必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.4.50.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64029
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.4.50.136.			IN	A

;; AUTHORITY SECTION:
.			493	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 06:20:40 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
136.50.4.122.in-addr.arpa domain name pointer 136.50.4.122.broad.jn.sd.dynamic.163data.com.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.50.4.122.in-addr.arpa	name = 136.50.4.122.broad.jn.sd.dynamic.163data.com.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.224.129.35 attackbots
Sep 26 05:57:06 localhost sshd\[60973\]: Invalid user amssys from 122.224.129.35 port 52410
Sep 26 05:57:06 localhost sshd\[60973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.129.35
Sep 26 05:57:08 localhost sshd\[60973\]: Failed password for invalid user amssys from 122.224.129.35 port 52410 ssh2
Sep 26 06:02:01 localhost sshd\[61095\]: Invalid user programmer from 122.224.129.35 port 37308
Sep 26 06:02:01 localhost sshd\[61095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.224.129.35
...
2019-09-26 14:13:01
222.186.175.155 attackspam
SSH Brute Force, server-1 sshd[11058]: Failed password for root from 222.186.175.155 port 12432 ssh2
2019-09-26 14:11:30
39.64.38.136 attackspambots
Sep 26 10:53:50 lcl-usvr-01 sshd[29462]: Invalid user admin from 39.64.38.136
Sep 26 10:53:50 lcl-usvr-01 sshd[29462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.64.38.136 
Sep 26 10:53:50 lcl-usvr-01 sshd[29462]: Invalid user admin from 39.64.38.136
Sep 26 10:53:52 lcl-usvr-01 sshd[29462]: Failed password for invalid user admin from 39.64.38.136 port 11467 ssh2
Sep 26 10:53:50 lcl-usvr-01 sshd[29462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.64.38.136 
Sep 26 10:53:50 lcl-usvr-01 sshd[29462]: Invalid user admin from 39.64.38.136
Sep 26 10:53:52 lcl-usvr-01 sshd[29462]: Failed password for invalid user admin from 39.64.38.136 port 11467 ssh2
Sep 26 10:53:54 lcl-usvr-01 sshd[29462]: Failed password for invalid user admin from 39.64.38.136 port 11467 ssh2
2019-09-26 14:15:36
222.186.190.92 attack
Sep 26 07:51:54 SilenceServices sshd[547]: Failed password for root from 222.186.190.92 port 10200 ssh2
Sep 26 07:51:59 SilenceServices sshd[547]: Failed password for root from 222.186.190.92 port 10200 ssh2
Sep 26 07:52:03 SilenceServices sshd[547]: Failed password for root from 222.186.190.92 port 10200 ssh2
Sep 26 07:52:14 SilenceServices sshd[547]: error: maximum authentication attempts exceeded for root from 222.186.190.92 port 10200 ssh2 [preauth]
2019-09-26 14:26:31
192.118.78.18 attackspam
HTTP/80/443 Probe, Hack -
2019-09-26 14:50:40
123.207.142.208 attackbotsspam
...
2019-09-26 14:29:21
109.102.46.149 attackspambots
Chat Spam
2019-09-26 14:43:10
106.52.24.184 attackbotsspam
Sep 26 10:46:38 lcl-usvr-01 sshd[26730]: Invalid user zliu from 106.52.24.184
Sep 26 10:46:38 lcl-usvr-01 sshd[26730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.24.184 
Sep 26 10:46:38 lcl-usvr-01 sshd[26730]: Invalid user zliu from 106.52.24.184
Sep 26 10:46:40 lcl-usvr-01 sshd[26730]: Failed password for invalid user zliu from 106.52.24.184 port 46944 ssh2
Sep 26 10:52:00 lcl-usvr-01 sshd[28653]: Invalid user imapuser from 106.52.24.184
2019-09-26 14:51:20
60.169.69.101 attackbots
Automatic report - Banned IP Access
2019-09-26 14:46:03
150.246.133.78 attack
Unauthorised access (Sep 26) SRC=150.246.133.78 LEN=40 TTL=53 ID=36271 TCP DPT=8080 WINDOW=54954 SYN 
Unauthorised access (Sep 26) SRC=150.246.133.78 LEN=40 TTL=53 ID=23987 TCP DPT=8080 WINDOW=54954 SYN 
Unauthorised access (Sep 25) SRC=150.246.133.78 LEN=40 TTL=53 ID=49615 TCP DPT=8080 WINDOW=54954 SYN
2019-09-26 14:33:10
152.136.86.234 attack
Sep 26 09:44:39 areeb-Workstation sshd[6501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.86.234
Sep 26 09:44:41 areeb-Workstation sshd[6501]: Failed password for invalid user sdtdserver from 152.136.86.234 port 47548 ssh2
...
2019-09-26 14:35:38
79.30.2.89 attackbots
Automatic report - Port Scan Attack
2019-09-26 14:57:30
218.92.0.175 attackbotsspam
2019-09-26T07:12:17.724771+01:00 suse sshd[24541]: User root from 218.92.0.175 not allowed because not listed in AllowUsers
2019-09-26T07:12:19.832869+01:00 suse sshd[24541]: error: PAM: Authentication failure for illegal user root from 218.92.0.175
2019-09-26T07:12:17.724771+01:00 suse sshd[24541]: User root from 218.92.0.175 not allowed because not listed in AllowUsers
2019-09-26T07:12:19.832869+01:00 suse sshd[24541]: error: PAM: Authentication failure for illegal user root from 218.92.0.175
2019-09-26T07:12:17.724771+01:00 suse sshd[24541]: User root from 218.92.0.175 not allowed because not listed in AllowUsers
2019-09-26T07:12:19.832869+01:00 suse sshd[24541]: error: PAM: Authentication failure for illegal user root from 218.92.0.175
2019-09-26T07:12:19.835515+01:00 suse sshd[24541]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.175 port 13035 ssh2
...
2019-09-26 14:29:39
49.88.112.114 attackbots
Sep 26 07:18:28 vmd17057 sshd\[22706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Sep 26 07:18:29 vmd17057 sshd\[22706\]: Failed password for root from 49.88.112.114 port 45635 ssh2
Sep 26 07:18:32 vmd17057 sshd\[22706\]: Failed password for root from 49.88.112.114 port 45635 ssh2
...
2019-09-26 14:17:32
218.28.238.165 attackbots
Sep 26 07:07:06 taivassalofi sshd[162872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.28.238.165
Sep 26 07:07:07 taivassalofi sshd[162872]: Failed password for invalid user modest from 218.28.238.165 port 33010 ssh2
...
2019-09-26 14:51:46

最近上报的IP列表

122.96.28.113 122.96.28.198 122.6.176.91 122.6.226.226
123.108.244.189 123.10.32.133 123.101.225.225 123.11.104.165
123.113.149.110 123.125.109.161 123.117.119.36 123.118.0.186
123.118.3.77 123.118.0.15 123.125.109.191 123.125.109.195
123.125.154.141 123.125.225.46 123.127.143.13 123.127.199.202