必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Cape Town

省份(region): Western Cape

国家(country): South Africa

运营商(isp): Telkom

主机名(hostname): unknown

机构(organization): Telkom-Internet

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.228.145.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29563
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;105.228.145.63.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061201 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 13 11:03:51 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
63.145.228.105.in-addr.arpa domain name pointer 105-228-145-63.ti-dsl.telkomsa.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
63.145.228.105.in-addr.arpa	name = 105-228-145-63.ti-dsl.telkomsa.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.62.206.175 attackspambots
Invalid user divya from 178.62.206.175 port 34572
2020-03-11 17:13:20
91.121.45.5 attack
Invalid user sinus from 91.121.45.5 port 6490
2020-03-11 16:59:56
45.32.102.64 attackbotsspam
2020-03-11T09:49:35.262777scmdmz1 sshd[15127]: Invalid user cnbing from 45.32.102.64 port 58300
2020-03-11T09:49:37.125881scmdmz1 sshd[15127]: Failed password for invalid user cnbing from 45.32.102.64 port 58300 ssh2
2020-03-11T09:53:27.723852scmdmz1 sshd[15539]: Invalid user postgres from 45.32.102.64 port 43946
...
2020-03-11 17:05:37
116.12.251.135 attackbots
Mar 11 01:51:56 server sshd\[7148\]: Failed password for invalid user dspace from 116.12.251.135 port 50582 ssh2
Mar 11 11:46:04 server sshd\[1320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.251.135  user=root
Mar 11 11:46:07 server sshd\[1320\]: Failed password for root from 116.12.251.135 port 50320 ssh2
Mar 11 11:52:34 server sshd\[2446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.12.251.135  user=root
Mar 11 11:52:37 server sshd\[2446\]: Failed password for root from 116.12.251.135 port 40296 ssh2
...
2020-03-11 17:24:02
157.245.200.79 attackspambots
Invalid user postgres from 157.245.200.79 port 45928
2020-03-11 16:49:54
128.199.109.128 attackbots
Invalid user xxx from 128.199.109.128 port 55938
2020-03-11 16:51:25
178.159.44.221 attack
(sshd) Failed SSH login from 178.159.44.221 (BY/Belarus/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 11 09:28:06 amsweb01 sshd[13701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.44.221  user=root
Mar 11 09:28:08 amsweb01 sshd[13701]: Failed password for root from 178.159.44.221 port 40120 ssh2
Mar 11 09:31:46 amsweb01 sshd[14030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.44.221  user=root
Mar 11 09:31:48 amsweb01 sshd[14030]: Failed password for root from 178.159.44.221 port 40888 ssh2
Mar 11 09:33:45 amsweb01 sshd[14189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.44.221  user=root
2020-03-11 17:12:58
45.119.80.39 attackbotsspam
Mar 11 08:48:54 sigma sshd\[4346\]: Invalid user flytlink from 45.119.80.39Mar 11 08:48:56 sigma sshd\[4346\]: Failed password for invalid user flytlink from 45.119.80.39 port 57750 ssh2
...
2020-03-11 17:05:05
187.107.17.139 attack
Port probing on unauthorized port 23
2020-03-11 16:46:13
167.249.11.57 attackspam
$f2bV_matches
2020-03-11 16:48:01
167.114.98.234 attackbotsspam
Invalid user narciso from 167.114.98.234 port 42304
2020-03-11 17:14:11
128.199.116.10 attackspambots
Invalid user fengtc from 128.199.116.10 port 50002
2020-03-11 17:20:07
128.199.204.164 attack
Mar 11 09:14:20 MainVPS sshd[19543]: Invalid user bitbucket from 128.199.204.164 port 37114
Mar 11 09:14:20 MainVPS sshd[19543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.164
Mar 11 09:14:20 MainVPS sshd[19543]: Invalid user bitbucket from 128.199.204.164 port 37114
Mar 11 09:14:22 MainVPS sshd[19543]: Failed password for invalid user bitbucket from 128.199.204.164 port 37114 ssh2
Mar 11 09:20:48 MainVPS sshd[32267]: Invalid user javier from 128.199.204.164 port 48540
...
2020-03-11 16:51:00
162.222.212.46 attackspambots
Invalid user oracle from 162.222.212.46 port 60774
2020-03-11 17:15:51
107.189.10.44 attack
Invalid user fake from 107.189.10.44 port 52780
2020-03-11 16:55:40

最近上报的IP列表

119.174.132.1 2.185.181.7 37.49.96.6 147.149.184.95
220.75.247.188 49.77.2.205 74.82.2.12 184.29.113.144
134.209.97.180 207.16.203.165 63.95.140.121 112.16.117.99
82.1.42.16 138.94.58.11 24.104.58.79 90.32.7.54
87.10.247.153 157.120.50.181 162.148.13.191 59.108.189.191