必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Africa

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.224.246.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.224.246.57.			IN	A

;; AUTHORITY SECTION:
.			253	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 21:00:33 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
57.246.224.105.in-addr.arpa domain name pointer 105-224-246-57.north.dsl.telkomsa.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.246.224.105.in-addr.arpa	name = 105-224-246-57.north.dsl.telkomsa.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.188.124.228 attackbotsspam
Sep  6 06:48:59 pkdns2 sshd\[21874\]: Invalid user ts3pass from 92.188.124.228Sep  6 06:49:00 pkdns2 sshd\[21874\]: Failed password for invalid user ts3pass from 92.188.124.228 port 35476 ssh2Sep  6 06:53:37 pkdns2 sshd\[22077\]: Invalid user sgeadmin from 92.188.124.228Sep  6 06:53:40 pkdns2 sshd\[22077\]: Failed password for invalid user sgeadmin from 92.188.124.228 port 50098 ssh2Sep  6 06:58:19 pkdns2 sshd\[22281\]: Invalid user bot123 from 92.188.124.228Sep  6 06:58:21 pkdns2 sshd\[22281\]: Failed password for invalid user bot123 from 92.188.124.228 port 36758 ssh2
...
2019-09-06 13:12:46
71.127.237.61 attackbots
Sep  6 05:57:20 pornomens sshd\[21148\]: Invalid user sshuser123 from 71.127.237.61 port 52118
Sep  6 05:57:20 pornomens sshd\[21148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.127.237.61
Sep  6 05:57:22 pornomens sshd\[21148\]: Failed password for invalid user sshuser123 from 71.127.237.61 port 52118 ssh2
...
2019-09-06 13:54:16
149.91.83.68 attackspam
Sep  6 06:57:22 www5 sshd\[58524\]: Invalid user administrateur from 149.91.83.68
Sep  6 06:57:22 www5 sshd\[58524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.91.83.68
Sep  6 06:57:24 www5 sshd\[58524\]: Failed password for invalid user administrateur from 149.91.83.68 port 37306 ssh2
...
2019-09-06 13:52:06
92.63.194.26 attackspambots
Sep  6 06:55:49 fr01 sshd[366]: Invalid user admin from 92.63.194.26
...
2019-09-06 13:19:03
37.139.2.218 attack
Sep  5 19:06:01 php2 sshd\[26796\]: Invalid user admin from 37.139.2.218
Sep  5 19:06:01 php2 sshd\[26796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.2.218
Sep  5 19:06:03 php2 sshd\[26796\]: Failed password for invalid user admin from 37.139.2.218 port 48240 ssh2
Sep  5 19:10:27 php2 sshd\[27292\]: Invalid user deploy from 37.139.2.218
Sep  5 19:10:27 php2 sshd\[27292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.2.218
2019-09-06 13:18:25
218.98.40.136 attackspam
Sep  6 06:54:01 MK-Soft-Root1 sshd\[16415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.40.136  user=root
Sep  6 06:54:03 MK-Soft-Root1 sshd\[16415\]: Failed password for root from 218.98.40.136 port 15759 ssh2
Sep  6 06:54:05 MK-Soft-Root1 sshd\[16415\]: Failed password for root from 218.98.40.136 port 15759 ssh2
...
2019-09-06 13:09:04
106.12.93.12 attackspam
Sep  5 19:02:08 aiointranet sshd\[17888\]: Invalid user azerty from 106.12.93.12
Sep  5 19:02:08 aiointranet sshd\[17888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.12
Sep  5 19:02:10 aiointranet sshd\[17888\]: Failed password for invalid user azerty from 106.12.93.12 port 57370 ssh2
Sep  5 19:07:38 aiointranet sshd\[18282\]: Invalid user 123 from 106.12.93.12
Sep  5 19:07:38 aiointranet sshd\[18282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.12
2019-09-06 13:16:51
187.95.124.230 attack
Sep  6 06:52:23 www2 sshd\[37791\]: Invalid user sinusbot from 187.95.124.230Sep  6 06:52:25 www2 sshd\[37791\]: Failed password for invalid user sinusbot from 187.95.124.230 port 46000 ssh2Sep  6 06:58:02 www2 sshd\[38435\]: Invalid user ubuntu12345 from 187.95.124.230
...
2019-09-06 13:25:44
140.143.170.123 attackbotsspam
Sep  6 04:58:56 MK-Soft-VM6 sshd\[9883\]: Invalid user 123456789 from 140.143.170.123 port 58782
Sep  6 04:58:56 MK-Soft-VM6 sshd\[9883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.170.123
Sep  6 04:58:57 MK-Soft-VM6 sshd\[9883\]: Failed password for invalid user 123456789 from 140.143.170.123 port 58782 ssh2
...
2019-09-06 13:51:36
45.82.153.37 attackspambots
2019-09-06 06:52:36 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data \(set_id=test@opso.it\)
2019-09-06 06:52:46 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data \(set_id=test\)
2019-09-06 06:54:49 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data \(set_id=no-reply@opso.it\)
2019-09-06 06:54:58 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data \(set_id=no-reply\)
2019-09-06 07:01:01 dovecot_plain authenticator failed for \(\[45.82.153.37\]\) \[45.82.153.37\]: 535 Incorrect authentication data \(set_id=noreply@opso.it\)
2019-09-06 13:11:52
129.211.147.91 attackbotsspam
Sep  6 07:31:46 vps01 sshd[9547]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.147.91
Sep  6 07:31:48 vps01 sshd[9547]: Failed password for invalid user 123 from 129.211.147.91 port 44258 ssh2
2019-09-06 13:52:37
72.11.168.29 attackspambots
Sep  5 17:52:26 friendsofhawaii sshd\[23478\]: Invalid user ubuntu from 72.11.168.29
Sep  5 17:52:26 friendsofhawaii sshd\[23478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72-11-168-29.cpe.axion.ca
Sep  5 17:52:27 friendsofhawaii sshd\[23478\]: Failed password for invalid user ubuntu from 72.11.168.29 port 56118 ssh2
Sep  5 17:58:46 friendsofhawaii sshd\[23948\]: Invalid user user from 72.11.168.29
Sep  5 17:58:46 friendsofhawaii sshd\[23948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72-11-168-29.cpe.axion.ca
2019-09-06 12:58:04
118.70.128.211 attack
Brute forcing RDP port 3389
2019-09-06 13:53:09
159.65.97.238 attackbots
Sep  6 08:03:35 server sshd\[7250\]: Invalid user postgres from 159.65.97.238 port 33852
Sep  6 08:03:35 server sshd\[7250\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.97.238
Sep  6 08:03:37 server sshd\[7250\]: Failed password for invalid user postgres from 159.65.97.238 port 33852 ssh2
Sep  6 08:08:11 server sshd\[1356\]: Invalid user daniel from 159.65.97.238 port 48370
Sep  6 08:08:11 server sshd\[1356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.97.238
2019-09-06 13:16:33
209.17.96.114 attackbotsspam
Automatic report - Banned IP Access
2019-09-06 13:41:25

最近上报的IP列表

105.224.247.103 105.224.24.177 105.224.246.122 105.224.249.177
105.224.249.65 105.224.25.190 105.224.247.176 105.224.247.60
101.18.80.45 105.224.251.28 105.224.254.222 105.224.251.39
101.18.80.57 105.224.234.150 101.18.81.123 101.18.81.235
101.18.81.62 101.18.82.13 101.18.82.149 101.200.188.106