必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.50.49.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34775
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.50.49.212.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121200 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 22:37:37 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
212.49.50.136.in-addr.arpa domain name pointer 136-50-49-212.googlefiber.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.49.50.136.in-addr.arpa	name = 136-50-49-212.googlefiber.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.68.105.55 attack
Invalid user toro from 81.68.105.55 port 41170
2020-09-01 07:04:31
84.215.44.75 attack
Aug 31 21:10:29 gitlab-tf sshd\[31914\]: Invalid user pi from 84.215.44.75Aug 31 21:10:29 gitlab-tf sshd\[31915\]: Invalid user pi from 84.215.44.75
...
2020-09-01 07:30:44
92.86.213.94 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-01 07:13:36
51.83.104.120 attack
Invalid user jds from 51.83.104.120 port 48130
2020-09-01 07:27:37
213.217.1.42 attackbots
Fail2Ban Ban Triggered
2020-09-01 07:29:50
195.54.167.91 attackspambots
Port scan: Attack repeated for 24 hours
2020-09-01 07:33:44
136.243.72.5 attack
Sep  1 01:10:15 relay postfix/smtpd\[17005\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 01:10:15 relay postfix/smtpd\[16594\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 01:10:15 relay postfix/smtpd\[16183\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 01:10:15 relay postfix/smtpd\[16632\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 01:10:15 relay postfix/smtpd\[16528\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 01:10:15 relay postfix/smtpd\[18203\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 01:10:15 relay postfix/smtpd\[17623\]: warning: mon.risse-it.de\[136.243.72.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  1 01:10:15 relay postfix/smtpd\[17588\]: warning: 
...
2020-09-01 07:11:10
153.101.167.242 attack
" "
2020-09-01 07:32:50
46.101.149.23 attackspambots
Aug 31 23:01:01 dev0-dcde-rnet sshd[370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.149.23
Aug 31 23:01:03 dev0-dcde-rnet sshd[370]: Failed password for invalid user admin from 46.101.149.23 port 60882 ssh2
Aug 31 23:15:36 dev0-dcde-rnet sshd[468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.149.23
2020-09-01 07:08:48
139.155.13.93 attackspambots
Sep  1 00:02:53 OPSO sshd\[26243\]: Invalid user tomcat from 139.155.13.93 port 54272
Sep  1 00:02:53 OPSO sshd\[26243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.13.93
Sep  1 00:02:55 OPSO sshd\[26243\]: Failed password for invalid user tomcat from 139.155.13.93 port 54272 ssh2
Sep  1 00:07:53 OPSO sshd\[27204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.13.93  user=root
Sep  1 00:07:55 OPSO sshd\[27204\]: Failed password for root from 139.155.13.93 port 51722 ssh2
2020-09-01 07:24:26
138.68.75.113 attack
invalid user wg from 138.68.75.113 port 59138 ssh2
2020-09-01 07:18:52
192.241.230.206 attack
firewall-block, port(s): 5060/tcp
2020-09-01 07:35:37
139.162.27.225 attackspam
139.162.27.225
2020-09-01 07:22:35
66.198.240.10 attackspambots
xmlrpc attack
2020-09-01 07:23:00
84.52.85.204 attackbotsspam
Aug 31 23:37:22 server sshd[15845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.52.85.204  user=root
Aug 31 23:37:22 server sshd[15845]: User root from 84.52.85.204 not allowed because listed in DenyUsers
Aug 31 23:37:24 server sshd[15845]: Failed password for invalid user root from 84.52.85.204 port 48392 ssh2
Aug 31 23:38:30 server sshd[21374]: User root from 84.52.85.204 not allowed because listed in DenyUsers
Aug 31 23:38:30 server sshd[21374]: User root from 84.52.85.204 not allowed because listed in DenyUsers
...
2020-09-01 07:40:54

最近上报的IP列表

147.230.200.81 107.178.89.246 23.138.203.114 42.2.6.141
188.117.48.220 37.219.253.4 57.66.218.51 172.175.24.123
37.219.250.88 6.164.31.103 104.203.163.78 204.207.248.195
128.214.48.191 237.84.116.185 117.14.251.53 70.110.2.252
172.2.120.139 7.22.245.17 51.45.3.9 156.36.189.65