 105.213.99.121 105.213.99.155 105.213.99.158
105.213.99.170 105.213.99.192 105.213.99.172 105.213.99.177
105.213.99.18 105.213.99.217 105.213.99.223 105.213.99.241
105.213.99.49 105.213.99.239 105.213.99.51 105.213.99.5
105.213.99.55 105.213.99.53 105.213.99.83 105.213.99.75