必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Győr

省份(region): Győr-Moson-Sopron megye

国家(country): Hungary

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '94.248.128.0 - 94.248.159.255'

% Abuse contact for '94.248.128.0 - 94.248.159.255' is 'webadmin@kabelnet.hu'

inetnum:        94.248.128.0 - 94.248.159.255
netname:        VIDANET
descr:          Vidanet Cabletelevision Provider Ltd.
org:            ORG-VCPL1-RIPE
country:        HU
admin-c:        VDN15-RIPE
tech-c:         VDN15-RIPE
status:         ASSIGNED PA
mnt-by:         MNT-PORION
created:        2008-09-12T10:08:26Z
last-modified:  2016-12-08T08:39:59Z
source:         RIPE # Filtered

organisation:   ORG-VCPL1-RIPE
org-name:       Vidanet Cabletelevision Provider Ltd.
org-type:       OTHER
address:        Orgona u. 10.
address:        H-9024 Gyor
address:        Hungary
phone:          +36 96 426 360
fax-no:         +36 96 514 724
abuse-c:        VAH19-RIPE
admin-c:        VDN15-RIPE
tech-c:         VDN15-RIPE
mnt-ref:        MNT-PORION
mnt-by:         MNT-PORION
created:        2016-12-07T13:23:51Z
last-modified:  2016-12-08T08:35:23Z
source:         RIPE # Filtered

role:           Vidanet Network Administrator
address:        Vidanet Cabletelevison Provider Ltd.
address:        Orgona u. 10.
address:        H-9024 Gyor
address:        Hungary
phone:          +36 96 426 360
fax-no:         +36 96 514 724
admin-c:        TH460-RIPE
tech-c:         TH460-RIPE
nic-hdl:        VDN15-RIPE
mnt-by:         MNT-PORION
created:        2008-03-17T14:21:40Z
last-modified:  2018-01-08T10:14:00Z
source:         RIPE # Filtered

% Information related to '94.248.128.0/19AS43529'

route:          94.248.128.0/19
descr:          ViDanet
origin:         AS43529
mnt-by:         MNT-PORION
created:        2008-09-12T10:11:42Z
last-modified:  2008-09-12T10:11:42Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.248.128.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57286
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.248.128.97.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032502 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 26 08:44:50 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
97.128.248.94.in-addr.arpa domain name pointer host-94-248-128-97.kabelnet.hu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
97.128.248.94.in-addr.arpa	name = host-94-248-128-97.kabelnet.hu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.93.12 attackbots
Aug 19 23:01:35 ArkNodeAT sshd\[5656\]: Invalid user support from 106.12.93.12
Aug 19 23:01:35 ArkNodeAT sshd\[5656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.93.12
Aug 19 23:01:37 ArkNodeAT sshd\[5656\]: Failed password for invalid user support from 106.12.93.12 port 35744 ssh2
2019-08-20 08:32:25
66.7.148.40 attack
Aug 20 02:37:46 mail postfix/smtpd\[20981\]: warning: unknown\[66.7.148.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 02:37:54 mail postfix/smtpd\[21085\]: warning: unknown\[66.7.148.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 20 02:41:17 mail postfix/smtpd\[21085\]: warning: unknown\[66.7.148.40\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-20 08:49:32
92.46.239.2 attackbotsspam
Aug 19 08:47:50 hcbb sshd\[26743\]: Invalid user dara from 92.46.239.2
Aug 19 08:47:50 hcbb sshd\[26743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.239.2
Aug 19 08:47:51 hcbb sshd\[26743\]: Failed password for invalid user dara from 92.46.239.2 port 59670 ssh2
Aug 19 08:52:39 hcbb sshd\[27162\]: Invalid user tom from 92.46.239.2
Aug 19 08:52:39 hcbb sshd\[27162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.46.239.2
2019-08-20 08:11:16
168.61.165.178 attack
SSH 15 Failed Logins
2019-08-20 08:11:37
167.71.237.85 attack
Automatic report - Banned IP Access
2019-08-20 08:34:40
106.13.4.172 attack
SSH 15 Failed Logins
2019-08-20 08:10:42
218.92.0.173 attack
Aug 19 13:29:01 eddieflores sshd\[2445\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Aug 19 13:29:02 eddieflores sshd\[2445\]: Failed password for root from 218.92.0.173 port 48528 ssh2
Aug 19 13:29:17 eddieflores sshd\[2461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
Aug 19 13:29:19 eddieflores sshd\[2461\]: Failed password for root from 218.92.0.173 port 4247 ssh2
Aug 19 13:29:34 eddieflores sshd\[2483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.173  user=root
2019-08-20 08:08:24
202.28.110.204 attack
WordPress login Brute force / Web App Attack on client site.
2019-08-20 08:02:19
186.103.186.234 attack
Aug 19 14:03:27 auw2 sshd\[18866\]: Invalid user zc from 186.103.186.234
Aug 19 14:03:27 auw2 sshd\[18866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=smtp9.itdchile.org
Aug 19 14:03:29 auw2 sshd\[18866\]: Failed password for invalid user zc from 186.103.186.234 port 53954 ssh2
Aug 19 14:08:33 auw2 sshd\[19312\]: Invalid user css from 186.103.186.234
Aug 19 14:08:33 auw2 sshd\[19312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=smtp9.itdchile.org
2019-08-20 08:17:03
174.138.20.134 attack
Aug 19 14:17:21 hpm sshd\[14883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.20.134  user=root
Aug 19 14:17:23 hpm sshd\[14883\]: Failed password for root from 174.138.20.134 port 34412 ssh2
Aug 19 14:24:46 hpm sshd\[15437\]: Invalid user legal1 from 174.138.20.134
Aug 19 14:24:46 hpm sshd\[15437\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.20.134
Aug 19 14:24:48 hpm sshd\[15437\]: Failed password for invalid user legal1 from 174.138.20.134 port 56734 ssh2
2019-08-20 08:31:53
104.140.188.42 attackspambots
Automatic report - Port Scan Attack
2019-08-20 08:07:58
154.73.75.99 attackspam
Aug 20 02:14:22 nextcloud sshd\[8063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.75.99  user=nagios
Aug 20 02:14:24 nextcloud sshd\[8063\]: Failed password for nagios from 154.73.75.99 port 24627 ssh2
Aug 20 02:20:34 nextcloud sshd\[15864\]: Invalid user guest from 154.73.75.99
Aug 20 02:20:34 nextcloud sshd\[15864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.73.75.99
...
2019-08-20 08:28:00
181.46.161.145 attack
Autoban   181.46.161.145 AUTH/CONNECT
2019-08-20 08:34:18
129.204.135.179 attack
2019-08-20T06:42:09.974236enmeeting.mahidol.ac.th sshd\[4734\]: Invalid user k from 129.204.135.179 port 51234
2019-08-20T06:42:09.988767enmeeting.mahidol.ac.th sshd\[4734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.135.179
2019-08-20T06:42:11.765570enmeeting.mahidol.ac.th sshd\[4734\]: Failed password for invalid user k from 129.204.135.179 port 51234 ssh2
...
2019-08-20 08:46:58
128.199.170.77 attackbots
SSH 15 Failed Logins
2019-08-20 08:07:17

最近上报的IP列表

108.243.126.82 172.239.105.38 2606:4700:10::ac43:1994 2606:4700:10::6814:7757
2606:4700:10::ac43:2066 2606:4700:10::6816:1760 2606:4700:10::6816:3604 2606:4700:10::6814:7741
2606:4700:10::6814:5811 2606:4700:10::6816:415d 110.78.153.111 91.231.89.64
91.231.89.198 64.227.128.117 178.6.110.249 47.128.122.99
101.64.11.72 121.230.89.150 2606:4700:10::ac43:1516 2606:4700:10::ac43:1023