必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.39.50.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36533
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.39.50.131.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:16:57 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
131.50.39.113.in-addr.arpa domain name pointer 113x39x50x131.ap113.ftth.ucom.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
131.50.39.113.in-addr.arpa	name = 113x39x50x131.ap113.ftth.ucom.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.158.36.122 attackbotsspam
Feb 28 14:27:34  exim[16110]: [1\54] 1j7ffw-0004Bq-TV H=82.158.36.122.dyn.user.ono.com [82.158.36.122] F= rejected after DATA: This message scored 19.4 spam points.
2020-02-29 03:15:14
178.62.107.141 attack
Feb 28 18:52:58 v22018076622670303 sshd\[14823\]: Invalid user admin from 178.62.107.141 port 50636
Feb 28 18:52:58 v22018076622670303 sshd\[14823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.107.141
Feb 28 18:53:01 v22018076622670303 sshd\[14823\]: Failed password for invalid user admin from 178.62.107.141 port 50636 ssh2
...
2020-02-29 02:53:07
184.168.27.71 attackbots
GET /wp/wp-admin/
2020-02-29 02:50:56
91.67.190.97 attackbotsspam
Feb 28 20:28:00 server sshd\[26429\]: Invalid user pi from 91.67.190.97
Feb 28 20:28:00 server sshd\[26429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip5b43be61.dynamic.kabel-deutschland.de 
Feb 28 20:28:00 server sshd\[26431\]: Invalid user pi from 91.67.190.97
Feb 28 20:28:00 server sshd\[26431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip5b43be61.dynamic.kabel-deutschland.de 
Feb 28 20:28:02 server sshd\[26429\]: Failed password for invalid user pi from 91.67.190.97 port 40448 ssh2
...
2020-02-29 03:06:50
198.27.81.94 attackspam
GET /wp-login.php
2020-02-29 02:50:35
42.113.17.31 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 03:22:23
42.113.213.26 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 03:14:25
159.65.144.64 attackspam
Feb 28 17:40:12 marvibiene sshd[24640]: Invalid user lvzhizhou from 159.65.144.64 port 43540
Feb 28 17:40:12 marvibiene sshd[24640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.144.64
Feb 28 17:40:12 marvibiene sshd[24640]: Invalid user lvzhizhou from 159.65.144.64 port 43540
Feb 28 17:40:14 marvibiene sshd[24640]: Failed password for invalid user lvzhizhou from 159.65.144.64 port 43540 ssh2
...
2020-02-29 03:14:09
91.134.185.90 attackbots
firewall-block, port(s): 22/tcp
2020-02-29 03:17:56
202.110.83.126 attackspambots
suspicious action Fri, 28 Feb 2020 11:55:20 -0300
2020-02-29 02:55:16
42.113.229.202 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-29 03:01:58
118.69.32.167 attack
SSH Brute Force
2020-02-29 03:19:46
178.128.0.34 attackspam
GET /.well-known/security.txt
2020-02-29 03:25:23
1.169.214.230 attackspambots
suspicious action Fri, 28 Feb 2020 10:28:25 -0300
2020-02-29 03:01:21
112.118.59.81 attackbotsspam
suspicious action Fri, 28 Feb 2020 10:28:37 -0300
2020-02-29 02:54:45

最近上报的IP列表

85.228.253.197 52.15.142.243 14.48.172.136 225.211.222.6
157.3.46.177 253.160.122.139 162.228.217.10 63.82.142.32
232.47.39.90 226.223.247.174 130.132.74.67 209.199.186.247
87.74.237.158 247.255.3.28 32.26.183.117 17.42.248.119
180.30.93.38 237.178.142.197 2.9.204.106 3.16.220.191