必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): China Unicom Cloud Data Company Limited

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackbotsspam
1600441541 - 09/18/2020 17:05:41 Host: 120.52.93.50/120.52.93.50 Port: 799 TCP Blocked
...
2020-09-19 00:39:55
attackbotsspam
ssh brute force
2020-09-18 16:42:45
attack
Sep 18 00:46:21 host1 sshd[734200]: Failed password for root from 120.52.93.50 port 59254 ssh2
Sep 18 00:52:02 host1 sshd[734543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.50  user=root
Sep 18 00:52:03 host1 sshd[734543]: Failed password for root from 120.52.93.50 port 38078 ssh2
Sep 18 00:52:02 host1 sshd[734543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.50  user=root
Sep 18 00:52:03 host1 sshd[734543]: Failed password for root from 120.52.93.50 port 38078 ssh2
...
2020-09-18 06:56:54
attackspambots
firewall-block, port(s): 31520/tcp
2020-09-16 23:19:31
attackbotsspam
Port scan: Attack repeated for 24 hours
2020-09-16 15:36:53
attack
Port scan: Attack repeated for 24 hours
2020-09-16 07:35:55
attackbots
Aug 24 04:13:53 plex-server sshd[2509699]: Invalid user in from 120.52.93.50 port 48180
Aug 24 04:13:53 plex-server sshd[2509699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.50 
Aug 24 04:13:53 plex-server sshd[2509699]: Invalid user in from 120.52.93.50 port 48180
Aug 24 04:13:55 plex-server sshd[2509699]: Failed password for invalid user in from 120.52.93.50 port 48180 ssh2
Aug 24 04:18:39 plex-server sshd[2511631]: Invalid user w from 120.52.93.50 port 50744
...
2020-08-24 13:24:56
attackspam
Aug 20 14:08:23 mout sshd[10482]: Invalid user twintown from 120.52.93.50 port 42894
2020-08-20 20:35:33
attackbotsspam
Invalid user cyx from 120.52.93.50 port 48006
2020-08-19 07:36:22
attackbots
2020-08-10 22:28:30,259 fail2ban.actions: WARNING [ssh] Ban 120.52.93.50
2020-08-11 08:48:06
attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-04 20:19:02
attack
Aug  3 14:17:29 marvibiene sshd[18462]: Failed password for root from 120.52.93.50 port 55894 ssh2
Aug  3 14:24:01 marvibiene sshd[18785]: Failed password for root from 120.52.93.50 port 35752 ssh2
2020-08-03 20:58:21
attack
Jul 28 23:47:12 ny01 sshd[17799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.50
Jul 28 23:47:15 ny01 sshd[17799]: Failed password for invalid user zlp from 120.52.93.50 port 47218 ssh2
Jul 28 23:56:57 ny01 sshd[19316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.50
2020-07-29 12:09:40
attackspam
$f2bV_matches
2020-07-13 13:50:13
attackbots
Jul 12 19:25:15 lnxded63 sshd[17568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.50
Jul 12 19:25:15 lnxded63 sshd[17568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.50
2020-07-13 01:28:26
attackspam
Lines containing failures of 120.52.93.50
Jul  7 16:26:05 newdogma sshd[30239]: Invalid user tomcat from 120.52.93.50 port 33004
Jul  7 16:26:05 newdogma sshd[30239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.50 
Jul  7 16:26:07 newdogma sshd[30239]: Failed password for invalid user tomcat from 120.52.93.50 port 33004 ssh2
Jul  7 16:26:07 newdogma sshd[30239]: Received disconnect from 120.52.93.50 port 33004:11: Bye Bye [preauth]
Jul  7 16:26:07 newdogma sshd[30239]: Disconnected from invalid user tomcat 120.52.93.50 port 33004 [preauth]
Jul  7 16:29:17 newdogma sshd[30315]: Invalid user eikawa from 120.52.93.50 port 45802
Jul  7 16:29:17 newdogma sshd[30315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.50 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=120.52.93.50
2020-07-09 03:08:43
相同子网IP讨论:
IP 类型 评论内容 时间
120.52.93.223 attack
"fail2ban match"
2020-10-14 03:34:38
120.52.93.223 attack
2020-10-13T10:05:34.150088abusebot-4.cloudsearch.cf sshd[984]: Invalid user x from 120.52.93.223 port 56286
2020-10-13T10:05:34.161096abusebot-4.cloudsearch.cf sshd[984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.223
2020-10-13T10:05:34.150088abusebot-4.cloudsearch.cf sshd[984]: Invalid user x from 120.52.93.223 port 56286
2020-10-13T10:05:36.709393abusebot-4.cloudsearch.cf sshd[984]: Failed password for invalid user x from 120.52.93.223 port 56286 ssh2
2020-10-13T10:13:43.885867abusebot-4.cloudsearch.cf sshd[1048]: Invalid user db2inst from 120.52.93.223 port 56098
2020-10-13T10:13:43.892167abusebot-4.cloudsearch.cf sshd[1048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.93.223
2020-10-13T10:13:43.885867abusebot-4.cloudsearch.cf sshd[1048]: Invalid user db2inst from 120.52.93.223 port 56098
2020-10-13T10:13:45.572236abusebot-4.cloudsearch.cf sshd[1048]: Failed password for invali
...
2020-10-13 18:53:51
120.52.93.223 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-10T14:35:10Z and 2020-10-10T14:41:38Z
2020-10-11 04:21:21
120.52.93.223 attackspam
(sshd) Failed SSH login from 120.52.93.223 (CN/China/-): 5 in the last 3600 secs
2020-10-10 20:16:46
120.52.93.126 attack
20/8/1@23:55:21: FAIL: IoT-Telnet address from=120.52.93.126
...
2020-08-02 12:43:36
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.52.93.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28951
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;120.52.93.50.			IN	A

;; AUTHORITY SECTION:
.			368	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070800 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 09 03:08:40 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
Host 50.93.52.120.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 50.93.52.120.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
139.199.115.210 attackspambots
Apr 23 10:35:10 santamaria sshd\[27578\]: Invalid user or from 139.199.115.210
Apr 23 10:35:10 santamaria sshd\[27578\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.115.210
Apr 23 10:35:13 santamaria sshd\[27578\]: Failed password for invalid user or from 139.199.115.210 port 9033 ssh2
...
2020-04-23 17:04:12
119.28.222.106 attackspam
20 attempts against mh-misbehave-ban on pluto
2020-04-23 17:38:18
60.170.10.219 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-23 17:18:22
183.134.66.108 attack
Apr 23 10:34:45 mailserver sshd\[6658\]: Invalid user oo from 183.134.66.108
...
2020-04-23 17:27:42
189.212.198.244 attack
Apr 23 03:17:54 server1 sshd\[23609\]: Failed password for root from 189.212.198.244 port 43361 ssh2
Apr 23 03:21:58 server1 sshd\[25589\]: Invalid user vagrant from 189.212.198.244
Apr 23 03:21:58 server1 sshd\[25589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.212.198.244 
Apr 23 03:22:00 server1 sshd\[25589\]: Failed password for invalid user vagrant from 189.212.198.244 port 36801 ssh2
Apr 23 03:26:12 server1 sshd\[27592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.212.198.244  user=root
...
2020-04-23 17:28:54
198.12.97.66 attack
DATE:2020-04-23 10:34:43, IP:198.12.97.66, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-04-23 17:36:16
66.188.242.148 attackbotsspam
WEB_SERVER 403 Forbidden
2020-04-23 17:40:29
125.182.240.161 attack
Automatically reported by fail2ban report script (mx1)
2020-04-23 17:25:28
89.32.41.75 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-23 17:08:45
144.21.103.101 attackbots
144.21.103.101 - - [23/Apr/2020:11:34:37 +0300] "GET / HTTP/1.0" 403 1460 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0"
144.21.103.101 - - [23/Apr/2020:11:34:37 +0300] "GET / HTTP/1.0" 403 1460 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0"
144.21.103.101 - - [23/Apr/2020:11:34:38 +0300] "GET /?lang=en HTTP/1.0" 403 1460 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:57.0) Gecko/20100101 Firefox/57.0"
...
2020-04-23 17:39:11
49.234.18.158 attack
Apr 23 10:31:15 ns382633 sshd\[1376\]: Invalid user hu from 49.234.18.158 port 55294
Apr 23 10:31:15 ns382633 sshd\[1376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158
Apr 23 10:31:17 ns382633 sshd\[1376\]: Failed password for invalid user hu from 49.234.18.158 port 55294 ssh2
Apr 23 10:35:02 ns382633 sshd\[1743\]: Invalid user gitlab-runner from 49.234.18.158 port 41194
Apr 23 10:35:02 ns382633 sshd\[1743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.18.158
2020-04-23 17:13:34
104.206.128.58 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-23 17:12:32
165.227.222.39 attack
[ThuApr2310:35:06.4473502020][:error][pid14855:tid47976511018752][client165.227.222.39:45484][client165.227.222.39]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"Datanyze"atREQUEST_HEADERS:user-agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"75"][id"337749"][rev"2"][msg"Atomicorp.comWAFRules:Datanyzebotblocked"][severity"ERROR"][hostname"dreamsengine.ch"][uri"/"][unique_id"XqFTOqTkyV5OxIqTymrnEwAAAIQ"]\,referer:http://dreamsengine.ch[ThuApr2310:35:11.2905552020][:error][pid32514:tid47976519423744][client165.227.222.39:45860][client165.227.222.39]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch"Datanyze"atREQUEST_HEADERS:user-agent.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"75"][id"337749"][rev"2"][msg"Atomicorp.comWAFRules:Datanyzebotblocked"][severity"ERROR"][hostname"dreamsengine.ch"][uri"/"][unique_id"XqFTP@NlXDhcOgYMSAqgtQAAAQg"]\,referer:http://dreamsengine.ch/
2020-04-23 17:03:50
42.114.43.82 attack
1587630878 - 04/23/2020 10:34:38 Host: 42.114.43.82/42.114.43.82 Port: 445 TCP Blocked
2020-04-23 17:41:35
157.230.112.34 attackspambots
Apr 23 08:51:11 vlre-nyc-1 sshd\[7844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.112.34  user=root
Apr 23 08:51:13 vlre-nyc-1 sshd\[7844\]: Failed password for root from 157.230.112.34 port 55270 ssh2
Apr 23 08:55:58 vlre-nyc-1 sshd\[7979\]: Invalid user qr from 157.230.112.34
Apr 23 08:55:58 vlre-nyc-1 sshd\[7979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.112.34
Apr 23 08:55:59 vlre-nyc-1 sshd\[7979\]: Failed password for invalid user qr from 157.230.112.34 port 41312 ssh2
...
2020-04-23 17:16:23

最近上报的IP列表

62.148.104.241 208.242.200.212 138.16.25.205 106.110.12.222
176.59.194.97 189.98.100.224 118.174.159.228 62.118.140.194
198.71.226.90 5.25.205.73 187.163.123.34 162.243.138.96
167.172.208.189 128.199.167.161 241.234.81.127 197.211.51.58
153.42.2.194 63.41.224.125 147.159.234.214 204.236.135.177