必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Czechia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '95.85.244.0 - 95.85.244.255'

% Abuse contact for '95.85.244.0 - 95.85.244.255' is 'noyobzoda.far@outlook.com'

inetnum:        95.85.244.0 - 95.85.244.255
org:            ORG-NFS9-RIPE
netname:        ORG-NFS9-RIPE
country:        TJ
admin-c:        NFS33-RIPE
tech-c:         NFS33-RIPE
status:         ASSIGNED PA
mnt-by:         zanemint-mnt
created:        2025-12-04T06:43:13Z
last-modified:  2025-12-04T10:28:35Z
source:         RIPE
abuse-c:        AA45271-RIPE
mnt-domains:    nfstj-mnt
mnt-routes:     nfstj-mnt

organisation:   ORG-NFS9-RIPE
org-name:       Noyobzoda Faridduni Saidilhom
org-type:       OTHER
address:        Rudaki Street 4, A3 03.12, Obburdon Jamoat, Mastchoh District, Sughd Region, Tajikistan
country:        TJ
abuse-c:        AA45271-RIPE
mnt-ref:        nfstj-mnt
mnt-ref:        mnt-bg-eurocrypt-1
mnt-ref:        GOODTEC-MNT
mnt-ref:        zanemint-mnt
mnt-ref:        RIT-ECODE-MNT
mnt-ref:        sc-rapidseedbox-1-mnt
mnt-by:         nfstj-mnt
created:        2025-06-30T15:57:25Z
last-modified:  2026-02-03T18:16:34Z
source:         RIPE # Filtered

person:         Noyobzoda Faridduni Saidilhom
address:        Rudaki Street 4, A3 03.12, Obburdon Jamoat, Mastchoh District, Sughd Region, Tajikistan
phone:          +992109389511
nic-hdl:        NFS33-RIPE
mnt-by:         nfstj-mnt
created:        2025-06-30T15:54:16Z
last-modified:  2025-06-30T15:54:16Z
source:         RIPE

% Information related to '95.85.244.0/24AS208885'

route:          95.85.244.0/24
origin:         AS208885
mnt-by:         nfstj-mnt
created:        2025-12-04T10:03:47Z
last-modified:  2025-12-04T10:03:47Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.85.244.192
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.85.244.192.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033002 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 11:30:41 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 192.244.85.95.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 192.244.85.95.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.64.15.106 attackbots
Aug  2 22:53:31 web9 sshd\[26146\]: Invalid user pi from 82.64.15.106
Aug  2 22:53:31 web9 sshd\[26148\]: Invalid user pi from 82.64.15.106
Aug  2 22:53:31 web9 sshd\[26146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.15.106
Aug  2 22:53:31 web9 sshd\[26148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.15.106
Aug  2 22:53:33 web9 sshd\[26146\]: Failed password for invalid user pi from 82.64.15.106 port 48214 ssh2
2020-08-03 19:56:39
117.51.143.121 attackbots
2020-08-03T07:46:11.758432lavrinenko.info sshd[22383]: Failed password for root from 117.51.143.121 port 34342 ssh2
2020-08-03T07:48:07.618532lavrinenko.info sshd[22498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.51.143.121  user=root
2020-08-03T07:48:10.396686lavrinenko.info sshd[22498]: Failed password for root from 117.51.143.121 port 54206 ssh2
2020-08-03T07:50:03.663445lavrinenko.info sshd[22724]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.51.143.121  user=root
2020-08-03T07:50:05.369991lavrinenko.info sshd[22724]: Failed password for root from 117.51.143.121 port 45832 ssh2
...
2020-08-03 20:15:38
205.205.150.4 attackbots
Aug  3 14:28:35 debian-2gb-nbg1-2 kernel: \[18716185.870184\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=205.205.150.4 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=237 ID=17100 PROTO=TCP SPT=55505 DPT=9595 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-03 20:32:13
217.182.94.110 attackbots
"Unauthorized connection attempt on SSHD detected"
2020-08-03 20:30:32
185.104.253.52 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-03 20:11:37
62.234.80.115 attackspambots
2020-08-03 13:59:08,113 fail2ban.actions: WARNING [ssh] Ban 62.234.80.115
2020-08-03 20:05:24
148.70.93.176 attack
Unauthorized connection attempt detected from IP address 148.70.93.176 to port 8105
2020-08-03 20:08:10
189.39.102.67 attackspam
Aug  3 05:34:58 master sshd[23288]: Failed password for root from 189.39.102.67 port 49122 ssh2
Aug  3 05:42:49 master sshd[23458]: Failed password for root from 189.39.102.67 port 51958 ssh2
Aug  3 05:48:20 master sshd[23522]: Failed password for root from 189.39.102.67 port 36272 ssh2
Aug  3 05:53:22 master sshd[23612]: Failed password for root from 189.39.102.67 port 48818 ssh2
Aug  3 05:58:32 master sshd[23665]: Failed password for root from 189.39.102.67 port 33146 ssh2
Aug  3 06:03:31 master sshd[24135]: Failed password for root from 189.39.102.67 port 45694 ssh2
Aug  3 06:08:39 master sshd[24190]: Failed password for root from 189.39.102.67 port 58256 ssh2
Aug  3 06:13:42 master sshd[24323]: Failed password for root from 189.39.102.67 port 42598 ssh2
Aug  3 06:18:49 master sshd[24390]: Failed password for root from 189.39.102.67 port 55148 ssh2
Aug  3 06:28:56 master sshd[24750]: Failed password for root from 189.39.102.67 port 52022 ssh2
2020-08-03 20:13:21
121.229.20.84 attackspam
Aug  3 09:57:04 lukav-desktop sshd\[27620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.20.84  user=root
Aug  3 09:57:06 lukav-desktop sshd\[27620\]: Failed password for root from 121.229.20.84 port 53844 ssh2
Aug  3 10:01:00 lukav-desktop sshd\[27706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.20.84  user=root
Aug  3 10:01:02 lukav-desktop sshd\[27706\]: Failed password for root from 121.229.20.84 port 41920 ssh2
Aug  3 10:04:43 lukav-desktop sshd\[27785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.20.84  user=root
2020-08-03 20:10:41
157.245.104.19 attackspambots
Aug  3 11:55:05 ip-172-31-62-245 sshd\[7517\]: Failed password for root from 157.245.104.19 port 44240 ssh2\
Aug  3 11:56:54 ip-172-31-62-245 sshd\[7546\]: Failed password for root from 157.245.104.19 port 43652 ssh2\
Aug  3 11:58:49 ip-172-31-62-245 sshd\[7562\]: Failed password for root from 157.245.104.19 port 43064 ssh2\
Aug  3 12:00:49 ip-172-31-62-245 sshd\[7596\]: Failed password for root from 157.245.104.19 port 42476 ssh2\
Aug  3 12:02:45 ip-172-31-62-245 sshd\[7617\]: Failed password for root from 157.245.104.19 port 41888 ssh2\
2020-08-03 20:25:43
51.38.37.254 attackbotsspam
2020-08-03T02:41:37.181622morrigan.ad5gb.com sshd[1812940]: Failed password for root from 51.38.37.254 port 32884 ssh2
2020-08-03T02:41:37.958086morrigan.ad5gb.com sshd[1812940]: Disconnected from authenticating user root 51.38.37.254 port 32884 [preauth]
2020-08-03 20:15:16
189.124.8.234 attack
$f2bV_matches
2020-08-03 19:57:51
35.229.64.137 attack
WordPress XMLRPC scan :: 35.229.64.137 1.920 - [03/Aug/2020:03:48:10  0000] www.[censored_1] "POST //xmlrpc.php HTTP/1.1" 503 18229 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36" "HTTP/1.1"
2020-08-03 20:02:12
106.12.201.16 attackbotsspam
2020-08-03T09:25:18.428823randservbullet-proofcloud-66.localdomain sshd[21251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.201.16  user=root
2020-08-03T09:25:20.690312randservbullet-proofcloud-66.localdomain sshd[21251]: Failed password for root from 106.12.201.16 port 52300 ssh2
2020-08-03T09:42:05.360511randservbullet-proofcloud-66.localdomain sshd[21381]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.201.16  user=root
2020-08-03T09:42:06.864363randservbullet-proofcloud-66.localdomain sshd[21381]: Failed password for root from 106.12.201.16 port 46554 ssh2
...
2020-08-03 20:04:52
159.89.199.182 attack
Aug  3 14:49:17 hosting sshd[12347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.199.182  user=root
Aug  3 14:49:19 hosting sshd[12347]: Failed password for root from 159.89.199.182 port 46476 ssh2
...
2020-08-03 20:28:39

最近上报的IP列表

172.71.164.200 148.153.188.246 2606:4700:10::6816:3049 2606:4700:10::ac43:234e
109.167.82.43 2606:4700:10::6814:5871 2606:4700:10::ac43:1932 2606:4700:10::ac43:880
122.192.203.8 162.216.149.88 137.184.104.255 64.62.156.57
58.255.236.64 120.82.84.13 160.119.76.57 2606:4700:10::ac43:1257
2606:4700:10::6814:9118 2606:4700:10::ac43:1295 2606:4700:10::ac43:1365 2606:4700:10::6816:4819