必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Russia

运营商(isp): MTS

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '91.79.240.0 - 91.79.241.255'

% Abuse contact for '91.79.240.0 - 91.79.241.255' is 'abuse@mtu.ru'

inetnum:        91.79.240.0 - 91.79.241.255
netname:        MTS-MobilePoll-2025Q4-01
descr:          PJSC Mobile TeleSystems Far East region branch
geoloc:         43.115542 131.885494
country:        RU
status:         ASSIGNED PA
mnt-by:         MTU-NOC
admin-c:        MTU1-RIPE
tech-c:         MTU1-RIPE
created:        2026-01-30T12:37:13Z
last-modified:  2026-01-30T12:37:13Z
source:         RIPE

role:           MTS backbone NOC
address:        PJSC MTS / former CJSC Comstar-Direct
address:        Petrovsky blvd 12, bldg 3
address:        P.O. BOX 4711 127051
address:        Moscow, Russia
remarks:        **************************************
remarks:        Contact addresses:
remarks:        routing & peering noc@mtu.ru
remarks:        spam & security abuse@mtu.ru
remarks:        mail postmaster@mtu.ru
remarks:        ddos reports ddos-reports@mtu.ru
remarks:        **************************************
phone:          +7 495 721-34-99
fax-no:         +7 495 956-07-07
admin-c:        EDA-RIPE
admin-c:        RPS-RIPE
tech-c:         EDA-RIPE
nic-hdl:        MTU1-RIPE
mnt-by:         MTU-NOC
created:        2002-10-18T13:29:19Z
last-modified:  2022-04-08T13:50:05Z
source:         RIPE # Filtered

% Information related to '91.76.0.0/14AS8359'

route:          91.76.0.0/14
descr:          ZAO MTU-Intel's Moscow Region Network
descr:          ZAO MTU-Intel
descr:          Moscow, Russia
origin:         AS8359
mnt-by:         MTU-NOC
created:        2006-09-13T10:51:37Z
last-modified:  2006-09-13T10:51:37Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121 (BUSA)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.79.240.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.79.240.120.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031600 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 16:13:53 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
120.240.79.91.in-addr.arpa domain name pointer ppp91-79-240-120.pppoe.mtu-net.ru.
NSLOOKUP信息:
b'120.240.79.91.in-addr.arpa	name = ppp91-79-240-120.pppoe.mtu-net.ru.

Authoritative answers can be found from:

'
相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.142.20.34 attack
Brute forcing RDP port 3389
2020-05-13 12:59:00
58.65.136.170 attackbotsspam
...
2020-05-13 12:55:00
37.34.200.14 attack
...
2020-05-13 13:07:38
103.145.13.19 attackbotsspam
[MK-VM6] Blocked by UFW
2020-05-13 13:08:57
122.154.66.170 attackspam
Unauthorised access (May 13) SRC=122.154.66.170 LEN=52 PREC=0x20 TTL=114 ID=23368 TCP DPT=445 WINDOW=8192 SYN
2020-05-13 13:24:07
67.70.142.247 attackspambots
2020-05-12T23:33:48.8959901495-001 sshd[6098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=shbkpq4068w-lp130-01-67-70-142-247.dsl.bell.ca
2020-05-12T23:33:48.8928321495-001 sshd[6098]: Invalid user teampspeak3 from 67.70.142.247 port 40906
2020-05-12T23:33:50.8895521495-001 sshd[6098]: Failed password for invalid user teampspeak3 from 67.70.142.247 port 40906 ssh2
2020-05-12T23:37:22.0719071495-001 sshd[6260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=shbkpq4068w-lp130-01-67-70-142-247.dsl.bell.ca  user=root
2020-05-12T23:37:23.7749691495-001 sshd[6260]: Failed password for root from 67.70.142.247 port 44826 ssh2
2020-05-12T23:40:55.1990241495-001 sshd[6381]: Invalid user xr from 67.70.142.247 port 48750
...
2020-05-13 13:11:50
37.49.226.249 attackbots
May 13 07:41:42 srv2 sshd\[20257\]: Invalid user admin from 37.49.226.249 port 43520
May 13 07:42:07 srv2 sshd\[20273\]: Invalid user administrator from 37.49.226.249 port 48470
May 13 07:42:15 srv2 sshd\[20279\]: Invalid user ubuntu from 37.49.226.249 port 40750
2020-05-13 13:46:04
175.24.59.130 attackbotsspam
SSH login attempts.
2020-05-13 13:15:45
72.38.192.163 attack
" "
2020-05-13 13:08:31
177.69.67.248 attackspambots
May 13 06:52:28 lukav-desktop sshd\[30665\]: Invalid user test from 177.69.67.248
May 13 06:52:29 lukav-desktop sshd\[30665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.67.248
May 13 06:52:30 lukav-desktop sshd\[30665\]: Failed password for invalid user test from 177.69.67.248 port 38632 ssh2
May 13 06:58:03 lukav-desktop sshd\[30826\]: Invalid user nagios from 177.69.67.248
May 13 06:58:03 lukav-desktop sshd\[30826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.67.248
2020-05-13 13:44:03
13.66.6.105 attack
sae-12 : Block return, carriage return, ... characters=>/?view=category'A=0&id=60(')
2020-05-13 13:09:36
220.134.63.245 attack
" "
2020-05-13 13:42:19
106.12.193.96 attackbots
Invalid user kelly from 106.12.193.96 port 33990
2020-05-13 13:12:40
188.124.42.120 attackbots
May 13 05:58:28 debian-2gb-nbg1-2 kernel: \[11601168.697685\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=188.124.42.120 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=19337 DF PROTO=TCP SPT=59839 DPT=8000 WINDOW=8192 RES=0x00 SYN URGP=0
2020-05-13 13:23:08
197.159.68.8 attackbots
2020-05-13T03:48:42.555570abusebot.cloudsearch.cf sshd[11155]: Invalid user orange from 197.159.68.8 port 44340
2020-05-13T03:48:42.560047abusebot.cloudsearch.cf sshd[11155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.159.68.8
2020-05-13T03:48:42.555570abusebot.cloudsearch.cf sshd[11155]: Invalid user orange from 197.159.68.8 port 44340
2020-05-13T03:48:44.282314abusebot.cloudsearch.cf sshd[11155]: Failed password for invalid user orange from 197.159.68.8 port 44340 ssh2
2020-05-13T03:58:39.611084abusebot.cloudsearch.cf sshd[12045]: Invalid user doctor from 197.159.68.8 port 42682
2020-05-13T03:58:39.619238abusebot.cloudsearch.cf sshd[12045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.159.68.8
2020-05-13T03:58:39.611084abusebot.cloudsearch.cf sshd[12045]: Invalid user doctor from 197.159.68.8 port 42682
2020-05-13T03:58:41.632600abusebot.cloudsearch.cf sshd[12045]: Failed password for inva
...
2020-05-13 13:15:04

最近上报的IP列表

94.131.107.231 2409:8a28:32c1:5e54:6dac:3d1f:d35:7116 192.168.2.98 47.253.184.220
194.187.177.8 10.101.59.16 106.8.136.153 47.97.226.161
139.59.238.107 10.0.2.110 47.85.38.170 135.237.125.135
144.202.14.145 174.16.41.113 34.95.241.7 128.127.120.195
1.45.126.89 1.45.126.163 3.144.142.1 20.201.39.131