必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.50.23.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57364
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.50.23.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 17:30:18 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
148.23.50.104.in-addr.arpa domain name pointer 104-50-23-148.lightspeed.cicril.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.23.50.104.in-addr.arpa	name = 104-50-23-148.lightspeed.cicril.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.219.219 attack
2020-06-10T13:58:41.602713snf-827550 sshd[21300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.219.219
2020-06-10T13:58:41.587447snf-827550 sshd[21300]: Invalid user html from 106.13.219.219 port 52456
2020-06-10T13:58:43.774015snf-827550 sshd[21300]: Failed password for invalid user html from 106.13.219.219 port 52456 ssh2
...
2020-06-11 00:51:19
203.163.244.85 attackspam
Port probing on unauthorized port 81
2020-06-11 00:39:12
183.82.121.34 attack
Jun 10 17:37:36 debian64 sshd[30843]: Failed password for root from 183.82.121.34 port 56486 ssh2
...
2020-06-11 00:37:51
186.84.172.25 attackspam
Jun 10 13:27:00 home sshd[23780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.172.25
Jun 10 13:27:01 home sshd[23780]: Failed password for invalid user cmschine from 186.84.172.25 port 59990 ssh2
Jun 10 13:31:08 home sshd[24224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.172.25
...
2020-06-11 01:15:17
138.97.23.190 attackspam
Invalid user system from 138.97.23.190 port 50614
2020-06-11 01:00:37
152.247.90.4 attackbots
Automatic report - Port Scan Attack
2020-06-11 01:11:13
189.7.129.60 attack
Jun 10 13:53:49 plex sshd[17182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.129.60  user=root
Jun 10 13:53:51 plex sshd[17182]: Failed password for root from 189.7.129.60 port 60603 ssh2
2020-06-11 01:06:23
129.28.51.226 attackbots
2020-06-10T08:15:21.461320linuxbox-skyline sshd[293377]: Invalid user shaker from 129.28.51.226 port 48694
...
2020-06-11 00:44:16
218.92.0.175 attackspam
Jun 10 20:04:29 ift sshd\[2014\]: Failed password for root from 218.92.0.175 port 3194 ssh2Jun 10 20:04:40 ift sshd\[2014\]: Failed password for root from 218.92.0.175 port 3194 ssh2Jun 10 20:04:43 ift sshd\[2014\]: Failed password for root from 218.92.0.175 port 3194 ssh2Jun 10 20:04:58 ift sshd\[2064\]: Failed password for root from 218.92.0.175 port 45014 ssh2Jun 10 20:05:01 ift sshd\[2064\]: Failed password for root from 218.92.0.175 port 45014 ssh2
...
2020-06-11 01:18:30
103.92.24.240 attackspam
Jun 10 18:44:06 abendstille sshd\[22043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.24.240  user=root
Jun 10 18:44:07 abendstille sshd\[22043\]: Failed password for root from 103.92.24.240 port 45464 ssh2
Jun 10 18:47:45 abendstille sshd\[25706\]: Invalid user jianghh from 103.92.24.240
Jun 10 18:47:45 abendstille sshd\[25706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.24.240
Jun 10 18:47:47 abendstille sshd\[25706\]: Failed password for invalid user jianghh from 103.92.24.240 port 60596 ssh2
...
2020-06-11 01:13:48
119.146.150.134 attackbots
Failed password for invalid user craig from 119.146.150.134 port 33105 ssh2
2020-06-11 00:56:16
103.206.112.182 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-11 01:13:18
192.241.249.53 attackbots
SSH brute-force: detected 3 distinct username(s) / 13 distinct password(s) within a 24-hour window.
2020-06-11 01:12:57
42.118.14.87 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-11 00:45:40
115.48.142.50 attack
Jun 10 12:58:41 debian-2gb-nbg1-2 kernel: \[14045452.465614\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=115.48.142.50 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=41 ID=15471 PROTO=TCP SPT=57041 DPT=2323 WINDOW=11065 RES=0x00 SYN URGP=0
2020-06-11 00:53:31

最近上报的IP列表

252.208.143.162 6.186.184.234 208.120.177.106 69.17.196.224
37.181.114.16 42.183.247.196 13.26.249.143 66.243.189.39
249.236.25.45 235.54.28.179 21.56.176.154 189.231.22.199
178.189.207.204 86.118.46.125 220.199.167.19 122.225.249.171
244.148.136.126 74.248.55.24 246.67.19.6 132.52.51.178