必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.226.50.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.226.50.21.			IN	A

;; AUTHORITY SECTION:
.			353	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062500 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 17:42:49 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.50.226.137.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.50.226.137.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.174.93.26 attack
11/07/2019-01:27:32.619613 93.174.93.26 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-07 16:59:13
5.15.152.53 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/5.15.152.53/ 
 
 RO - 1H : (26)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RO 
 NAME ASN : ASN8708 
 
 IP : 5.15.152.53 
 
 CIDR : 5.12.0.0/14 
 
 PREFIX COUNT : 236 
 
 UNIQUE IP COUNT : 2129408 
 
 
 ATTACKS DETECTED ASN8708 :  
  1H - 1 
  3H - 1 
  6H - 5 
 12H - 8 
 24H - 18 
 
 DateTime : 2019-11-07 07:27:39 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 16:52:51
2607:5300:61:404:: attackbots
xmlrpc attack
2019-11-07 17:00:33
14.186.63.131 attackspambots
Nov  7 07:21:58 offspring postfix/smtpd[25388]: warning: hostname static.vnpt.vn does not resolve to address 14.186.63.131
Nov  7 07:21:58 offspring postfix/smtpd[25388]: connect from unknown[14.186.63.131]
Nov  7 07:22:01 offspring postfix/smtpd[25388]: warning: unknown[14.186.63.131]: SASL CRAM-MD5 authentication failed: authentication failure
Nov  7 07:22:01 offspring postfix/smtpd[25388]: warning: unknown[14.186.63.131]: SASL PLAIN authentication failed: authentication failure
Nov  7 07:22:03 offspring postfix/smtpd[25388]: warning: unknown[14.186.63.131]: SASL LOGIN authentication failed: authentication failure
Nov  7 07:22:03 offspring postfix/smtpd[25388]: disconnect from unknown[14.186.63.131]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.186.63.131
2019-11-07 17:05:27
78.128.113.120 attack
Nov  7 08:53:34 heicom postfix/smtpd\[5915\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 08:53:35 heicom postfix/smtpd\[5146\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 08:55:07 heicom postfix/smtpd\[5915\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 08:55:09 heicom postfix/smtpd\[5146\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
Nov  7 09:18:05 heicom postfix/smtpd\[5915\]: warning: unknown\[78.128.113.120\]: SASL PLAIN authentication failed: authentication failure
...
2019-11-07 17:21:28
103.231.70.170 attackbotsspam
Nov  7 03:58:40 TORMINT sshd\[13389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.231.70.170  user=root
Nov  7 03:58:41 TORMINT sshd\[13389\]: Failed password for root from 103.231.70.170 port 47494 ssh2
Nov  7 04:03:30 TORMINT sshd\[13930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.231.70.170  user=root
...
2019-11-07 17:20:31
49.234.25.11 attackspam
Nov  7 02:21:43 srv2 sshd\[16990\]: Invalid user ZXC from 49.234.25.11
Nov  7 02:21:43 srv2 sshd\[16990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.25.11
Nov  7 02:21:46 srv2 sshd\[16990\]: Failed password for invalid user ZXC from 49.234.25.11 port 42930 ssh2
...
2019-11-07 16:58:26
134.209.108.30 attack
Nov  3 10:19:29 foo sshd[23529]: Invalid user Oyster from 134.209.108.30
Nov  3 10:19:29 foo sshd[23529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30 
Nov  3 10:19:32 foo sshd[23529]: Failed password for invalid user Oyster from 134.209.108.30 port 50038 ssh2
Nov  3 10:19:32 foo sshd[23529]: Received disconnect from 134.209.108.30: 11: Bye Bye [preauth]
Nov  3 10:33:06 foo sshd[23752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30  user=r.r
Nov  3 10:33:08 foo sshd[23752]: Failed password for r.r from 134.209.108.30 port 51916 ssh2
Nov  3 10:33:09 foo sshd[23752]: Received disconnect from 134.209.108.30: 11: Bye Bye [preauth]
Nov  3 10:37:28 foo sshd[23916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.108.30  user=r.r
Nov  3 10:37:30 foo sshd[23916]: Failed password for r.r from 134.209.108.30 port 34638 ........
-------------------------------
2019-11-07 16:52:10
114.67.80.161 attackspam
Nov  6 21:34:42 php1 sshd\[7604\]: Invalid user pwd@12345 from 114.67.80.161
Nov  6 21:34:42 php1 sshd\[7604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.161
Nov  6 21:34:44 php1 sshd\[7604\]: Failed password for invalid user pwd@12345 from 114.67.80.161 port 39367 ssh2
Nov  6 21:38:51 php1 sshd\[8111\]: Invalid user sohu from 114.67.80.161
Nov  6 21:38:51 php1 sshd\[8111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.161
2019-11-07 17:10:28
92.118.38.54 attackspambots
Nov  7 09:49:04 andromeda postfix/smtpd\[7727\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: authentication failure
Nov  7 09:49:05 andromeda postfix/smtpd\[25956\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: authentication failure
Nov  7 09:49:38 andromeda postfix/smtpd\[25954\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: authentication failure
Nov  7 09:49:52 andromeda postfix/smtpd\[25962\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: authentication failure
Nov  7 09:49:53 andromeda postfix/smtpd\[25966\]: warning: unknown\[92.118.38.54\]: SASL LOGIN authentication failed: authentication failure
2019-11-07 16:50:26
189.123.234.183 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/189.123.234.183/ 
 
 BR - 1H : (291)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN28573 
 
 IP : 189.123.234.183 
 
 CIDR : 189.123.192.0/18 
 
 PREFIX COUNT : 1254 
 
 UNIQUE IP COUNT : 9653760 
 
 
 ATTACKS DETECTED ASN28573 :  
  1H - 1 
  3H - 3 
  6H - 7 
 12H - 21 
 24H - 27 
 
 DateTime : 2019-11-07 07:27:15 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-07 17:07:01
92.119.160.107 attackspam
Nov  7 10:09:27 mc1 kernel: \[4404063.607671\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=64428 PROTO=TCP SPT=43393 DPT=53457 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  7 10:09:55 mc1 kernel: \[4404091.803336\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=56430 PROTO=TCP SPT=43393 DPT=53007 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  7 10:15:33 mc1 kernel: \[4404429.581543\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=92.119.160.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=17652 PROTO=TCP SPT=43393 DPT=53265 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-07 17:16:27
103.94.2.154 attackbots
Nov  7 10:48:45 vtv3 sshd\[10454\]: Invalid user 887 from 103.94.2.154 port 50131
Nov  7 10:48:45 vtv3 sshd\[10454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.94.2.154
Nov  7 10:48:48 vtv3 sshd\[10454\]: Failed password for invalid user 887 from 103.94.2.154 port 50131 ssh2
Nov  7 10:54:11 vtv3 sshd\[13884\]: Invalid user provider from 103.94.2.154 port 41682
Nov  7 10:54:11 vtv3 sshd\[13884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.94.2.154
Nov  7 11:04:44 vtv3 sshd\[21009\]: Invalid user monkey from 103.94.2.154 port 53018
Nov  7 11:04:44 vtv3 sshd\[21009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.94.2.154
Nov  7 11:04:46 vtv3 sshd\[21009\]: Failed password for invalid user monkey from 103.94.2.154 port 53018 ssh2
Nov  7 11:09:57 vtv3 sshd\[24487\]: Invalid user HUAWEI@123 from 103.94.2.154 port 44587
Nov  7 11:09:57 vtv3 sshd\[24487\]: pam_unix
2019-11-07 17:05:53
222.186.180.6 attack
Nov  7 09:55:59 MK-Soft-VM5 sshd[22995]: Failed password for root from 222.186.180.6 port 46324 ssh2
Nov  7 09:56:04 MK-Soft-VM5 sshd[22995]: Failed password for root from 222.186.180.6 port 46324 ssh2
...
2019-11-07 16:56:24
89.216.109.9 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-07 17:09:47

最近上报的IP列表

169.229.138.82 187.140.164.6 88.106.149.190 83.244.28.128
78.18.111.33 179.60.149.21 47.39.129.80 189.143.72.217
137.226.50.29 137.226.50.163 137.226.50.160 137.226.50.199
137.226.51.78 137.226.51.38 137.226.51.139 137.226.51.200
137.226.52.67 137.226.52.94 137.226.52.176 137.226.52.238