必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Banī Suwayf

省份(region): Bani Suwayf

国家(country): Egypt

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the AfriNIC Whois server.
% The AFRINIC whois database is subject to  the following terms of Use. See https://afrinic.net/whois/terms

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '154.183.0.0 - 154.183.255.255'

% No abuse contact registered for 154.183.0.0 - 154.183.255.255

inetnum:        154.183.0.0 - 154.183.255.255
netname:        All-47
descr:          TE Data
country:        EG
admin-c:        TDCR1-AFRINIC
tech-c:         TDCR2-AFRINIC
status:         ASSIGNED PA
remarks:        ====================================================
remarks:        For Internet Abuse & Spam reports : admins@tedata.net
remarks:        ====================================================
mnt-by:         TE-Data-MNT
source:         AFRINIC # Filtered
parent:         154.176.0.0 - 154.191.255.255

role:           TE Data Contact Role
address:        TE Data, Smart Village, Building A11-B90, Alex Desert Road,
address:        28 Km, 6th October 12577, Giza, Egypt
phone:          tel:+20-2-33320700
fax-no:         tel:+20-2-33320800
admin-c:        MH7-AFRINIC
tech-c:         TDCR2-AFRINIC
nic-hdl:        TDCR1-AFRINIC
abuse-mailbox:  abuse@te.eg
mnt-by:         TE-Data-MNT
source:         AFRINIC # Filtered

role:           TE Data Contact Role-2
address:        TE Data, Smart Village, Building A11-B90, Alex Desert Road,
address:        28 Km, 6th October 12577, Giza, Egypt
phone:          tel:+20-2-33320700
fax-no:         tel:+20-2-33320800
admin-c:        MH7-AFRINIC
tech-c:         TDCR1-AFRINIC
nic-hdl:        TDCR2-AFRINIC
abuse-mailbox:  abuse@te.eg
mnt-by:         TE-Data-MNT
source:         AFRINIC # Filtered

% Information related to '154.183.128.0/19AS8452'

route:          154.183.128.0/19
descr:          Telecom-Egypt-Data
origin:         AS8452
mnt-by:         GEGA-MNT
source:         AFRINIC # Filtered
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.183.129.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.183.129.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033000 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 20:32:22 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 34.129.183.154.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.129.183.154.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
95.181.132.140 attack
Unauthorized connection attempt from IP address 95.181.132.140 on Port 445(SMB)
2019-10-22 08:07:03
198.48.189.235 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 12:03:53
45.56.103.80 attack
abasicmove.de:80 45.56.103.80 - - \[21/Oct/2019:22:02:00 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 493 "-" "Mozilla/5.0 \(Windows NT 6.1\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/67.0.3396.103 YaBrowser/18.7.0.2695 Yowser/2.5 Safari/537.36"
abasicmove.de 45.56.103.80 \[21/Oct/2019:22:02:02 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 3825 "-" "Mozilla/5.0 \(Windows NT 6.1\; WOW64\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/67.0.3396.103 YaBrowser/18.7.0.2695 Yowser/2.5 Safari/537.36"
2019-10-22 08:14:10
200.74.99.28 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/200.74.99.28/ 
 
 US - 1H : (216)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN22047 
 
 IP : 200.74.99.28 
 
 CIDR : 200.74.96.0/21 
 
 PREFIX COUNT : 389 
 
 UNIQUE IP COUNT : 1379584 
 
 
 ATTACKS DETECTED ASN22047 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-10-22 05:58:31 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-22 12:00:58
173.208.152.250 attack
Unauthorised access (Oct 22) SRC=173.208.152.250 LEN=52 TTL=241 ID=4678 TCP DPT=1433 WINDOW=63443 SYN
2019-10-22 12:00:03
210.245.33.77 attack
ssh failed login
2019-10-22 12:15:02
138.68.106.62 attackspambots
Oct 21 23:58:11 Tower sshd[27441]: Connection from 138.68.106.62 port 41302 on 192.168.10.220 port 22
Oct 21 23:58:12 Tower sshd[27441]: Failed password for root from 138.68.106.62 port 41302 ssh2
Oct 21 23:58:12 Tower sshd[27441]: Received disconnect from 138.68.106.62 port 41302:11: Bye Bye [preauth]
Oct 21 23:58:12 Tower sshd[27441]: Disconnected from authenticating user root 138.68.106.62 port 41302 [preauth]
2019-10-22 12:10:05
13.67.91.234 attack
Oct 21 23:23:44 lnxmail61 sshd[31932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.91.234
2019-10-22 08:03:46
185.176.27.46 attack
10/21/2019-23:58:05.925041 185.176.27.46 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-22 12:21:49
182.103.12.233 attack
Unauthorized connection attempt from IP address 182.103.12.233 on Port 445(SMB)
2019-10-22 08:10:02
183.82.100.141 attackspam
Oct 22 05:58:18 lnxmysql61 sshd[8381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.100.141
2019-10-22 12:12:14
49.235.222.199 attackspam
2019-10-22T03:58:24.963277abusebot-7.cloudsearch.cf sshd\[1255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.222.199  user=root
2019-10-22 12:07:56
123.31.47.20 attackbots
2019-10-22T03:58:07.477940abusebot.cloudsearch.cf sshd\[21739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.47.20  user=root
2019-10-22 12:21:31
201.91.132.170 attackspambots
Oct 21 19:39:00 *** sshd[11807]: Failed password for invalid user avnbot from 201.91.132.170 port 41323 ssh2
2019-10-22 08:12:23
89.191.226.159 attack
Name: 'gekllokjwer'
Street: 'uElJlBkxoOTq'
City: 'yvIFzGfznuMuHgYrAB'
Zip: 'xZyRPnKrSM'
Message: 'êóïèòü êîêàèí àìô ìåô ñê êóïèòü êîêàèí àìô ìåô ñê êóïèòü êîêàèí àìô ìåô ñê êóïèòü êîêàèí àìô ìåô ñê êóïèòü êîêàèí àìô ìåô ñê êóïèòü êîêàèí àìô ìåô ñê êóïèòü êîêàèí àìô ìåô ñê êóïèòü êîêàèí àìô ìåô ñê
2019-10-22 08:02:49

最近上报的IP列表

75.188.135.236 10.73.20.40 10.80.37.100 66.132.172.179
34.78.28.28 103.234.62.166 2606:4700:10::6814:6485 2606:4700:10::6814:9504
2606:4700:10::ac43:212e 2606:4700:10::6816:2737 2606:4700:10::ac43:2718 2606:4700:10::6814:7755
2606:4700:10::6814:7509 2606:4700:10::6814:9060 109.167.82.113 2606:4700:10::6814:8813
223.26.62.190 20.169.106.149 190.194.63.42 190.194.63.243