必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
114.233.50.66 attack
Unauthorized connection attempt detected from IP address 114.233.50.66 to port 6656 [T]
2020-01-27 04:31:44
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.233.50.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.233.50.21.			IN	A

;; AUTHORITY SECTION:
.			473	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 15:21:44 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.50.233.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.50.233.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
109.162.247.211 attack
Unauthorized IMAP connection attempt
2020-08-23 17:10:08
118.101.192.62 attack
(sshd) Failed SSH login from 118.101.192.62 (MY/Malaysia/-): 5 in the last 3600 secs
2020-08-23 16:46:39
109.228.48.167 attackbots
GB - - [22/Aug/2020:15:18:57 +0300] GET /wp-login.php HTTP/1.1 200 2845 - Mozilla
2020-08-23 17:13:13
43.251.37.21 attackspam
Aug 23 08:13:36 OPSO sshd\[9484\]: Invalid user ubuntu from 43.251.37.21 port 52953
Aug 23 08:13:36 OPSO sshd\[9484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.251.37.21
Aug 23 08:13:38 OPSO sshd\[9484\]: Failed password for invalid user ubuntu from 43.251.37.21 port 52953 ssh2
Aug 23 08:14:56 OPSO sshd\[9638\]: Invalid user adminftp from 43.251.37.21 port 59864
Aug 23 08:14:56 OPSO sshd\[9638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.251.37.21
2020-08-23 17:08:10
133.242.53.108 attack
Invalid user help from 133.242.53.108 port 34552
2020-08-23 17:17:39
172.86.180.66 attack
2020-08-23T11:24:33.059372mail.standpoint.com.ua sshd[27207]: Failed password for storage from 172.86.180.66 port 41002 ssh2
2020-08-23T11:24:34.708229mail.standpoint.com.ua sshd[27207]: Failed password for storage from 172.86.180.66 port 41002 ssh2
2020-08-23T11:24:36.161110mail.standpoint.com.ua sshd[27207]: Failed password for storage from 172.86.180.66 port 41002 ssh2
2020-08-23T11:24:38.556204mail.standpoint.com.ua sshd[27207]: Failed password for storage from 172.86.180.66 port 41002 ssh2
2020-08-23T11:24:40.892090mail.standpoint.com.ua sshd[27207]: Failed password for storage from 172.86.180.66 port 41002 ssh2
...
2020-08-23 17:01:13
120.92.10.24 attackbotsspam
Aug 23 08:28:36 ns382633 sshd\[3688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.10.24  user=root
Aug 23 08:28:38 ns382633 sshd\[3688\]: Failed password for root from 120.92.10.24 port 51608 ssh2
Aug 23 08:45:57 ns382633 sshd\[7216\]: Invalid user dpc from 120.92.10.24 port 48722
Aug 23 08:45:57 ns382633 sshd\[7216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.10.24
Aug 23 08:45:59 ns382633 sshd\[7216\]: Failed password for invalid user dpc from 120.92.10.24 port 48722 ssh2
2020-08-23 16:52:09
117.5.148.213 attackspambots
117.5.148.213 - - [23/Aug/2020:04:49:10 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
117.5.148.213 - - [23/Aug/2020:04:49:16 +0100] "POST /xmlrpc.php HTTP/1.1" 200 229 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
117.5.148.213 - - [23/Aug/2020:04:49:23 +0100] "POST /xmlrpc.php HTTP/1.1" 403 661 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.109 Safari/537.36"
...
2020-08-23 17:18:00
129.213.107.56 attackbotsspam
Aug 23 09:06:29 web8 sshd\[25075\]: Invalid user jyk from 129.213.107.56
Aug 23 09:06:29 web8 sshd\[25075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.107.56
Aug 23 09:06:32 web8 sshd\[25075\]: Failed password for invalid user jyk from 129.213.107.56 port 45212 ssh2
Aug 23 09:10:23 web8 sshd\[27263\]: Invalid user hugo from 129.213.107.56
Aug 23 09:10:23 web8 sshd\[27263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.107.56
2020-08-23 17:12:47
36.155.115.72 attackspambots
2020-08-23T01:36:08.858374dreamphreak.com sshd[127886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.72  user=root
2020-08-23T01:36:11.005100dreamphreak.com sshd[127886]: Failed password for root from 36.155.115.72 port 51586 ssh2
...
2020-08-23 17:12:24
123.207.250.132 attack
Aug 23 09:38:04 rocket sshd[30815]: Failed password for root from 123.207.250.132 port 43574 ssh2
Aug 23 09:42:35 rocket sshd[31648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.250.132
...
2020-08-23 16:56:50
51.178.78.153 attackbots
 TCP (SYN) 51.178.78.153:35238 -> port 995, len 40
2020-08-23 16:50:01
129.204.254.71 attack
SSH invalid-user multiple login try
2020-08-23 17:04:39
77.247.178.201 attackbotsspam
[2020-08-23 05:10:13] NOTICE[1185][C-00005370] chan_sip.c: Call from '' (77.247.178.201:60717) to extension '011442037692181' rejected because extension not found in context 'public'.
[2020-08-23 05:10:13] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-23T05:10:13.134-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442037692181",SessionID="0x7f10c43f67a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/77.247.178.201/60717",ACLName="no_extension_match"
[2020-08-23 05:10:48] NOTICE[1185][C-00005371] chan_sip.c: Call from '' (77.247.178.201:58645) to extension '011442037697638' rejected because extension not found in context 'public'.
[2020-08-23 05:10:48] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-23T05:10:48.553-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442037697638",SessionID="0x7f10c43f67a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/U
...
2020-08-23 17:26:12
195.224.138.61 attackspambots
Aug 23 08:53:07 eventyay sshd[27258]: Failed password for root from 195.224.138.61 port 36300 ssh2
Aug 23 08:56:46 eventyay sshd[27365]: Failed password for root from 195.224.138.61 port 43564 ssh2
Aug 23 09:00:17 eventyay sshd[27479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.224.138.61
...
2020-08-23 17:08:30

最近上报的IP列表

114.233.50.214 114.233.50.232 113.53.21.13 114.233.50.229
114.233.50.236 114.233.50.221 114.233.50.230 114.233.50.218
114.233.50.242 114.233.50.244 114.233.50.29 114.233.50.30
114.233.50.35 114.233.50.36 114.233.50.5 114.233.50.42
114.233.50.46 114.233.50.50 114.233.50.45 113.53.21.138