必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Kiel

省份(region): Schleswig-Holstein

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '217.70.193.0 - 217.70.193.255'

% Abuse contact for '217.70.193.0 - 217.70.193.255' is 'abuse@tng.de'

inetnum:        217.70.193.0 - 217.70.193.255
netname:        TNG-DSL-STATIC-2
remarks:        infra-aw
descr:          DSL-Dialin Pool
country:        DE
admin-c:        SVEN1-RIPE
tech-c:         TNG-RIPE
status:         ASSIGNED PA
mnt-by:         TNG-MNT
created:        2005-05-11T07:21:24Z
last-modified:  2005-05-11T07:21:24Z
source:         RIPE

role:           TNG Hostmaster
address:        TNG Stadtnetz GmbH
address:        Gerhard-Froehler-Strasse 12
address:        24106 Kiel
address:        Germany
phone:          +49 431 7097 10
fax-no:         +49 431 7097 555
remarks:        trouble: Abuse reports to abuse@tng.de
admin-c:        SVEN1-RIPE
admin-c:        BS33-RIPE
tech-c:         SVEN1-RIPE
tech-c:         JVP13101-RIPE
nic-hdl:        TNG-RIPE
remarks:        **************************************************
remarks:        * Peering requests: peering@tng.de *
remarks:        * Abuse and spam: abuse@tng.de *
remarks:        * *
remarks:        * Support: 24/7 +49 431 7097-10 *
remarks:        * Support: support@tng.de *
remarks:        **************************************************
mnt-by:         TNG-MNT
created:        2002-10-10T15:23:13Z
last-modified:  2024-06-05T05:48:47Z
source:         RIPE # Filtered
abuse-mailbox:  abuse@tng.de

person:         Sven Schade
address:        TNG Stadtnetz GmbH
address:        Gerhard-Froehler-Strasse 12
address:        D-24106 Kiel
address:        Germany
phone:          +49 431 7097-10
fax-no:         +49 431 7097-555
nic-hdl:        SVEN1-RIPE
mnt-by:         TNG-MNT
created:        1970-01-01T00:00:00Z
last-modified:  2022-12-02T08:13:49Z
source:         RIPE # Filtered

% Information related to '217.70.193.0/24AS13101'

route:          217.70.193.0/24
descr:          ennit server GmbH
origin:         AS13101
mnt-by:         TNG-MNT
mnt-lower:      TNG-MNT
mnt-routes:     TNG-MNT
created:        2016-05-23T12:11:28Z
last-modified:  2019-06-07T09:40:06Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.120 (DEXTER)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.70.193.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19017
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.70.193.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026022501 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 26 05:13:54 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
169.193.70.217.in-addr.arpa domain name pointer 169-193-70-217.static.dsl.core.tng.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
169.193.70.217.in-addr.arpa	name = 169-193-70-217.static.dsl.core.tng.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
128.199.88.188 attackbotsspam
Sep 24 21:09:36 firewall sshd[19030]: Invalid user kontol from 128.199.88.188
Sep 24 21:09:37 firewall sshd[19030]: Failed password for invalid user kontol from 128.199.88.188 port 54576 ssh2
Sep 24 21:11:55 firewall sshd[19076]: Invalid user 2wsx#EDC4rfv from 128.199.88.188
...
2020-09-25 10:44:16
13.82.87.55 attackbots
Sep 25 03:31:18 cdc sshd[25377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.87.55 
Sep 25 03:31:20 cdc sshd[25377]: Failed password for invalid user hemovita from 13.82.87.55 port 44335 ssh2
2020-09-25 10:46:44
45.113.71.209 attackbots
Found on   CINS badguys     / proto=6  .  srcport=57142  .  dstport=8000  .     (3303)
2020-09-25 11:12:26
13.82.141.63 attackbotsspam
2020-09-24T22:04:23.130903sorsha.thespaminator.com sshd[30142]: Invalid user konflict from 13.82.141.63 port 18705
2020-09-24T22:04:24.658559sorsha.thespaminator.com sshd[30142]: Failed password for invalid user konflict from 13.82.141.63 port 18705 ssh2
...
2020-09-25 11:01:21
193.27.228.177 attack
firewall-block, port(s): 3398/tcp, 3408/tcp, 3412/tcp
2020-09-25 10:54:41
47.33.12.47 attackspam
(sshd) Failed SSH login from 47.33.12.47 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 15:50:46 server2 sshd[838]: Invalid user admin from 47.33.12.47
Sep 24 15:50:49 server2 sshd[838]: Failed password for invalid user admin from 47.33.12.47 port 48666 ssh2
Sep 24 15:50:50 server2 sshd[845]: Invalid user admin from 47.33.12.47
Sep 24 15:50:52 server2 sshd[845]: Failed password for invalid user admin from 47.33.12.47 port 48792 ssh2
Sep 24 15:50:53 server2 sshd[850]: Invalid user admin from 47.33.12.47
2020-09-25 10:37:17
52.191.251.142 attackspambots
Sep 25 02:20:44 localhost sshd\[6387\]: Invalid user admin from 52.191.251.142 port 63122
Sep 25 02:20:44 localhost sshd\[6387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.191.251.142
Sep 25 02:20:46 localhost sshd\[6387\]: Failed password for invalid user admin from 52.191.251.142 port 63122 ssh2
...
2020-09-25 11:05:06
45.173.89.40 attackbotsspam
Email rejected due to spam filtering
2020-09-25 10:50:57
51.159.67.165 attackspam
DATE:2020-09-25 00:21:04,IP:51.159.67.165,MATCHES:10,PORT:ssh
2020-09-25 10:40:53
186.94.59.28 attack
Icarus honeypot on github
2020-09-25 11:06:16
68.183.28.215 attackbotsspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-25T02:51:51Z and 2020-09-25T02:51:57Z
2020-09-25 11:07:03
197.235.10.121 attackspam
Sep 25 04:21:07 ns37 sshd[7718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.235.10.121
Sep 25 04:21:07 ns37 sshd[7718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.235.10.121
2020-09-25 11:03:44
13.90.96.133 attackspam
Sep 25 03:31:04 ajax sshd[23058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.90.96.133 
Sep 25 03:31:06 ajax sshd[23058]: Failed password for invalid user hemovita from 13.90.96.133 port 34852 ssh2
2020-09-25 11:10:22
52.143.50.250 attackbots
Sep 24 19:03:21 roki sshd[10903]: Invalid user admin from 52.143.50.250
Sep 24 19:03:21 roki sshd[10903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.143.50.250
Sep 24 19:03:23 roki sshd[10903]: Failed password for invalid user admin from 52.143.50.250 port 60124 ssh2
Sep 25 04:20:09 roki sshd[18583]: Invalid user admin from 52.143.50.250
Sep 25 04:20:09 roki sshd[18583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.143.50.250
...
2020-09-25 10:44:50
40.71.199.120 attackbotsspam
Sep 25 03:40:20 cdc sshd[25741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.71.199.120 
Sep 25 03:40:22 cdc sshd[25741]: Failed password for invalid user gdsmart from 40.71.199.120 port 64577 ssh2
2020-09-25 10:51:10

最近上报的IP列表

202.160.83.35 14.212.92.202 23.128.140.0 60.13.6.14
147.185.133.19 123.178.210.64 223.199.169.91 20.220.211.253
14.135.75.95 5.83.129.210 172.239.121.51 159.65.119.52
154.218.3.133 85.11.167.7 54.39.16.132 45.200.17.169
194.180.48.253 158.94.211.254 109.87.124.2 182.134.22.79