必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Turkey

运营商(isp): Vodafone

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '85.119.64.0 - 85.119.71.255'

% Abuse contact for '85.119.64.0 - 85.119.71.255' is 'abuse@vodafone.net.tr'

inetnum:        85.119.64.0 - 85.119.71.255
netname:        TR-VFNET-20050531
country:        TR
org:            ORG-bIHA1-RIPE
admin-c:        BTB10-RIPE
tech-c:         BTB10-RIPE
status:         ALLOCATED PA
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MNT-BORUSAN
mnt-lower:      MNT-BORUSAN
mnt-domains:    MNT-BORUSAN
mnt-routes:     MNT-BORUSAN
created:        2005-05-31T12:27:33Z
last-modified:  2016-06-02T11:27:27Z
source:         RIPE # Filtered

organisation:   ORG-bIHA1-RIPE
org-name:       Vodafone Net Iletisim Hizmetler AS
country:        TR
org-type:       LIR
address:        BUYUKDERE CAD. No.251
address:        34398
address:        Maslak / Sisli  / Istanbul
address:        TURKEY
phone:          +90 850 542 0000
phone:          +902123555100
fax-no:         +902123470470
admin-c:        SE4047-RIPE
admin-c:        YP419-RIPE
abuse-c:        BTB10-RIPE
mnt-ref:        RIPE-NCC-HM-MNT
mnt-ref:        MNT-BORUSAN
mnt-by:         RIPE-NCC-HM-MNT
mnt-by:         MNT-BORUSAN
created:        2004-04-17T12:07:12Z
last-modified:  2023-08-22T12:11:20Z
source:         RIPE # Filtered

role:           Borusan Telekom Backbone Group
address:        Buyukdere Caddesi No:112
address:        34394 Esentepe
address:        Istanbul - TURKEY
phone:          +90 212 355 5151
fax-no:         +90 212 355 5165
admin-c:        YP419-RIPE
admin-c:        SE4047-RIPE
tech-c:         YP419-RIPE
tech-c:         SE4047-RIPE
nic-hdl:        BTB10-RIPE
abuse-mailbox:  abuse@vodafone.net.tr
mnt-by:         MNT-BORUSAN
created:        2006-03-08T11:54:46Z
last-modified:  2020-01-30T14:50:36Z
source:         RIPE # Filtered

% Information related to '85.119.68.0/22AS15924'

route:          85.119.68.0/22
origin:         AS15924
descr:          Borusan Telekom
mnt-by:         MNT-BORUSAN
mnt-by:         KOCNET-NCC
created:        2020-08-27T19:47:52Z
last-modified:  2020-08-27T19:47:52Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.119.69.182
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17019
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.119.69.182.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042402 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 25 06:00:17 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 182.69.119.85.in-addr.arpa. not found: 3(NXDOMAIN)
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 182.69.119.85.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.55.177.214 attackbots
2020-06-13T04:27:10.431942shield sshd\[7726\]: Invalid user ftpuser from 45.55.177.214 port 56139
2020-06-13T04:27:10.435657shield sshd\[7726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.177.214
2020-06-13T04:27:12.677425shield sshd\[7726\]: Failed password for invalid user ftpuser from 45.55.177.214 port 56139 ssh2
2020-06-13T04:35:45.799800shield sshd\[13687\]: Invalid user radio from 45.55.177.214 port 53809
2020-06-13T04:35:45.803436shield sshd\[13687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.177.214
2020-06-13 12:42:50
122.51.41.109 attack
Jun 12 20:58:45 propaganda sshd[16516]: Connection from 122.51.41.109 port 39344 on 10.0.0.160 port 22 rdomain ""
Jun 12 20:58:46 propaganda sshd[16516]: Connection closed by 122.51.41.109 port 39344 [preauth]
2020-06-13 12:06:46
95.91.226.190 attack
Fail2Ban Ban Triggered
SMTP Abuse Attempt
2020-06-13 12:03:48
212.64.19.237 attack
2020-06-13T04:01:35.190607abusebot.cloudsearch.cf sshd[9911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.19.237  user=root
2020-06-13T04:01:37.036287abusebot.cloudsearch.cf sshd[9911]: Failed password for root from 212.64.19.237 port 41466 ssh2
2020-06-13T04:06:31.687946abusebot.cloudsearch.cf sshd[10291]: Invalid user c from 212.64.19.237 port 34148
2020-06-13T04:06:31.693432abusebot.cloudsearch.cf sshd[10291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.19.237
2020-06-13T04:06:31.687946abusebot.cloudsearch.cf sshd[10291]: Invalid user c from 212.64.19.237 port 34148
2020-06-13T04:06:33.508812abusebot.cloudsearch.cf sshd[10291]: Failed password for invalid user c from 212.64.19.237 port 34148 ssh2
2020-06-13T04:11:31.954553abusebot.cloudsearch.cf sshd[10689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.19.237  user=root
2020-06-13T04
...
2020-06-13 12:29:41
51.91.247.125 attackspam
Unauthorized connection attempt detected from IP address 51.91.247.125 to port 7443
2020-06-13 12:45:57
222.186.30.76 attackspambots
Jun 13 04:20:53 hcbbdb sshd\[12838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Jun 13 04:20:56 hcbbdb sshd\[12838\]: Failed password for root from 222.186.30.76 port 20676 ssh2
Jun 13 04:21:04 hcbbdb sshd\[12859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
Jun 13 04:21:06 hcbbdb sshd\[12859\]: Failed password for root from 222.186.30.76 port 21686 ssh2
Jun 13 04:21:23 hcbbdb sshd\[12900\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.76  user=root
2020-06-13 12:21:47
119.176.78.254 attack
Automatic report - Port Scan Attack
2020-06-13 12:37:39
49.234.43.224 attackspambots
Jun 13 06:10:03 abendstille sshd\[26908\]: Invalid user pxo from 49.234.43.224
Jun 13 06:10:03 abendstille sshd\[26908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.43.224
Jun 13 06:10:05 abendstille sshd\[26908\]: Failed password for invalid user pxo from 49.234.43.224 port 49250 ssh2
Jun 13 06:11:31 abendstille sshd\[28229\]: Invalid user pxo from 49.234.43.224
Jun 13 06:11:31 abendstille sshd\[28229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.43.224
...
2020-06-13 12:35:41
212.60.20.114 attack
Bad bot/spoofed identity
2020-06-13 12:41:47
82.211.160.58 attackspambots
port scan and connect, tcp 8080 (http-proxy)
2020-06-13 12:33:32
23.105.157.105 attackspam
Unauthorized access detected from black listed ip!
2020-06-13 12:19:06
5.188.86.210 attack
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-13T04:11:14Z and 2020-06-13T04:27:08Z
2020-06-13 12:28:20
187.87.138.252 attack
2020-06-13T04:09:17.047671Z ecca5da21a72 New connection: 187.87.138.252:55572 (172.17.0.3:2222) [session: ecca5da21a72]
2020-06-13T04:17:48.217929Z f1212aada29b New connection: 187.87.138.252:41236 (172.17.0.3:2222) [session: f1212aada29b]
2020-06-13 12:20:10
198.100.146.67 attackspambots
Brute-force attempt banned
2020-06-13 12:31:30
144.217.94.188 attackspam
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-13 12:32:35

最近上报的IP列表

17.241.75.53 38.55.160.241 2606:4700:10::6816:4613 2606:4700:10::6814:9094
2606:4700:10::6814:7964 2606:4700:10::6814:5268 2606:4700:10::ac43:1635 2606:4700:10::6816:617
182.225.230.166 27.0.233.39 119.81.196.201 2606:4700:10::6816:870
2606:4700:10::6816:3287 164.155.74.72 2606:4700:10::ac43:2068 121.134.176.107
109.167.82.164 147.185.133.41 131.175.120.42 226.149.226.53