必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kiserian

省份(region): Kajiado

国家(country): Kenya

运营商(isp): Airtel

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '105.230.0.0 - 105.230.255.255'

% No abuse contact registered for 105.230.0.0 - 105.230.255.255

inetnum:        105.230.0.0 - 105.230.255.255
netname:        AirtelBroadband
descr:          Airtel Broadband
country:        KE
admin-c:        PM14-AFRINIC
tech-c:         PM14-AFRINIC
status:         ASSIGNED PA
mnt-by:         Henry-Owiti
source:         AFRINIC # Filtered
parent:         105.230.0.0 - 105.231.255.255

person:         Patrick Muiruri
address:        P. O. Box 73146, 00200
address:        Parkside Towers, Mombasa Road
address:        NAIROBI,  KENYA
phone:          tel:+254-733-332172
phone:          tel:+254-734-110044
nic-hdl:        PM14-AFRINIC
mnt-by:         GENERATED-HEVJSMGQFVLP9VYX5ENQHVXKELSSM7QW-MNT
source:         AFRINIC # Filtered

% Information related to '105.230.192.0/18AS36926'

route:          105.230.192.0/18
descr:          Airtel KE Mobile & Fixed Internet
origin:         AS36926
mnt-by:         AIRTEL-KE
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.230.204.252
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15432
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.230.204.252.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040800 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 08 14:55:32 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
b'252.204.230.105.in-addr.arpa domain name pointer 252-204-230-105.r.airtelkenya.com.
'
NSLOOKUP信息:
b'252.204.230.105.in-addr.arpa	name = 252-204-230-105.r.airtelkenya.com.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.40.225.169 attackspambots
" "
2019-08-12 15:33:12
60.210.113.13 attackspambots
Aug 12 07:00:21 v22018076622670303 sshd\[23331\]: Invalid user ellen from 60.210.113.13 port 14227
Aug 12 07:00:21 v22018076622670303 sshd\[23331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.210.113.13
Aug 12 07:00:23 v22018076622670303 sshd\[23331\]: Failed password for invalid user ellen from 60.210.113.13 port 14227 ssh2
...
2019-08-12 15:39:44
218.16.123.136 attack
19/8/11@22:38:26: FAIL: Alarm-Intrusion address from=218.16.123.136
...
2019-08-12 15:19:10
51.38.239.2 attackbots
2019-08-12T07:13:28.140169abusebot-4.cloudsearch.cf sshd\[24637\]: Invalid user zookeeper from 51.38.239.2 port 50986
2019-08-12 15:28:37
156.213.34.221 attackspambots
port scan and connect, tcp 23 (telnet)
2019-08-12 15:38:13
95.120.142.107 attackbots
Automatic report - Port Scan Attack
2019-08-12 14:53:45
177.38.160.26 attack
Aug 12 07:46:51 Proxmox sshd\[18232\]: Invalid user wz from 177.38.160.26 port 33732
Aug 12 07:46:51 Proxmox sshd\[18232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.38.160.26
Aug 12 07:46:53 Proxmox sshd\[18232\]: Failed password for invalid user wz from 177.38.160.26 port 33732 ssh2
2019-08-12 15:37:28
83.32.34.201 attack
Automatic report - Port Scan Attack
2019-08-12 15:15:34
23.129.64.192 attackspambots
v+ssh-bruteforce
2019-08-12 15:36:06
114.45.69.122 attackbots
Caught in portsentry honeypot
2019-08-12 15:26:22
134.175.141.166 attackspambots
$f2bV_matches
2019-08-12 15:31:26
140.143.170.123 attack
Aug 12 09:19:11 tuxlinux sshd[31482]: Invalid user user from 140.143.170.123 port 53278
Aug 12 09:19:11 tuxlinux sshd[31482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.170.123 
Aug 12 09:19:11 tuxlinux sshd[31482]: Invalid user user from 140.143.170.123 port 53278
Aug 12 09:19:11 tuxlinux sshd[31482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.170.123 
Aug 12 09:19:11 tuxlinux sshd[31482]: Invalid user user from 140.143.170.123 port 53278
Aug 12 09:19:11 tuxlinux sshd[31482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.170.123 
Aug 12 09:19:13 tuxlinux sshd[31482]: Failed password for invalid user user from 140.143.170.123 port 53278 ssh2
...
2019-08-12 15:42:01
183.146.209.68 attackbots
Unauthorized SSH login attempts
2019-08-12 15:11:01
118.24.210.254 attackbotsspam
Aug 12 04:39:36 h2570396 sshd[454]: Failed password for invalid user edineide from 118.24.210.254 port 39794 ssh2
Aug 12 04:39:36 h2570396 sshd[454]: Received disconnect from 118.24.210.254: 11: Bye Bye [preauth]
Aug 12 04:57:55 h2570396 sshd[581]: Failed password for invalid user gogs from 118.24.210.254 port 39566 ssh2
Aug 12 04:57:55 h2570396 sshd[581]: Received disconnect from 118.24.210.254: 11: Bye Bye [preauth]
Aug 12 05:02:09 h2570396 sshd[2246]: Failed password for invalid user hadoop from 118.24.210.254 port 47526 ssh2
Aug 12 05:02:09 h2570396 sshd[2246]: Received disconnect from 118.24.210.254: 11: Bye Bye [preauth]
Aug 12 05:06:15 h2570396 sshd[2291]: Failed password for invalid user centos from 118.24.210.254 port 55618 ssh2
Aug 12 05:06:16 h2570396 sshd[2291]: Received disconnect from 118.24.210.254: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=118.24.210.254
2019-08-12 15:21:33
45.227.253.216 attackbots
Aug 12 08:45:21 relay postfix/smtpd\[22651\]: warning: unknown\[45.227.253.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:45:28 relay postfix/smtpd\[21731\]: warning: unknown\[45.227.253.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:50:42 relay postfix/smtpd\[19648\]: warning: unknown\[45.227.253.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:50:49 relay postfix/smtpd\[24817\]: warning: unknown\[45.227.253.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 08:51:12 relay postfix/smtpd\[19648\]: warning: unknown\[45.227.253.216\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-12 14:57:55

最近上报的IP列表

247.99.211.132 134.244.207.148 110.77.248.38 2606:4700:10::6816:432
2606:4700:10::6814:4621 2606:4700:10::6814:8162 2606:4700:10::6814:9733 2606:4700:10::6814:9289
2606:4700:10::6816:2672 2606:4700:10::6814:5720 2606:4700:10::6814:5634 2606:4700:10::6816:3426
74.234.248.60 39.185.222.19 112.111.13.163 223.199.189.4
1.83.125.78 1.83.125.176 122.96.28.156 118.212.120.51