必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): London

省份(region): England

国家(country): United Kingdom

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.159.197.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30419
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.159.197.105.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025040100 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 02 02:14:11 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 105.197.159.4.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.197.159.4.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.15.226.14 attackbotsspam
Jan 16 22:20:42 wordpress wordpress(www.ruhnke.cloud)[94910]: Blocked authentication attempt for admin from ::ffff:103.15.226.14
2020-01-17 05:38:38
203.81.78.180 attack
Unauthorized connection attempt detected from IP address 203.81.78.180 to port 2220 [J]
2020-01-17 05:18:26
45.79.227.90 attackbotsspam
2020-01-16 H=li1326-90.members.linode.com \[45.79.227.90\] sender verify fail for \: Unrouteable address
2020-01-16 H=li1326-90.members.linode.com \[45.79.227.90\] F=\ rejected RCPT \: Sender verify failed
2020-01-16 H=li1326-90.members.linode.com \[45.79.227.90\] F=\ rejected RCPT \: Sender verify failed
2020-01-17 05:27:26
198.12.149.33 attackspambots
198.12.149.33 - - \[16/Jan/2020:22:20:24 +0100\] "POST /wp-login.php HTTP/1.0" 200 7556 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.12.149.33 - - \[16/Jan/2020:22:20:27 +0100\] "POST /wp-login.php HTTP/1.0" 200 7381 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
198.12.149.33 - - \[16/Jan/2020:22:20:34 +0100\] "POST /wp-login.php HTTP/1.0" 200 7376 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-17 05:42:46
197.62.234.145 attack
Invalid user admin from 197.62.234.145 port 56949
2020-01-17 05:20:42
191.208.24.126 attack
Invalid user admin from 191.208.24.126 port 21551
2020-01-17 05:22:42
222.186.15.91 attackspambots
Jan 16 22:42:58 MK-Soft-Root2 sshd[11381]: Failed password for root from 222.186.15.91 port 20001 ssh2
Jan 16 22:43:01 MK-Soft-Root2 sshd[11381]: Failed password for root from 222.186.15.91 port 20001 ssh2
...
2020-01-17 05:48:21
109.215.224.21 attackbots
Jan 16 16:25:25 server sshd\[15399\]: Invalid user guest from 109.215.224.21
Jan 16 16:25:25 server sshd\[15399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=lfbn-dij-1-225-21.w109-215.abo.wanadoo.fr 
Jan 16 16:25:27 server sshd\[15399\]: Failed password for invalid user guest from 109.215.224.21 port 59514 ssh2
Jan 17 00:20:41 server sshd\[7457\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=lfbn-dij-1-225-21.w109-215.abo.wanadoo.fr  user=root
Jan 17 00:20:43 server sshd\[7457\]: Failed password for root from 109.215.224.21 port 49708 ssh2
...
2020-01-17 05:38:25
107.170.113.190 attack
Jan 17 04:17:58 webhost01 sshd[11372]: Failed password for root from 107.170.113.190 port 48781 ssh2
...
2020-01-17 05:54:49
190.9.130.159 attackspambots
Unauthorized connection attempt detected from IP address 190.9.130.159 to port 2220 [J]
2020-01-17 05:23:21
111.75.202.67 attackspambots
Unauthorized connection attempt detected from IP address 111.75.202.67 to port 445
2020-01-17 05:58:13
68.183.204.24 attackspambots
Jan 16 18:15:06 vps46666688 sshd[4305]: Failed password for root from 68.183.204.24 port 53874 ssh2
Jan 16 18:21:58 vps46666688 sshd[4408]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.204.24
...
2020-01-17 05:41:03
221.214.74.10 attackbotsspam
Jan 16 22:14:27 server sshd[33145]: Failed password for invalid user nitesh from 221.214.74.10 port 2415 ssh2
Jan 16 22:18:01 server sshd[33261]: Failed password for invalid user andrea from 221.214.74.10 port 2416 ssh2
Jan 16 22:20:52 server sshd[33384]: Failed password for invalid user mmy from 221.214.74.10 port 2417 ssh2
2020-01-17 05:31:23
114.199.67.235 attackspam
firewall-block, port(s): 222/tcp
2020-01-17 05:57:46
121.122.82.191 attack
firewall-block, port(s): 4567/tcp
2020-01-17 05:57:01

最近上报的IP列表

248.153.171.11 8.8.76.79 226.52.63.187 92.28.17.1
71.141.248.133 184.89.84.190 68.107.2.32 221.42.160.33
206.21.121.219 89.121.203.0 89.121.204.0 89.121.205.0
89.121.206.0 89.121.207.0 89.121.208.0 89.121.209.0
89.121.210.0 89.121.212.0 89.121.213.0 89.121.214.0