必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Águeda Municipality

省份(region): Aveiro

国家(country): Portugal

运营商(isp): NOS

主机名(hostname): unknown

机构(organization): Nos Comunicacoes, S.A.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.50.183.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32668
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;109.50.183.50.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083000 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 31 00:35:54 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
50.183.50.109.in-addr.arpa domain name pointer a109-50-183-50.cpe.netcabo.pt.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
50.183.50.109.in-addr.arpa	name = a109-50-183-50.cpe.netcabo.pt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.244.234.58 attackspam
Excessive Port-Scanning
2020-01-26 23:50:38
85.135.87.50 attack
Unauthorized connection attempt detected from IP address 85.135.87.50 to port 2220 [J]
2020-01-27 00:24:09
222.186.180.9 attackbotsspam
2020-01-26T15:45:24.092200abusebot-8.cloudsearch.cf sshd[9256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
2020-01-26T15:45:26.667837abusebot-8.cloudsearch.cf sshd[9256]: Failed password for root from 222.186.180.9 port 52888 ssh2
2020-01-26T15:45:29.568917abusebot-8.cloudsearch.cf sshd[9256]: Failed password for root from 222.186.180.9 port 52888 ssh2
2020-01-26T15:45:24.092200abusebot-8.cloudsearch.cf sshd[9256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
2020-01-26T15:45:26.667837abusebot-8.cloudsearch.cf sshd[9256]: Failed password for root from 222.186.180.9 port 52888 ssh2
2020-01-26T15:45:29.568917abusebot-8.cloudsearch.cf sshd[9256]: Failed password for root from 222.186.180.9 port 52888 ssh2
2020-01-26T15:45:24.092200abusebot-8.cloudsearch.cf sshd[9256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos
...
2020-01-27 00:08:45
212.64.60.187 attack
Jan 26 16:33:02 OPSO sshd\[29016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.60.187  user=root
Jan 26 16:33:04 OPSO sshd\[29016\]: Failed password for root from 212.64.60.187 port 44900 ssh2
Jan 26 16:37:54 OPSO sshd\[29717\]: Invalid user elsa from 212.64.60.187 port 36546
Jan 26 16:37:54 OPSO sshd\[29717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.60.187
Jan 26 16:37:57 OPSO sshd\[29717\]: Failed password for invalid user elsa from 212.64.60.187 port 36546 ssh2
2020-01-27 00:03:48
222.186.15.158 attackbotsspam
Jan 26 16:56:55 v22018076622670303 sshd\[30405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.158  user=root
Jan 26 16:56:57 v22018076622670303 sshd\[30405\]: Failed password for root from 222.186.15.158 port 46123 ssh2
Jan 26 16:56:59 v22018076622670303 sshd\[30405\]: Failed password for root from 222.186.15.158 port 46123 ssh2
...
2020-01-27 00:00:39
123.163.114.64 attackbots
Unauthorized connection attempt detected from IP address 123.163.114.64 to port 8081 [J]
2020-01-27 00:17:46
216.218.139.75 attackbots
Jan 26 16:13:16 hosting sshd[12224]: Invalid user www from 216.218.139.75 port 54042
...
2020-01-27 00:06:09
123.207.52.78 attack
Unauthorized connection attempt detected from IP address 123.207.52.78 to port 80 [J]
2020-01-27 00:17:30
210.14.77.102 attackbotsspam
Jan 26 17:01:55 hosting sshd[17828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.77.102  user=root
Jan 26 17:01:57 hosting sshd[17828]: Failed password for root from 210.14.77.102 port 18911 ssh2
...
2020-01-26 23:54:18
111.249.98.232 attackbotsspam
Unauthorized connection attempt detected from IP address 111.249.98.232 to port 4567 [J]
2020-01-26 23:41:03
92.154.96.7 attackspambots
Unauthorized connection attempt detected from IP address 92.154.96.7 to port 6379 [J]
2020-01-27 00:22:15
220.93.199.150 attack
Unauthorized connection attempt detected from IP address 220.93.199.150 to port 23 [J]
2020-01-27 00:05:40
141.136.44.113 attackbotsspam
Unauthorized connection attempt detected from IP address 141.136.44.113 to port 8080 [J]
2020-01-27 00:16:36
157.230.237.109 attack
Jan 26 16:45:14 SilenceServices sshd[936]: Failed password for mysql from 157.230.237.109 port 40212 ssh2
Jan 26 16:47:34 SilenceServices sshd[7756]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.237.109
Jan 26 16:47:36 SilenceServices sshd[7756]: Failed password for invalid user newuser from 157.230.237.109 port 34372 ssh2
2020-01-27 00:15:33
222.79.49.8 attackspam
Unauthorized connection attempt detected from IP address 222.79.49.8 to port 8081 [J]
2020-01-27 00:12:13

最近上报的IP列表

42.235.253.193 63.220.77.44 73.226.213.201 61.64.141.225
167.166.236.203 155.43.61.179 175.192.233.155 113.206.10.137
99.14.134.250 5.172.23.222 68.70.62.244 78.241.200.50
55.171.180.225 68.183.203.211 78.4.234.224 108.216.36.210
114.162.246.31 195.154.43.23 200.168.67.105 84.80.173.42