必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.50.156.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63429
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.50.156.5.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:21:11 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
5.156.50.114.in-addr.arpa domain name pointer softbank114050156005.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
5.156.50.114.in-addr.arpa	name = softbank114050156005.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.211.79.117 attackbotsspam
Oct  9 16:11:38 vps647732 sshd[6216]: Failed password for root from 80.211.79.117 port 46672 ssh2
...
2019-10-09 22:22:36
118.24.246.193 attackspam
Oct  9 16:00:17 dedicated sshd[29132]: Invalid user Marseille from 118.24.246.193 port 54232
2019-10-09 22:19:03
157.230.184.19 attackspambots
2019-10-09T13:27:14.723775abusebot-2.cloudsearch.cf sshd\[7274\]: Invalid user P@\$\$@2020 from 157.230.184.19 port 57890
2019-10-09 21:46:29
213.148.198.36 attack
Oct  9 15:51:59 vps691689 sshd[30806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.148.198.36
Oct  9 15:52:01 vps691689 sshd[30806]: Failed password for invalid user !@#Qwerty from 213.148.198.36 port 41624 ssh2
Oct  9 15:55:53 vps691689 sshd[30857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.148.198.36
...
2019-10-09 22:04:46
2.95.139.57 attackspam
0,39-02/32 [bc01/m88] concatform PostRequest-Spammer scoring: brussels
2019-10-09 22:09:44
222.186.175.182 attackspam
Oct  9 14:54:23 MK-Soft-Root1 sshd[1584]: Failed password for root from 222.186.175.182 port 16184 ssh2
Oct  9 14:54:29 MK-Soft-Root1 sshd[1584]: Failed password for root from 222.186.175.182 port 16184 ssh2
...
2019-10-09 21:49:14
92.47.92.42 attackspam
Automatic report - Port Scan Attack
2019-10-09 22:13:48
200.196.253.251 attackspam
Oct  9 16:09:20 core sshd[22135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.196.253.251  user=root
Oct  9 16:09:22 core sshd[22135]: Failed password for root from 200.196.253.251 port 42872 ssh2
...
2019-10-09 22:20:22
49.234.5.134 attack
Oct  9 15:17:37 mout sshd[16660]: Invalid user Killer123 from 49.234.5.134 port 44206
2019-10-09 22:02:27
54.200.167.186 attackbotsspam
10/09/2019-16:04:10.006118 54.200.167.186 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-09 22:13:00
112.35.26.43 attackbots
Oct  9 15:05:13 legacy sshd[26672]: Failed password for root from 112.35.26.43 port 56100 ssh2
Oct  9 15:09:00 legacy sshd[26778]: Failed password for root from 112.35.26.43 port 50454 ssh2
...
2019-10-09 22:21:33
106.13.81.242 attack
Oct  9 14:10:01 minden010 sshd[12446]: Failed password for root from 106.13.81.242 port 44226 ssh2
Oct  9 14:14:39 minden010 sshd[16274]: Failed password for root from 106.13.81.242 port 48846 ssh2
...
2019-10-09 21:52:06
51.68.192.106 attack
Oct  9 15:55:06 core sshd[4745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.192.106  user=root
Oct  9 15:55:08 core sshd[4745]: Failed password for root from 51.68.192.106 port 53546 ssh2
...
2019-10-09 22:19:28
27.254.136.29 attack
2019-10-09T13:53:02.371459abusebot-5.cloudsearch.cf sshd\[18008\]: Invalid user Ordinateur1@3 from 27.254.136.29 port 58394
2019-10-09 22:03:14
192.99.169.5 attackspambots
2019-10-09T14:07:39.805793abusebot.cloudsearch.cf sshd\[21486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.ip-192-99-169.net  user=root
2019-10-09 22:15:07

最近上报的IP列表

94.82.179.49 142.199.147.88 175.11.231.66 234.211.214.254
43.41.149.254 39.37.122.245 163.51.215.179 160.254.212.250
132.53.0.46 236.124.78.49 107.98.168.138 43.240.171.66
213.137.115.67 22.23.59.169 96.52.69.66 206.136.226.163
42.34.10.139 194.244.81.68 164.2.249.124 122.65.28.7