必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.59.222.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55791
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.59.222.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:33:08 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 50.222.59.139.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.222.59.139.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
18.224.213.63 attackbotsspam
Unauthorized connection attempt detected from IP address 18.224.213.63 to port 23
2020-07-11 23:15:05
70.35.198.115 attack
Jul 12 01:09:35 localhost sshd[2415278]: Invalid user wesley2 from 70.35.198.115 port 43968
...
2020-07-11 23:34:37
106.13.86.54 attackbotsspam
2020-07-11T11:59:17.193535abusebot-5.cloudsearch.cf sshd[14934]: Invalid user deployer from 106.13.86.54 port 33910
2020-07-11T11:59:17.199114abusebot-5.cloudsearch.cf sshd[14934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.86.54
2020-07-11T11:59:17.193535abusebot-5.cloudsearch.cf sshd[14934]: Invalid user deployer from 106.13.86.54 port 33910
2020-07-11T11:59:18.529099abusebot-5.cloudsearch.cf sshd[14934]: Failed password for invalid user deployer from 106.13.86.54 port 33910 ssh2
2020-07-11T12:06:11.487327abusebot-5.cloudsearch.cf sshd[15150]: Invalid user www from 106.13.86.54 port 51916
2020-07-11T12:06:11.492976abusebot-5.cloudsearch.cf sshd[15150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.86.54
2020-07-11T12:06:11.487327abusebot-5.cloudsearch.cf sshd[15150]: Invalid user www from 106.13.86.54 port 51916
2020-07-11T12:06:13.660558abusebot-5.cloudsearch.cf sshd[15150]: Failed p
...
2020-07-11 23:24:33
183.134.77.250 attack
Invalid user tiang from 183.134.77.250 port 33404
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.77.250
Invalid user tiang from 183.134.77.250 port 33404
Failed password for invalid user tiang from 183.134.77.250 port 33404 ssh2
Invalid user gambaa from 183.134.77.250 port 58922
2020-07-11 23:51:32
45.230.169.14 attackspambots
Jul 11 15:40:27 meumeu sshd[392206]: Invalid user brittney from 45.230.169.14 port 31310
Jul 11 15:40:27 meumeu sshd[392206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.230.169.14 
Jul 11 15:40:27 meumeu sshd[392206]: Invalid user brittney from 45.230.169.14 port 31310
Jul 11 15:40:29 meumeu sshd[392206]: Failed password for invalid user brittney from 45.230.169.14 port 31310 ssh2
Jul 11 15:42:46 meumeu sshd[392387]: Invalid user daliah from 45.230.169.14 port 41467
Jul 11 15:42:46 meumeu sshd[392387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.230.169.14 
Jul 11 15:42:46 meumeu sshd[392387]: Invalid user daliah from 45.230.169.14 port 41467
Jul 11 15:42:48 meumeu sshd[392387]: Failed password for invalid user daliah from 45.230.169.14 port 41467 ssh2
Jul 11 15:45:08 meumeu sshd[392474]: Invalid user botong from 45.230.169.14 port 58709
...
2020-07-11 23:29:27
61.177.172.128 attack
Jul 11 17:30:52 minden010 sshd[13254]: Failed password for root from 61.177.172.128 port 55802 ssh2
Jul 11 17:31:05 minden010 sshd[13254]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 55802 ssh2 [preauth]
Jul 11 17:31:18 minden010 sshd[13301]: Failed password for root from 61.177.172.128 port 30614 ssh2
...
2020-07-11 23:40:29
175.24.132.108 attack
Unauthorized connection attempt detected from IP address 175.24.132.108 to port 13397
2020-07-11 23:17:32
167.172.121.115 attackspambots
Jul 11 14:22:30 meumeu sshd[387248]: Invalid user oafe from 167.172.121.115 port 51556
Jul 11 14:22:30 meumeu sshd[387248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.121.115 
Jul 11 14:22:30 meumeu sshd[387248]: Invalid user oafe from 167.172.121.115 port 51556
Jul 11 14:22:32 meumeu sshd[387248]: Failed password for invalid user oafe from 167.172.121.115 port 51556 ssh2
Jul 11 14:23:25 meumeu sshd[387267]: Invalid user lch from 167.172.121.115 port 37940
Jul 11 14:23:25 meumeu sshd[387267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.121.115 
Jul 11 14:23:25 meumeu sshd[387267]: Invalid user lch from 167.172.121.115 port 37940
Jul 11 14:23:27 meumeu sshd[387267]: Failed password for invalid user lch from 167.172.121.115 port 37940 ssh2
Jul 11 14:24:26 meumeu sshd[387320]: Invalid user wangzhiyong from 167.172.121.115 port 52558
...
2020-07-11 23:38:40
104.248.134.212 attackbotsspam
Jul 11 16:34:15 ajax sshd[544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.212 
Jul 11 16:34:17 ajax sshd[544]: Failed password for invalid user qmaill from 104.248.134.212 port 55204 ssh2
2020-07-11 23:45:56
194.26.29.33 attack
Jul 11 17:36:03 debian-2gb-nbg1-2 kernel: \[16740346.433131\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.33 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=38633 PROTO=TCP SPT=41185 DPT=1015 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-11 23:50:06
45.7.138.40 attack
Jul 11 16:08:48 debian-2gb-nbg1-2 kernel: \[16735111.903673\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.7.138.40 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=235 ID=10578 PROTO=TCP SPT=43920 DPT=8314 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-11 23:24:56
49.235.135.230 attack
Jul 11 06:32:30 server1 sshd\[22565\]: Failed password for invalid user allyce from 49.235.135.230 port 36016 ssh2
Jul 11 06:36:38 server1 sshd\[5050\]: Invalid user zhuziyu from 49.235.135.230
Jul 11 06:36:38 server1 sshd\[5050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.135.230 
Jul 11 06:36:40 server1 sshd\[5050\]: Failed password for invalid user zhuziyu from 49.235.135.230 port 48520 ssh2
Jul 11 06:40:43 server1 sshd\[28074\]: Invalid user josue from 49.235.135.230
...
2020-07-11 23:29:14
212.95.137.106 attackspambots
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-07-11 23:16:40
51.77.149.232 attack
5x Failed Password
2020-07-11 23:42:18
186.4.188.3 attackspam
Jul 11 17:34:04 abendstille sshd\[8765\]: Invalid user carlos from 186.4.188.3
Jul 11 17:34:04 abendstille sshd\[8765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.188.3
Jul 11 17:34:07 abendstille sshd\[8765\]: Failed password for invalid user carlos from 186.4.188.3 port 50814 ssh2
Jul 11 17:37:46 abendstille sshd\[12246\]: Invalid user gin from 186.4.188.3
Jul 11 17:37:46 abendstille sshd\[12246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.188.3
...
2020-07-11 23:42:43

最近上报的IP列表

54.130.63.123 137.13.245.154 118.215.7.154 108.36.249.50
224.66.102.250 179.54.81.199 122.78.194.133 185.24.139.251
49.95.41.196 193.134.163.117 37.187.64.113 215.251.73.15
96.55.179.190 79.6.156.90 248.96.76.210 3.195.138.72
216.159.42.54 187.15.124.37 192.45.76.46 204.123.226.13