必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Portugal

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '109.105.211.0 - 109.105.211.255'

% Abuse contact for '109.105.211.0 - 109.105.211.255' is 'optout@internet-census.org'

inetnum:        109.105.211.0 - 109.105.211.255
netname:        ICG-ZEN-LAX-2
descr:          ICG-ZEN-LAX-2
country:        US
org:            ORG-NSIS5-RIPE
admin-c:        AR59913-RIPE
tech-c:         AR59913-RIPE
abuse-c:        AR59913-RIPE
status:         ASSIGNED PA
mnt-by:         MNT-BST
created:        2026-02-20T15:01:35Z
last-modified:  2026-02-20T15:01:35Z
source:         RIPE
remarks:        https://internet-census.org
remarks:        Internet Census Group seeks to measure the global Internet with non-intrusive data collection techniques in order to analyze trends and benchmark security performance across a broad range of industries
remarks:        We are committed to upholding the security and privacy of the entire online community. As part of that mission, we maintain a list of entities that have contacted us and wish to prevent us from attempting to access their addresses or ports
remarks:        To have your IP address added to this list, provide us with the IP addresses you wish to remove via email to: optout@internet-census.org
remarks:        Please continue to update us if your IP addresses or networks change so we can continue to keep you opted out. You will receive a confirmation email when completed

organisation:   ORG-NSIS5-RIPE
org-name:       NSEC - Sistemas Informaticos, S.A.
country:        PT
reg-nr:         507524845
org-type:       LIR
address:        111 Huntington Ave Suite 2010
address:        MA 02199
address:        Boston
address:        UNITED STATES
phone:          +351217252110
admin-c:        DOT14-RIPE
tech-c:         DOT14-RIPE
abuse-c:        AR59913-RIPE
mnt-ref:        MNT-BST
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MNT-BST
created:        2020-02-21T08:44:11Z
last-modified:  2026-05-13T07:07:27Z
source:         RIPE # Filtered

role:           Abuse-C Role
address:        Operations for Internet Census Group
address:        https://internet-census.org
nic-hdl:        AR59913-RIPE
abuse-mailbox:  optout@internet-census.org
mnt-by:         MNT-BST
created:        2020-02-21T08:44:10Z
last-modified:  2021-03-12T21:58:21Z
source:         RIPE # Filtered

% Information related to '109.105.211.0/24AS21859'

route:          109.105.211.0/24
origin:         AS21859
created:        2026-02-20T15:02:47Z
last-modified:  2026-02-20T15:02:47Z
source:         RIPE
mnt-by:         MNT-BST

% This query was served by the RIPE Database Query Service version 1.122.1 (ABERDEEN)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.105.211.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 291
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.105.211.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052301 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 24 04:00:22 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
14.211.105.109.in-addr.arpa domain name pointer zl-laxk-us-gd3-wk101m.internet-census.org.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.211.105.109.in-addr.arpa	name = zl-laxk-us-gd3-wk101m.internet-census.org.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
71.239.119.124 attackbots
Unauthorized connection attempt detected from IP address 71.239.119.124 to port 2220 [J]
2020-01-18 02:43:56
111.229.185.102 attack
Invalid user purple from 111.229.185.102 port 56972
2020-01-18 02:41:41
162.243.10.64 attackspam
Unauthorized connection attempt detected from IP address 162.243.10.64 to port 2220 [J]
2020-01-18 02:03:28
223.93.188.234 attack
SIP/5060 Probe, BF, Hack -
2020-01-18 02:07:17
167.99.67.87 attackbotsspam
Unauthorized connection attempt detected from IP address 167.99.67.87 to port 2220 [J]
2020-01-18 02:33:44
129.204.87.153 attackbotsspam
Invalid user melissa from 129.204.87.153 port 39611
2020-01-18 02:37:25
222.186.175.202 attackspambots
Jan 17 19:08:38 h2177944 sshd\[22457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Jan 17 19:08:41 h2177944 sshd\[22457\]: Failed password for root from 222.186.175.202 port 31306 ssh2
Jan 17 19:08:44 h2177944 sshd\[22457\]: Failed password for root from 222.186.175.202 port 31306 ssh2
Jan 17 19:08:48 h2177944 sshd\[22457\]: Failed password for root from 222.186.175.202 port 31306 ssh2
...
2020-01-18 02:10:17
218.92.0.158 attack
Jan 17 19:14:45 legacy sshd[10186]: Failed password for root from 218.92.0.158 port 47156 ssh2
Jan 17 19:14:58 legacy sshd[10186]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 47156 ssh2 [preauth]
Jan 17 19:15:04 legacy sshd[10194]: Failed password for root from 218.92.0.158 port 14441 ssh2
...
2020-01-18 02:16:35
116.87.14.197 attackbots
Automatic report - Banned IP Access
2020-01-18 02:14:18
115.236.35.107 attack
Unauthorized connection attempt detected from IP address 115.236.35.107 to port 2220 [J]
2020-01-18 02:40:05
153.101.244.134 attackspambots
Unauthorized connection attempt detected from IP address 153.101.244.134 to port 2220 [J]
2020-01-18 02:35:23
93.38.122.64 attackspambots
Jan 17 16:26:26 ncomp sshd[15493]: Invalid user Admin from 93.38.122.64
Jan 17 16:26:26 ncomp sshd[15493]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.38.122.64
Jan 17 16:26:26 ncomp sshd[15493]: Invalid user Admin from 93.38.122.64
Jan 17 16:26:29 ncomp sshd[15493]: Failed password for invalid user Admin from 93.38.122.64 port 41180 ssh2
2020-01-18 02:23:54
104.244.75.244 attackbots
Unauthorized connection attempt detected from IP address 104.244.75.244 to port 2220 [J]
2020-01-18 02:43:06
198.20.99.130 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-18 02:17:05
80.211.46.205 attackbotsspam
Unauthorized connection attempt detected from IP address 80.211.46.205 to port 2220 [J]
2020-01-18 02:05:31

最近上报的IP列表

206.189.233.159 162.216.150.225 2606:4700:10::6814:9892 2606:4700:10::6816:4522
2606:4700:10::6814:8597 64.227.10.41 66.132.195.46 109.105.211.2
109.105.211.11 2606:4700:10::6816:2720 180.153.236.77 111.225.148.222
52.206.189.10 2606:4700:10::6814:9976 2606:4700:10::ac43:1828 2606:4700:10::6814:8502
47.236.233.226 198.204.247.210 165.227.97.192 20.63.33.98