必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Czechia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '95.85.244.0 - 95.85.244.255'

% Abuse contact for '95.85.244.0 - 95.85.244.255' is 'noyobzoda.far@outlook.com'

inetnum:        95.85.244.0 - 95.85.244.255
org:            ORG-NFS9-RIPE
netname:        ORG-NFS9-RIPE
country:        TJ
admin-c:        NFS33-RIPE
tech-c:         NFS33-RIPE
status:         ASSIGNED PA
mnt-by:         zanemint-mnt
created:        2025-12-04T06:43:13Z
last-modified:  2025-12-04T10:28:35Z
source:         RIPE
abuse-c:        AA45271-RIPE
mnt-domains:    nfstj-mnt
mnt-routes:     nfstj-mnt

organisation:   ORG-NFS9-RIPE
org-name:       Noyobzoda Faridduni Saidilhom
org-type:       OTHER
address:        Rudaki Street 4, A3 03.12, Obburdon Jamoat, Mastchoh District, Sughd Region, Tajikistan
country:        TJ
abuse-c:        AA45271-RIPE
mnt-ref:        nfstj-mnt
mnt-ref:        mnt-bg-eurocrypt-1
mnt-ref:        GOODTEC-MNT
mnt-ref:        zanemint-mnt
mnt-ref:        RIT-ECODE-MNT
mnt-ref:        sc-rapidseedbox-1-mnt
mnt-by:         nfstj-mnt
created:        2025-06-30T15:57:25Z
last-modified:  2026-02-03T18:16:34Z
source:         RIPE # Filtered

person:         Noyobzoda Faridduni Saidilhom
address:        Rudaki Street 4, A3 03.12, Obburdon Jamoat, Mastchoh District, Sughd Region, Tajikistan
phone:          +992109389511
nic-hdl:        NFS33-RIPE
mnt-by:         nfstj-mnt
created:        2025-06-30T15:54:16Z
last-modified:  2025-06-30T15:54:16Z
source:         RIPE

% Information related to '95.85.244.0/24AS208885'

route:          95.85.244.0/24
origin:         AS208885
mnt-by:         nfstj-mnt
created:        2025-12-04T10:03:47Z
last-modified:  2025-12-04T10:03:47Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.85.244.180
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47766
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.85.244.180.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040401 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 05 03:30:08 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 180.244.85.95.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 180.244.85.95.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
110.56.16.157 attack
2020-01-23T10:44:09.8129501240 sshd\[19787\]: Invalid user demo from 110.56.16.157 port 38617
2020-01-23T10:44:09.8159881240 sshd\[19787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.56.16.157
2020-01-23T10:44:12.1439001240 sshd\[19787\]: Failed password for invalid user demo from 110.56.16.157 port 38617 ssh2
...
2020-01-23 17:50:37
134.209.16.36 attackspam
2020-01-23T03:41:38.1130631495-001 sshd[62567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.16.36  user=root
2020-01-23T03:41:40.1608481495-001 sshd[62567]: Failed password for root from 134.209.16.36 port 49210 ssh2
2020-01-23T03:46:51.0638161495-001 sshd[63069]: Invalid user guest from 134.209.16.36 port 49598
2020-01-23T03:46:51.0708691495-001 sshd[63069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.16.36
2020-01-23T03:46:51.0638161495-001 sshd[63069]: Invalid user guest from 134.209.16.36 port 49598
2020-01-23T03:46:53.4197111495-001 sshd[63069]: Failed password for invalid user guest from 134.209.16.36 port 49598 ssh2
2020-01-23T03:49:32.8172391495-001 sshd[1778]: Invalid user adda from 134.209.16.36 port 49962
2020-01-23T03:49:32.8265141495-001 sshd[1778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.16.36
2020-01-23T03:49:32.8
...
2020-01-23 17:44:00
159.89.118.240 attackspam
Jan 23 09:44:41 meumeu sshd[1455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.118.240 
Jan 23 09:44:43 meumeu sshd[1455]: Failed password for invalid user rodrigo from 159.89.118.240 port 54950 ssh2
Jan 23 09:46:55 meumeu sshd[1783]: Failed password for root from 159.89.118.240 port 47114 ssh2
...
2020-01-23 17:33:23
183.89.215.180 attackspam
"SMTP brute force auth login attempt."
2020-01-23 17:46:10
106.13.98.217 attackbots
"SSH brute force auth login attempt."
2020-01-23 18:12:15
134.209.252.119 attack
"SSH brute force auth login attempt."
2020-01-23 17:45:29
222.186.15.158 attackbotsspam
Jan 23 10:55:24 MK-Soft-VM8 sshd[2975]: Failed password for root from 222.186.15.158 port 36464 ssh2
Jan 23 10:55:27 MK-Soft-VM8 sshd[2975]: Failed password for root from 222.186.15.158 port 36464 ssh2
...
2020-01-23 17:56:39
112.171.213.215 attackbotsspam
"SSH brute force auth login attempt."
2020-01-23 17:44:44
218.92.0.190 attackbotsspam
Jan 23 15:30:50 areeb-Workstation sshd[7108]: Failed password for root from 218.92.0.190 port 24358 ssh2
...
2020-01-23 18:08:12
123.207.167.233 attack
"SSH brute force auth login attempt."
2020-01-23 17:44:18
123.28.208.194 attack
"SMTP brute force auth login attempt."
2020-01-23 17:46:48
66.172.26.61 attack
"SSH brute force auth login attempt."
2020-01-23 17:34:12
140.143.59.171 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2020-01-23 18:14:13
205.185.119.219 attackspambots
"SSH brute force auth login attempt."
2020-01-23 17:52:05
118.27.18.64 attack
Automatic report - SSH Brute-Force Attack
2020-01-23 18:01:19

最近上报的IP列表

113.215.188.52 2606:4700:10::6814:7878 2606:4700:10::6814:9353 2606:4700:10::ac43:1744
2606:4700:10::6814:8614 2606:4700:10::6814:5672 2606:4700:10::6814:7005 38.54.50.116
156.245.207.207 76.34.15.108 54.87.12.131 54.221.33.251
35.171.19.100 34.201.143.237 2606:4700:10::6814:7676 2606:4700:10::6814:8642
2606:4700:10::6814:9888 2606:4700:10::6814:5373 2606:4700:10::6816:2027 110.77.248.201