必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.9.50.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53212
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.9.50.137.			IN	A

;; AUTHORITY SECTION:
.			588	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 08:18:57 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
137.50.9.124.in-addr.arpa domain name pointer 124-9-50-137.static.tfn.net.tw.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.50.9.124.in-addr.arpa	name = 124-9-50-137.static.tfn.net.tw.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
103.221.221.112 attackspambots
103.221.221.112 - - [13/Oct/2019:22:12:27 +0200] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.221.221.112 - - [13/Oct/2019:22:12:28 +0200] "POST /wp-login.php HTTP/1.1" 200 1651 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.221.221.112 - - [13/Oct/2019:22:12:29 +0200] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.221.221.112 - - [13/Oct/2019:22:12:30 +0200] "POST /wp-login.php HTTP/1.1" 200 1629 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.221.221.112 - - [13/Oct/2019:22:12:31 +0200] "GET /wp-login.php HTTP/1.1" 200 1256 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.221.221.112 - - [13/Oct/2019:22:12:32 +0200] "POST /wp-login.php HTTP/1.1" 200 1626 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
.
2019-10-14 07:13:43
222.186.175.216 attackspambots
Oct 14 01:09:26 Ubuntu-1404-trusty-64-minimal sshd\[3148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Oct 14 01:09:28 Ubuntu-1404-trusty-64-minimal sshd\[3148\]: Failed password for root from 222.186.175.216 port 31506 ssh2
Oct 14 01:09:54 Ubuntu-1404-trusty-64-minimal sshd\[3221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.216  user=root
Oct 14 01:09:56 Ubuntu-1404-trusty-64-minimal sshd\[3221\]: Failed password for root from 222.186.175.216 port 29706 ssh2
Oct 14 01:10:01 Ubuntu-1404-trusty-64-minimal sshd\[3221\]: Failed password for root from 222.186.175.216 port 29706 ssh2
2019-10-14 07:25:07
138.68.57.207 attackspambots
Automatic report - Banned IP Access
2019-10-14 06:57:26
46.188.109.21 attackbotsspam
proto=tcp  .  spt=60301  .  dpt=25  .     (Found on   Dark List de Oct 13)     (774)
2019-10-14 07:03:44
167.86.114.108 attackbots
2019-10-13T22:50:12.202824abusebot-3.cloudsearch.cf sshd\[16037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vmi267007.contaboserver.net  user=root
2019-10-14 07:03:28
78.46.220.122 attack
*Port Scan* detected from 78.46.220.122 (DE/Germany/static.122.220.46.78.clients.your-server.de). 4 hits in the last 265 seconds
2019-10-14 07:17:52
179.125.25.218 attackbots
Brute force attack stopped by firewall
2019-10-14 07:13:08
222.186.175.148 attackbots
2019-10-13T23:12:44.923036abusebot-5.cloudsearch.cf sshd\[13229\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
2019-10-14 07:25:45
221.15.192.233 attackspam
Unauthorised access (Oct 13) SRC=221.15.192.233 LEN=40 TTL=240 ID=35713 TCP DPT=1433 WINDOW=1024 SYN
2019-10-14 07:27:57
185.176.27.42 attackspam
Port scan: Attack repeated for 24 hours
2019-10-14 07:18:51
112.29.140.229 attack
Automatic report - Banned IP Access
2019-10-14 06:56:02
179.189.235.228 attackbots
Oct 13 17:07:41 firewall sshd[25192]: Invalid user Windows@7 from 179.189.235.228
Oct 13 17:07:42 firewall sshd[25192]: Failed password for invalid user Windows@7 from 179.189.235.228 port 49660 ssh2
Oct 13 17:12:39 firewall sshd[25299]: Invalid user Resultat@123 from 179.189.235.228
...
2019-10-14 07:19:06
167.86.69.113 attackbots
Mar 18 19:58:04 yesfletchmain sshd\[29083\]: Invalid user applmgr from 167.86.69.113 port 36664
Mar 18 19:58:04 yesfletchmain sshd\[29083\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.69.113
Mar 18 19:58:06 yesfletchmain sshd\[29083\]: Failed password for invalid user applmgr from 167.86.69.113 port 36664 ssh2
Mar 18 20:01:40 yesfletchmain sshd\[29244\]: Invalid user tomcat from 167.86.69.113 port 38366
Mar 18 20:01:40 yesfletchmain sshd\[29244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.69.113
...
2019-10-14 07:36:22
118.24.239.153 attackbotsspam
Oct 13 22:03:15 mail1 sshd\[20589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.239.153  user=root
Oct 13 22:03:16 mail1 sshd\[20589\]: Failed password for root from 118.24.239.153 port 44410 ssh2
Oct 13 22:08:38 mail1 sshd\[23053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.239.153  user=root
Oct 13 22:08:40 mail1 sshd\[23053\]: Failed password for root from 118.24.239.153 port 59926 ssh2
Oct 13 22:13:21 mail1 sshd\[25231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.239.153  user=root
...
2019-10-14 07:07:25
118.24.37.81 attackbotsspam
Oct 13 21:01:22 localhost sshd\[4876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.37.81  user=root
Oct 13 21:01:24 localhost sshd\[4876\]: Failed password for root from 118.24.37.81 port 42318 ssh2
Oct 13 21:14:17 localhost sshd\[5029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.37.81  user=root
...
2019-10-14 07:15:08

最近上报的IP列表

104.109.152.252 104.117.76.66 104.109.144.184 104.126.116.24
104.126.116.32 104.126.116.35 104.126.116.42 104.126.116.50
104.126.116.89 104.126.116.48 104.127.161.33 104.126.119.115
124.93.73.240 104.127.174.112 104.130.169.217 104.130.158.251
104.130.145.30 104.130.140.75 104.130.132.167 104.130.184.157