必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.213.99.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.213.99.75.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022801 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 01 03:17:35 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
75.99.213.105.in-addr.arpa domain name pointer 105-213-99-75.access.mtnbusiness.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
75.99.213.105.in-addr.arpa	name = 105-213-99-75.access.mtnbusiness.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.178.238.211 attack
Telnet/23 MH Probe, BF, Hack -
2019-08-22 16:54:20
104.248.1.14 attackspam
Aug 22 11:16:09 vps691689 sshd[17248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.1.14
Aug 22 11:16:10 vps691689 sshd[17248]: Failed password for invalid user team from 104.248.1.14 port 36262 ssh2
...
2019-08-22 17:29:50
119.119.114.111 attack
Seq 2995002506
2019-08-22 16:37:30
139.59.180.53 attack
Invalid user buscagli from 139.59.180.53 port 40672
2019-08-22 17:14:59
27.8.99.248 attack
port scan and connect, tcp 23 (telnet)
2019-08-22 16:56:29
222.186.52.124 attackbotsspam
2019-08-22T11:12:06.973147centos sshd\[6242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.124  user=root
2019-08-22T11:12:09.164379centos sshd\[6242\]: Failed password for root from 222.186.52.124 port 44700 ssh2
2019-08-22T11:12:11.469664centos sshd\[6242\]: Failed password for root from 222.186.52.124 port 44700 ssh2
2019-08-22 17:14:20
116.20.231.114 attack
Seq 2995002506
2019-08-22 16:39:37
162.248.54.39 attack
Invalid user nh from 162.248.54.39 port 48224
2019-08-22 16:34:49
94.228.200.224 attack
scan z
2019-08-22 17:04:36
192.99.56.117 attackbotsspam
Aug 22 05:20:57 ny01 sshd[4743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.56.117
Aug 22 05:20:59 ny01 sshd[4743]: Failed password for invalid user demo from 192.99.56.117 port 59270 ssh2
Aug 22 05:26:03 ny01 sshd[5232]: Failed password for root from 192.99.56.117 port 46338 ssh2
2019-08-22 17:46:57
142.93.212.131 attackbotsspam
Aug 22 11:04:33 vtv3 sshd\[6933\]: Invalid user plesk from 142.93.212.131 port 60042
Aug 22 11:04:33 vtv3 sshd\[6933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.131
Aug 22 11:04:35 vtv3 sshd\[6933\]: Failed password for invalid user plesk from 142.93.212.131 port 60042 ssh2
Aug 22 11:10:32 vtv3 sshd\[10207\]: Invalid user asterisk from 142.93.212.131 port 60538
Aug 22 11:10:32 vtv3 sshd\[10207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.131
Aug 22 11:24:17 vtv3 sshd\[16787\]: Invalid user multparts from 142.93.212.131 port 55756
Aug 22 11:24:17 vtv3 sshd\[16787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.212.131
Aug 22 11:24:20 vtv3 sshd\[16787\]: Failed password for invalid user multparts from 142.93.212.131 port 55756 ssh2
Aug 22 11:28:57 vtv3 sshd\[19322\]: Invalid user hostmaster from 142.93.212.131 port 44748
Aug 22 11:28:57 vtv
2019-08-22 17:25:29
139.217.87.235 attack
Aug 21 22:42:26 hiderm sshd\[13239\]: Invalid user hunter from 139.217.87.235
Aug 21 22:42:26 hiderm sshd\[13239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.87.235
Aug 21 22:42:28 hiderm sshd\[13239\]: Failed password for invalid user hunter from 139.217.87.235 port 50848 ssh2
Aug 21 22:47:53 hiderm sshd\[13708\]: Invalid user ravi from 139.217.87.235
Aug 21 22:47:53 hiderm sshd\[13708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.217.87.235
2019-08-22 16:59:46
103.233.1.189 attackbotsspam
/wp-login.php
2019-08-22 17:25:08
123.207.145.66 attack
Aug 22 10:42:28 root sshd[13898]: Failed password for messagebus from 123.207.145.66 port 37070 ssh2
Aug 22 10:47:45 root sshd[13933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.145.66 
Aug 22 10:47:47 root sshd[13933]: Failed password for invalid user shashi from 123.207.145.66 port 53014 ssh2
...
2019-08-22 17:07:26
111.230.151.134 attackbots
Aug 22 11:00:59 eventyay sshd[21958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.151.134
Aug 22 11:01:01 eventyay sshd[21958]: Failed password for invalid user xavier from 111.230.151.134 port 53644 ssh2
Aug 22 11:05:26 eventyay sshd[22980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.151.134
...
2019-08-22 17:15:53

最近上报的IP列表

105.213.99.83 105.213.99.93 105.216.0.11 105.216.0.124
105.216.0.153 105.216.0.163 105.216.0.175 105.216.0.182
105.216.0.52 105.216.0.54 105.216.1.155 105.216.1.114
105.216.25.211 105.216.26.108 105.216.1.123 105.216.26.170
105.216.26.145 105.216.26.130 105.216.26.91 67.182.210.147