必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Finland

运营商(isp): Elisa

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.207.138.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12236
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;131.207.138.50.			IN	A

;; AUTHORITY SECTION:
.			230	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121201 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 13 04:07:39 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 50.138.207.131.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.138.207.131.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.75.19.175 attackbotsspam
Dec  9 07:41:26 meumeu sshd[2245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.19.175 
Dec  9 07:41:28 meumeu sshd[2245]: Failed password for invalid user afk from 51.75.19.175 port 48600 ssh2
Dec  9 07:46:33 meumeu sshd[2877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.19.175 
...
2019-12-09 14:49:12
140.143.196.66 attackbotsspam
Dec  9 07:39:23 v22018086721571380 sshd[3717]: Failed password for invalid user gdm from 140.143.196.66 port 46210 ssh2
2019-12-09 15:00:37
34.66.214.196 attackbots
Dec  9 07:46:50 server sshd\[11251\]: Invalid user test from 34.66.214.196
Dec  9 07:46:50 server sshd\[11251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.214.66.34.bc.googleusercontent.com 
Dec  9 07:46:52 server sshd\[11251\]: Failed password for invalid user test from 34.66.214.196 port 37376 ssh2
Dec  9 07:55:43 server sshd\[13767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.214.66.34.bc.googleusercontent.com  user=daemon
Dec  9 07:55:45 server sshd\[13767\]: Failed password for daemon from 34.66.214.196 port 51370 ssh2
...
2019-12-09 14:20:33
212.64.54.49 attack
Dec  9 09:23:43 server sshd\[6347\]: Invalid user test from 212.64.54.49
Dec  9 09:23:43 server sshd\[6347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.54.49 
Dec  9 09:23:44 server sshd\[6347\]: Failed password for invalid user test from 212.64.54.49 port 38386 ssh2
Dec  9 09:32:50 server sshd\[9172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.54.49  user=named
Dec  9 09:32:51 server sshd\[9172\]: Failed password for named from 212.64.54.49 port 49362 ssh2
...
2019-12-09 14:41:42
112.87.240.173 attackspam
Unauthorised access (Dec  9) SRC=112.87.240.173 LEN=40 TTL=50 ID=51819 TCP DPT=23 WINDOW=54700 SYN
2019-12-09 14:53:41
159.89.201.59 attackspambots
Dec  9 06:57:51 vpn01 sshd[29133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.201.59
Dec  9 06:57:53 vpn01 sshd[29133]: Failed password for invalid user prokein from 159.89.201.59 port 45184 ssh2
...
2019-12-09 14:14:56
222.186.52.86 attackspam
Dec  9 05:54:52 xxxxxxx sshd[9259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.86  user=r.r
Dec  9 05:54:55 xxxxxxx sshd[9259]: Failed password for r.r from 222.186.52.86 port 26355 ssh2
Dec  9 05:54:58 xxxxxxx sshd[9259]: Failed password for r.r from 222.186.52.86 port 26355 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=222.186.52.86
2019-12-09 14:22:13
222.186.180.9 attackspam
2019-12-09T07:52:41.066200ns386461 sshd\[1832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
2019-12-09T07:52:43.013898ns386461 sshd\[1832\]: Failed password for root from 222.186.180.9 port 3572 ssh2
2019-12-09T07:52:46.253472ns386461 sshd\[1832\]: Failed password for root from 222.186.180.9 port 3572 ssh2
2019-12-09T07:52:53.206029ns386461 sshd\[1832\]: Failed password for root from 222.186.180.9 port 3572 ssh2
2019-12-09T07:52:56.817267ns386461 sshd\[1832\]: Failed password for root from 222.186.180.9 port 3572 ssh2
...
2019-12-09 14:54:38
203.156.125.195 attackbots
Dec  6 23:05:36 mail sshd[1845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.156.125.195 
Dec  6 23:05:38 mail sshd[1845]: Failed password for invalid user liwa from 203.156.125.195 port 35638 ssh2
Dec  6 23:12:34 mail sshd[3583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.156.125.195
2019-12-09 14:49:44
170.231.59.19 attack
2019-12-09T07:23:28.706060host3.slimhost.com.ua sshd[4093570]: Invalid user greco from 170.231.59.19 port 28889
2019-12-09T07:23:28.772587host3.slimhost.com.ua sshd[4093570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.231.59.19
2019-12-09T07:23:28.706060host3.slimhost.com.ua sshd[4093570]: Invalid user greco from 170.231.59.19 port 28889
2019-12-09T07:23:30.731295host3.slimhost.com.ua sshd[4093570]: Failed password for invalid user greco from 170.231.59.19 port 28889 ssh2
2019-12-09T07:33:32.537339host3.slimhost.com.ua sshd[4097527]: Invalid user server from 170.231.59.19 port 43414
2019-12-09T07:33:32.544185host3.slimhost.com.ua sshd[4097527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.231.59.19
2019-12-09T07:33:32.537339host3.slimhost.com.ua sshd[4097527]: Invalid user server from 170.231.59.19 port 43414
2019-12-09T07:33:34.420812host3.slimhost.com.ua sshd[4097527]: Failed password for 
...
2019-12-09 14:58:17
195.154.33.66 attack
Dec  9 13:35:09 webhost01 sshd[28585]: Failed password for root from 195.154.33.66 port 33933 ssh2
Dec  9 13:40:17 webhost01 sshd[28706]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.33.66
...
2019-12-09 14:44:03
176.31.250.160 attackspam
Dec  9 06:41:53 wh01 sshd[29215]: Failed password for invalid user mysql from 176.31.250.160 port 54446 ssh2
Dec  9 06:41:53 wh01 sshd[29215]: Received disconnect from 176.31.250.160 port 54446:11: Bye Bye [preauth]
Dec  9 06:41:53 wh01 sshd[29215]: Disconnected from 176.31.250.160 port 54446 [preauth]
Dec  9 06:51:44 wh01 sshd[30211]: Invalid user jzapata from 176.31.250.160 port 43986
Dec  9 06:51:44 wh01 sshd[30211]: Failed password for invalid user jzapata from 176.31.250.160 port 43986 ssh2
Dec  9 06:51:44 wh01 sshd[30211]: Received disconnect from 176.31.250.160 port 43986:11: Bye Bye [preauth]
Dec  9 06:51:44 wh01 sshd[30211]: Disconnected from 176.31.250.160 port 43986 [preauth]
Dec  9 07:12:36 wh01 sshd[32249]: Invalid user apache from 176.31.250.160 port 42002
Dec  9 07:12:36 wh01 sshd[32249]: Failed password for invalid user apache from 176.31.250.160 port 42002 ssh2
Dec  9 07:12:36 wh01 sshd[32249]: Received disconnect from 176.31.250.160 port 42002:11: Bye Bye [preauth]
De
2019-12-09 14:26:09
188.166.145.179 attackbots
Dec  9 07:11:55 meumeu sshd[28459]: Failed password for gdm from 188.166.145.179 port 46352 ssh2
Dec  9 07:17:03 meumeu sshd[29123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.145.179 
Dec  9 07:17:06 meumeu sshd[29123]: Failed password for invalid user accounts from 188.166.145.179 port 55430 ssh2
...
2019-12-09 14:27:49
222.186.173.142 attackbots
Dec  9 03:50:34 firewall sshd[10106]: Failed password for root from 222.186.173.142 port 42142 ssh2
Dec  9 03:50:38 firewall sshd[10106]: Failed password for root from 222.186.173.142 port 42142 ssh2
Dec  9 03:50:41 firewall sshd[10106]: Failed password for root from 222.186.173.142 port 42142 ssh2
...
2019-12-09 14:55:10
183.196.90.14 attackbotsspam
Dec  6 23:07:09 mail sshd[2167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.196.90.14 
Dec  6 23:07:11 mail sshd[2167]: Failed password for invalid user ssen from 183.196.90.14 port 49354 ssh2
Dec  6 23:13:39 mail sshd[3898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.196.90.14
2019-12-09 14:45:00

最近上报的IP列表

5.37.67.26 47.76.33.129 1.174.245.222 54.224.48.203
56.104.44.60 65.219.27.116 118.41.192.166 195.145.106.195
5.37.238.55 81.237.168.75 5.36.234.131 181.223.142.170
93.89.199.184 115.110.119.96 94.241.52.191 5.249.26.63
107.41.255.25 194.51.108.97 66.84.126.168 5.196.63.62