必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.179.132.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21411
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.179.132.50.			IN	A

;; AUTHORITY SECTION:
.			326	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 12:22:14 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 50.132.179.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.132.179.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
167.172.238.159 attackspambots
Lines containing failures of 167.172.238.159
Apr  8 14:23:59 linuxrulz sshd[14067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.238.159  user=postgres
Apr  8 14:24:01 linuxrulz sshd[14067]: Failed password for postgres from 167.172.238.159 port 52258 ssh2
Apr  8 14:24:01 linuxrulz sshd[14067]: Received disconnect from 167.172.238.159 port 52258:11: Bye Bye [preauth]
Apr  8 14:24:01 linuxrulz sshd[14067]: Disconnected from authenticating user postgres 167.172.238.159 port 52258 [preauth]
Apr  8 14:25:08 linuxrulz sshd[14402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.238.159  user=postgres
Apr  8 14:25:10 linuxrulz sshd[14402]: Failed password for postgres from 167.172.238.159 port 34920 ssh2
Apr  8 14:25:10 linuxrulz sshd[14402]: Received disconnect from 167.172.238.159 port 34920:11: Bye Bye [preauth]
Apr  8 14:25:10 linuxrulz sshd[14402]: Disconnected from authenti........
------------------------------
2020-04-08 22:02:39
167.71.48.57 attack
(sshd) Failed SSH login from 167.71.48.57 (DE/Germany/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  8 15:13:15 ubnt-55d23 sshd[16131]: Invalid user rachel from 167.71.48.57 port 48304
Apr  8 15:13:17 ubnt-55d23 sshd[16131]: Failed password for invalid user rachel from 167.71.48.57 port 48304 ssh2
2020-04-08 21:54:22
81.33.29.213 attackspambots
SSH Brute-Forcing (server2)
2020-04-08 21:44:33
222.186.180.17 attack
SSH brute force attempt @ 2020-04-08 14:08:13
2020-04-08 21:18:20
2a00:1098:84::4 attackspambots
Apr  8 14:25:54 l03 sshd[16718]: Invalid user user2 from 2a00:1098:84::4 port 32944
...
2020-04-08 21:30:56
195.133.28.50 attackspam
Automatic report - Port Scan Attack
2020-04-08 21:32:45
14.187.253.213 attack
Lines containing failures of 14.187.253.213
Apr  8 14:21:10 kmh-vmh-001-fsn03 sshd[2206]: Invalid user admin from 14.187.253.213 port 37800
Apr  8 14:21:10 kmh-vmh-001-fsn03 sshd[2206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.187.253.213 
Apr  8 14:21:11 kmh-vmh-001-fsn03 sshd[2206]: Failed password for invalid user admin from 14.187.253.213 port 37800 ssh2
Apr  8 14:21:13 kmh-vmh-001-fsn03 sshd[2206]: Connection closed by invalid user admin 14.187.253.213 port 37800 [preauth]
Apr  8 14:21:18 kmh-vmh-001-fsn03 sshd[2403]: Invalid user admin from 14.187.253.213 port 37825
Apr  8 14:21:18 kmh-vmh-001-fsn03 sshd[2403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.187.253.213 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.187.253.213
2020-04-08 21:30:26
168.61.176.121 attackbots
Apr  8 14:44:03 vmd26974 sshd[13788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.176.121
Apr  8 14:44:06 vmd26974 sshd[13788]: Failed password for invalid user sven from 168.61.176.121 port 60668 ssh2
...
2020-04-08 21:31:14
2001:470:dfa9:10ff:0:242:ac11:a attackspambots
Port scan
2020-04-08 22:11:15
82.196.15.195 attackspam
Apr  8 12:53:21 vlre-nyc-1 sshd\[19191\]: Invalid user test from 82.196.15.195
Apr  8 12:53:21 vlre-nyc-1 sshd\[19191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.15.195
Apr  8 12:53:23 vlre-nyc-1 sshd\[19191\]: Failed password for invalid user test from 82.196.15.195 port 33794 ssh2
Apr  8 13:03:11 vlre-nyc-1 sshd\[19484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.15.195  user=root
Apr  8 13:03:12 vlre-nyc-1 sshd\[19484\]: Failed password for root from 82.196.15.195 port 44880 ssh2
...
2020-04-08 21:50:13
51.158.98.65 attackspam
2020-04-08 x@x
2020-04-08 x@x
2020-04-08 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.158.98.65
2020-04-08 22:00:27
139.59.38.252 attackspam
Apr  8 15:24:57 srv01 sshd[5727]: Invalid user sls from 139.59.38.252 port 42432
Apr  8 15:24:57 srv01 sshd[5727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.38.252
Apr  8 15:24:57 srv01 sshd[5727]: Invalid user sls from 139.59.38.252 port 42432
Apr  8 15:24:59 srv01 sshd[5727]: Failed password for invalid user sls from 139.59.38.252 port 42432 ssh2
Apr  8 15:29:19 srv01 sshd[5936]: Invalid user user from 139.59.38.252 port 53430
...
2020-04-08 21:29:31
111.229.3.209 attackbotsspam
Apr  8 14:33:51 rotator sshd\[30945\]: Invalid user debian-spamd from 111.229.3.209Apr  8 14:33:53 rotator sshd\[30945\]: Failed password for invalid user debian-spamd from 111.229.3.209 port 53630 ssh2Apr  8 14:38:14 rotator sshd\[31792\]: Invalid user test from 111.229.3.209Apr  8 14:38:16 rotator sshd\[31792\]: Failed password for invalid user test from 111.229.3.209 port 42666 ssh2Apr  8 14:42:32 rotator sshd\[32593\]: Invalid user anil from 111.229.3.209Apr  8 14:42:34 rotator sshd\[32593\]: Failed password for invalid user anil from 111.229.3.209 port 59922 ssh2
...
2020-04-08 22:07:27
38.83.106.148 attackbotsspam
Apr  8 15:30:57 OPSO sshd\[10026\]: Invalid user hduser from 38.83.106.148 port 40128
Apr  8 15:30:57 OPSO sshd\[10026\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.83.106.148
Apr  8 15:30:59 OPSO sshd\[10026\]: Failed password for invalid user hduser from 38.83.106.148 port 40128 ssh2
Apr  8 15:35:00 OPSO sshd\[10755\]: Invalid user deploy from 38.83.106.148 port 50764
Apr  8 15:35:00 OPSO sshd\[10755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.83.106.148
2020-04-08 21:48:51
35.222.254.157 attackbots
35.222.254.157 - - [08/Apr/2020:14:42:55 +0200] "GET /wp-admin/vuln.php HTTP/1.1" 404 16916 "-" "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"
35.222.254.157 - - [08/Apr/2020:14:42:57 +0200] "GET /wp-admin/vuln.htm HTTP/1.1" 404 17075 "-" "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"
35.222.254.157 - - [08/Apr/2020:14:42:57 +0200] "POST /wp-content/plugins/cherry-plugin/admin/import-export/upload.php HTTP/1.1" 403 400 "-" "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"
35.222.254.157 - - [08/Apr/2020:14:42:58 +0200] "GET /wp-content/plugins/cherry-plugin/admin/import-export/settings_auto.php HTTP/1.1" 404 16989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"
35.222.254.157 - - [08/Apr/2020:14:43:03 +0200] "POST /wp-admin/admin-post.php?page=wysija_campaigns&action=th
...
2020-04-08 21:35:25

最近上报的IP列表

229.241.71.1 119.179.132.57 119.179.132.6 119.179.132.60
119.179.132.63 119.179.132.76 119.179.132.78 119.179.132.94
119.179.133.1 119.179.133.106 119.179.133.120 119.179.133.123
119.179.133.134 119.179.133.139 119.179.140.238 119.179.140.24
119.179.140.3 119.179.140.44 119.179.140.47 119.179.140.64