必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Wolgast

省份(region): Mecklenburg-Vorpommern

国家(country): Germany

运营商(isp): Telekom

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '85.199.87.0 - 85.199.87.255'

% Abuse contact for '85.199.87.0 - 85.199.87.255' is 'abuse@ediscom.net'

inetnum:        85.199.87.0 - 85.199.87.255
netname:        ATL-NET
country:        DE
admin-c:        EC2540-RIPE
tech-c:         EC2540-RIPE
status:         ASSIGNED PA
mnt-by:         AS12693-MNT
created:        2024-12-11T09:17:58Z
last-modified:  2024-12-11T09:17:58Z
source:         RIPE # Filtered

role:           ediscom Hostmaster
address:        e.discom
address:        Telekommunikation GmbH
address:        Am Kanal 4a
address:        D-14467 Potsdam
address:        Germany
phone:          +49 331 9080 2000
fax-no:         +49 331 9080 4000
abuse-mailbox:  abuse@ediscom.net
remarks:        trouble: call +49 331 9080 3000
admin-c:        EZ1433-RIPE
tech-c:         EO988-RIPE
tech-c:         TD3134-RIPE
tech-c:         KS6258-RIPE
tech-c:         EZ1433-RIPE
tech-c:         DT7444-RIPE
tech-c:         AW6688-RIPE
nic-hdl:        EC2540-RIPE
mnt-by:         AS12693-MNT
created:        2002-07-03T08:33:19Z
last-modified:  2020-04-21T13:57:28Z
source:         RIPE # Filtered

% Information related to '85.199.64.0/18AS12693'

route:          85.199.64.0/18
descr:          e.discom PA space
descr:          3. Network
origin:         AS12693
mnt-by:         AS12693-MNT
created:        2005-03-23T07:23:47Z
last-modified:  2005-03-23T07:23:47Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.122.1 (BUSA)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.199.87.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7098
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.199.87.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051600 1800 900 604800 86400

;; Query time: 148 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 17 01:05:21 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
142.87.199.85.in-addr.arpa domain name pointer 142.87.199.85.ediscom.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.87.199.85.in-addr.arpa	name = 142.87.199.85.ediscom.de.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.22.85.180 attack
Email Spam
2020-05-28 13:58:33
104.218.235.28 attackbots
scanner
2020-05-28 13:48:51
47.147.17.139 attack
RDPBrutePLe24
2020-05-28 13:40:46
60.170.46.25 attackspam
Invalid user master from 60.170.46.25 port 46925
2020-05-28 13:47:45
74.200.6.147 attack
May 27 05:08:57 xxx sshd[23076]: Failed password for r.r from 74.200.6.147 port 57826 ssh2
May 27 05:08:57 xxx sshd[23076]: Received disconnect from 74.200.6.147 port 57826:11: Bye Bye [preauth]
May 27 05:08:57 xxx sshd[23076]: Disconnected from 74.200.6.147 port 57826 [preauth]
May 27 05:16:28 xxx sshd[25111]: Failed password for r.r from 74.200.6.147 port 48372 ssh2
May 27 05:16:28 xxx sshd[25111]: Received disconnect from 74.200.6.147 port 48372:11: Bye Bye [preauth]
May 27 05:16:28 xxx sshd[25111]: Disconnected from 74.200.6.147 port 48372 [preauth]
May 27 05:20:31 xxx sshd[26040]: Invalid user liezzi from 74.200.6.147 port 33176
May 27 05:20:31 xxx sshd[26040]: Failed password for invalid user liezzi from 74.200.6.147 port 33176 ssh2
May 27 05:20:31 xxx sshd[26040]: Received disconnect from 74.200.6.147 port 33176:11: Bye Bye [preauth]
May 27 05:20:31 xxx sshd[26040]: Disconnected from 74.200.6.147 port 33176 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en
2020-05-28 14:12:40
122.51.167.200 attackbots
SSH login attempts.
2020-05-28 13:54:17
121.200.55.37 attackbotsspam
Invalid user hargreaves from 121.200.55.37 port 45930
2020-05-28 13:59:34
218.92.0.207 attackbotsspam
2020-05-28T07:53:20.119351vps751288.ovh.net sshd\[31539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.207  user=root
2020-05-28T07:53:21.675952vps751288.ovh.net sshd\[31539\]: Failed password for root from 218.92.0.207 port 13575 ssh2
2020-05-28T07:53:24.927073vps751288.ovh.net sshd\[31539\]: Failed password for root from 218.92.0.207 port 13575 ssh2
2020-05-28T07:53:29.011616vps751288.ovh.net sshd\[31539\]: Failed password for root from 218.92.0.207 port 13575 ssh2
2020-05-28T07:54:37.336723vps751288.ovh.net sshd\[31541\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.207  user=root
2020-05-28 14:19:14
41.38.44.180 attackspam
SSH login attempts.
2020-05-28 14:18:02
120.71.144.35 attackspambots
May 28 06:57:47 sso sshd[17340]: Failed password for root from 120.71.144.35 port 60934 ssh2
...
2020-05-28 13:44:43
58.87.66.249 attackbots
SSH login attempts.
2020-05-28 13:53:14
49.232.144.7 attack
2020-05-28T00:53:16.1752491495-001 sshd[27103]: Invalid user nick from 49.232.144.7 port 44580
2020-05-28T00:53:16.1822951495-001 sshd[27103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.144.7
2020-05-28T00:53:16.1752491495-001 sshd[27103]: Invalid user nick from 49.232.144.7 port 44580
2020-05-28T00:53:17.9657821495-001 sshd[27103]: Failed password for invalid user nick from 49.232.144.7 port 44580 ssh2
2020-05-28T00:58:26.5233151495-001 sshd[27282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.144.7  user=root
2020-05-28T00:58:29.2001391495-001 sshd[27282]: Failed password for root from 49.232.144.7 port 43848 ssh2
...
2020-05-28 14:14:16
119.28.116.166 attackbots
$f2bV_matches
2020-05-28 14:15:11
72.210.252.135 attack
Dovecot Invalid User Login Attempt.
2020-05-28 13:45:03
218.52.230.160 attack
Automatic report - Port Scan Attack
2020-05-28 13:56:48

最近上报的IP列表

150.66.91.8 103.99.196.1 219.165.30.217 103.183.113.57
43.134.111.142 135.237.127.68 2606:4700:10::6814:8126 2606:4700:10::6816:1685
2606:4700:10::6816:3518 50.110.126.89 152.10.43.187 121.95.149.95
2606:4700:10::6816:593 111.252.120.5 10.30.121.238 213.209.159.186
178.238.224.28 35.201.217.81 38.12.35.206 2606:4700:10::6814:5021