必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Johannesburg

省份(region): Gauteng

国家(country): South Africa

运营商(isp): Vodacom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '105.247.0.0 - 105.247.255.255'

% No abuse contact registered for 105.247.0.0 - 105.247.255.255

inetnum:        105.247.0.0 - 105.247.255.255
netname:        Vodacom_ENS
descr:          Vodacom Business (ENS)
country:        ZA
admin-c:        JH2-AFRINIC
tech-c:         JH2-AFRINIC
status:         ASSIGNED PA
remarks:        Vodacom Business (ENS)
remarks:        abuse@vodacombusiness.co.za
mnt-by:         VODACOM-MNT
source:         AFRINIC # Filtered
parent:         105.240.0.0 - 105.255.255.255

person:         Jacques Hendricks
address:        Vodacom PTY (Ltd)
phone:          tel:+27-21-940-9498
nic-hdl:        JH2-AFRINIC
mnt-by:         GENERATED-HXZNUNMTWGLLJHI8IRLJWOUQLU1JTPYU-MNT
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.247.83.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.247.83.229.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040300 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 03 18:53:31 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
229.83.247.105.in-addr.arpa domain name pointer vc-vb-105-247-83-229.ens.vodacom.co.za.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
229.83.247.105.in-addr.arpa	name = vc-vb-105-247-83-229.ens.vodacom.co.za.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
91.103.27.235 attackspambots
Apr  6 16:22:52 legacy sshd[21577]: Failed password for root from 91.103.27.235 port 42838 ssh2
Apr  6 16:27:08 legacy sshd[21623]: Failed password for root from 91.103.27.235 port 53026 ssh2
...
2020-04-06 22:42:46
222.106.61.152 attack
Apr  6 14:44:41 dev0-dcde-rnet sshd[18391]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.106.61.152
Apr  6 14:44:42 dev0-dcde-rnet sshd[18393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.106.61.152
Apr  6 14:44:43 dev0-dcde-rnet sshd[18391]: Failed password for invalid user pi from 222.106.61.152 port 49618 ssh2
2020-04-06 22:53:44
106.13.169.46 attackbots
fail2ban -- 106.13.169.46
...
2020-04-06 23:23:30
148.72.207.250 attackbots
Automatic report - XMLRPC Attack
2020-04-06 22:59:10
104.131.55.236 attackspambots
(sshd) Failed SSH login from 104.131.55.236 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  6 16:36:26 ubnt-55d23 sshd[23608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.55.236  user=root
Apr  6 16:36:28 ubnt-55d23 sshd[23608]: Failed password for root from 104.131.55.236 port 33532 ssh2
2020-04-06 23:17:26
183.89.212.198 attackspam
imap-login: Disconnected \(auth failed, 1 attempts in 5
2020-04-06 22:47:40
185.86.164.100 attackbotsspam
Website administration hacking try
2020-04-06 22:34:00
193.238.52.217 attack
Port probing on unauthorized port 23
2020-04-06 22:52:53
101.128.239.102 attackspambots
Unauthorized connection attempt detected from IP address 101.128.239.102 to port 2323 [T]
2020-04-06 22:49:00
89.248.160.150 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 83 - port: 41191 proto: UDP cat: Misc Attack
2020-04-06 22:45:30
35.231.211.161 attackbots
Apr  6 17:24:53 hosting sshd[25553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.211.231.35.bc.googleusercontent.com  user=root
Apr  6 17:24:55 hosting sshd[25553]: Failed password for root from 35.231.211.161 port 56900 ssh2
Apr  6 17:27:52 hosting sshd[26069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.211.231.35.bc.googleusercontent.com  user=root
Apr  6 17:27:54 hosting sshd[26069]: Failed password for root from 35.231.211.161 port 52352 ssh2
...
2020-04-06 22:57:28
180.241.47.4 attackbotsspam
"Unauthorized connection attempt on SSHD detected"
2020-04-06 22:33:37
183.83.130.126 attackspambots
1586177103 - 04/06/2020 14:45:03 Host: 183.83.130.126/183.83.130.126 Port: 445 TCP Blocked
2020-04-06 22:27:11
104.248.150.47 attackspambots
xmlrpc attack
2020-04-06 22:34:41
27.78.14.83 attack
Apr  6 16:38:57 ift sshd\[62487\]: Failed password for root from 27.78.14.83 port 48466 ssh2Apr  6 16:39:07 ift sshd\[62507\]: Invalid user ubnt from 27.78.14.83Apr  6 16:39:10 ift sshd\[62507\]: Failed password for invalid user ubnt from 27.78.14.83 port 53684 ssh2Apr  6 16:39:14 ift sshd\[62512\]: Failed password for invalid user admin from 27.78.14.83 port 56754 ssh2Apr  6 16:39:29 ift sshd\[62570\]: Invalid user support from 27.78.14.83
...
2020-04-06 22:58:46

最近上报的IP列表

180.153.236.60 180.153.236.212 180.153.236.201 2606:4700:10::6816:2300
134.35.157.130 2606:4700:10::6814:6009 178.200.217.26 209.38.101.158
255.96.99.39 2606:4700:10::6816:3929 2606:4700:10::6814:7821 2606:4700:10::6816:1312
2606:4700:10::ac43:2087 2606:4700:10::6816:1355 134.35.157.157 2606:4700:10::6814:9311
2606:4700:10::6814:4811 2606:4700:10::6814:9804 66.132.186.191 2606:4700:10::6816:3922