必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Iloilo

省份(region): Western Visayas

国家(country): Philippines

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.2.50.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16620
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.2.50.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025091301 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 14 09:21:20 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
b'13.50.2.122.in-addr.arpa domain name pointer 122.2.50.13.pldt.net.
'
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.50.2.122.in-addr.arpa	name = 122.2.50.13.pldt.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.216.140.31 attackspam
Port 3780 scan denied
2020-03-25 19:31:29
77.247.110.123 attackspam
Port 5038 scan denied
2020-03-25 19:02:21
212.129.17.32 attackspambots
SIPVicious Scanner Detection
2020-03-25 19:16:26
79.124.62.86 attackspambots
SIP/5060 Probe, BF, Hack -
2020-03-25 19:00:39
85.209.3.142 attack
Port 3814 scan denied
2020-03-25 18:57:52
198.108.66.233 attackspam
Port 8036 scan denied
2020-03-25 19:18:14
27.209.161.166 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-25 19:12:44
192.241.237.68 attack
SSH-bruteforce attempts
2020-03-25 19:29:32
194.26.29.110 attackspam
Mar 25 11:21:45 src: 194.26.29.110 signature match: "BACKDOOR NetSphere Connection attempt" (sid: 100044) tcp port: 30100
2020-03-25 19:23:00
192.241.238.132 attackspam
Unauthorized connection attempt from IP address 192.241.238.132
2020-03-25 19:26:35
185.172.110.220 attackspam
[portscan] tcp/81 [alter-web/web-proxy]
[scan/connect: 2 time(s)]
*(RWIN=65535)(03251034)
2020-03-25 19:33:29
51.91.212.79 attack
Mar 25 11:47:48 debian-2gb-nbg1-2 kernel: \[7392348.465969\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.91.212.79 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=32833 DPT=8881 WINDOW=65535 RES=0x00 SYN URGP=0
2020-03-25 19:05:28
188.166.208.131 attack
2020-03-24 UTC: (30x) - admin,armand,aufstellungsort,blade,bn,cod,cww,dy,fl,ftpuser,karena,lead,madhouse,neutron,nginx,nm,nola,orace,penglina,psybnc,simulator,uu,uz,vagrant,velva,web,weichanghe,whisper,www,xl
2020-03-25 19:31:06
204.42.253.130 attackbotsspam
scan z
2020-03-25 19:16:46
200.150.69.26 attack
Unauthorized connection attempt detected from IP address 200.150.69.26 to port 2233
2020-03-25 19:17:03

最近上报的IP列表

141.94.193.118 122.2.150.13 2600:1Fab:: 182.42.105.144
38.110.46.243 38.110.46.246 38.110.46.245 20.14.93.239
168.86.1.247 213.209.157.229 31.220.102.232 205.210.31.217
3.80.194.79 35.172.182.167 121.91.177.47 204.76.203.28
182.44.8.254 158.69.238.166 150.107.36.236 20.65.195.38