必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kempton Park

省份(region): Gauteng

国家(country): South Africa

运营商(isp): Telkom

主机名(hostname): unknown

机构(organization): Telkom-Internet

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.226.234.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43378
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.226.234.19.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 26 02:13:57 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
19.234.226.105.in-addr.arpa domain name pointer 234-226-105-19.north.dsl.telkomsa.net.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
19.234.226.105.in-addr.arpa	name = 234-226-105-19.north.dsl.telkomsa.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.220.55.57 attackspam
445/tcp 445/tcp
[2020-10-02]2pkt
2020-10-04 00:26:41
36.156.156.150 attackspambots
Oct  3 14:24:35 h2646465 sshd[15929]: Invalid user tania from 36.156.156.150
Oct  3 14:24:35 h2646465 sshd[15929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.156.150
Oct  3 14:24:35 h2646465 sshd[15929]: Invalid user tania from 36.156.156.150
Oct  3 14:24:36 h2646465 sshd[15929]: Failed password for invalid user tania from 36.156.156.150 port 34524 ssh2
Oct  3 14:34:46 h2646465 sshd[17206]: Invalid user administrator from 36.156.156.150
Oct  3 14:34:46 h2646465 sshd[17206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.156.156.150
Oct  3 14:34:46 h2646465 sshd[17206]: Invalid user administrator from 36.156.156.150
Oct  3 14:34:48 h2646465 sshd[17206]: Failed password for invalid user administrator from 36.156.156.150 port 49983 ssh2
Oct  3 14:39:21 h2646465 sshd[17900]: Invalid user tg from 36.156.156.150
...
2020-10-04 00:28:48
212.47.241.15 attack
Oct  3 14:40:48 localhost sshd[36310]: Invalid user user01 from 212.47.241.15 port 36904
Oct  3 14:40:48 localhost sshd[36310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.241.15
Oct  3 14:40:48 localhost sshd[36310]: Invalid user user01 from 212.47.241.15 port 36904
Oct  3 14:40:50 localhost sshd[36310]: Failed password for invalid user user01 from 212.47.241.15 port 36904 ssh2
Oct  3 14:44:17 localhost sshd[36664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.241.15  user=root
Oct  3 14:44:19 localhost sshd[36664]: Failed password for root from 212.47.241.15 port 42182 ssh2
...
2020-10-04 00:08:16
108.160.152.19 attackspam
PHP Info File Request - Possible PHP Version Scan
2020-10-04 00:32:02
123.22.93.38 attack
SSH Bruteforce Attempt on Honeypot
2020-10-04 00:19:18
219.157.207.221 attackbotsspam
8443/tcp 8443/tcp 8443/tcp
[2020-10-02]3pkt
2020-10-03 23:59:10
125.44.248.87 attack
23/tcp
[2020-10-02]1pkt
2020-10-03 23:58:27
49.35.200.6 attackspam
Oct  2 22:38:04 v22019058497090703 sshd[18214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.35.200.6
Oct  2 22:38:05 v22019058497090703 sshd[18214]: Failed password for invalid user administrator from 49.35.200.6 port 63337 ssh2
...
2020-10-04 00:27:29
95.217.226.22 attackbots
28 attempts against mh-misbehave-ban on wave
2020-10-04 00:15:16
118.70.72.103 attackspam
Invalid user git from 118.70.72.103 port 33376
2020-10-04 00:34:04
95.9.185.37 attackbots
20/10/2@19:00:39: FAIL: Alarm-Network address from=95.9.185.37
...
2020-10-04 00:32:31
122.51.114.226 attackbots
Oct  3 16:39:51 con01 sshd[44778]: Failed password for root from 122.51.114.226 port 57828 ssh2
Oct  3 16:44:40 con01 sshd[56732]: Invalid user zy from 122.51.114.226 port 49620
Oct  3 16:44:40 con01 sshd[56732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.114.226 
Oct  3 16:44:40 con01 sshd[56732]: Invalid user zy from 122.51.114.226 port 49620
Oct  3 16:44:41 con01 sshd[56732]: Failed password for invalid user zy from 122.51.114.226 port 49620 ssh2
...
2020-10-04 00:43:05
186.67.182.30 attackbots
445/tcp
[2020-10-02]1pkt
2020-10-04 00:27:47
109.190.14.67 attackspambots
Automatic report - Banned IP Access
2020-10-04 00:13:08
110.52.223.244 attack
1433/tcp
[2020-10-02]1pkt
2020-10-04 00:31:36

最近上报的IP列表

208.187.165.83 187.10.200.203 95.87.25.223 44.226.210.7
189.39.223.9 138.122.143.7 149.53.173.37 114.239.220.182
191.38.129.6 2806:10ae:f:23e9:2c7a:16e5:a1f6:e74a 195.145.30.170 172.107.94.66
62.86.225.126 200.172.103.20 190.15.122.2 200.182.208.80
73.236.173.183 61.191.197.240 140.232.209.102 112.78.15.82