必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea (the Republic of)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.52.192.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55430
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.52.192.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 10:52:23 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 50.192.52.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.192.52.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
93.114.185.56 attack
proto=tcp  .  spt=36978  .  dpt=25  .     Found on   Blocklist de       (687)
2020-03-28 09:09:20
136.244.81.65 attackbots
WordPress brute force
2020-03-28 08:58:25
83.86.116.157 attack
Scanned 3 times in the last 24 hours on port 22
2020-03-28 09:13:34
46.101.232.76 attackspambots
Mar 25 19:22:14 plesk sshd[9280]: Invalid user ryanne from 46.101.232.76
Mar 25 19:22:14 plesk sshd[9280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.232.76 
Mar 25 19:22:15 plesk sshd[9280]: Failed password for invalid user ryanne from 46.101.232.76 port 32769 ssh2
Mar 25 19:22:15 plesk sshd[9280]: Received disconnect from 46.101.232.76: 11: Bye Bye [preauth]
Mar 25 19:31:17 plesk sshd[9555]: Invalid user pz from 46.101.232.76
Mar 25 19:31:17 plesk sshd[9555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.232.76 
Mar 25 19:31:19 plesk sshd[9555]: Failed password for invalid user pz from 46.101.232.76 port 48872 ssh2
Mar 25 19:31:19 plesk sshd[9555]: Received disconnect from 46.101.232.76: 11: Bye Bye [preauth]
Mar 25 19:36:05 plesk sshd[9687]: Invalid user wnews from 46.101.232.76
Mar 25 19:36:05 plesk sshd[9687]: pam_unix(sshd:auth): authentication failure; logname= ui........
-------------------------------
2020-03-28 09:21:42
194.152.206.93 attackbotsspam
2020-03-27T23:28:09.669823abusebot-4.cloudsearch.cf sshd[4679]: Invalid user emb from 194.152.206.93 port 45078
2020-03-27T23:28:09.678556abusebot-4.cloudsearch.cf sshd[4679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93
2020-03-27T23:28:09.669823abusebot-4.cloudsearch.cf sshd[4679]: Invalid user emb from 194.152.206.93 port 45078
2020-03-27T23:28:11.362971abusebot-4.cloudsearch.cf sshd[4679]: Failed password for invalid user emb from 194.152.206.93 port 45078 ssh2
2020-03-27T23:33:34.856635abusebot-4.cloudsearch.cf sshd[4991]: Invalid user xyi from 194.152.206.93 port 51599
2020-03-27T23:33:34.866599abusebot-4.cloudsearch.cf sshd[4991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.93
2020-03-27T23:33:34.856635abusebot-4.cloudsearch.cf sshd[4991]: Invalid user xyi from 194.152.206.93 port 51599
2020-03-27T23:33:36.836762abusebot-4.cloudsearch.cf sshd[4991]: Failed password f
...
2020-03-28 08:56:05
2.45.112.239 attackbotsspam
Automatic report - Banned IP Access
2020-03-28 08:55:44
92.63.194.25 attack
Mar 27 13:30:38 XXX sshd[58780]: Invalid user Administrator from 92.63.194.25 port 36877
2020-03-28 08:41:35
218.31.112.50 attack
Mar 27 21:15:15 sigma sshd\[8801\]: Invalid user dbartle from 218.31.112.50Mar 27 21:15:18 sigma sshd\[8801\]: Failed password for invalid user dbartle from 218.31.112.50 port 48995 ssh2
...
2020-03-28 08:43:02
223.220.159.78 attackspam
Mar 27 23:01:00 ns392434 sshd[29633]: Invalid user linh from 223.220.159.78 port 11583
Mar 27 23:01:00 ns392434 sshd[29633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78
Mar 27 23:01:00 ns392434 sshd[29633]: Invalid user linh from 223.220.159.78 port 11583
Mar 27 23:01:01 ns392434 sshd[29633]: Failed password for invalid user linh from 223.220.159.78 port 11583 ssh2
Mar 27 23:20:59 ns392434 sshd[1341]: Invalid user jcu from 223.220.159.78 port 39173
Mar 27 23:20:59 ns392434 sshd[1341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.220.159.78
Mar 27 23:20:59 ns392434 sshd[1341]: Invalid user jcu from 223.220.159.78 port 39173
Mar 27 23:21:01 ns392434 sshd[1341]: Failed password for invalid user jcu from 223.220.159.78 port 39173 ssh2
Mar 27 23:26:48 ns392434 sshd[2760]: Invalid user syh from 223.220.159.78 port 33366
2020-03-28 08:59:55
92.63.194.11 attack
Mar 28 02:03:05 srv206 sshd[32501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.11  user=root
Mar 28 02:03:07 srv206 sshd[32501]: Failed password for root from 92.63.194.11 port 45427 ssh2
...
2020-03-28 09:13:09
109.63.176.137 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 27-03-2020 21:15:16.
2020-03-28 08:45:12
204.44.99.109 attackspambots
Mar 28 00:17:33 mail sshd\[27459\]: Invalid user res from 204.44.99.109
Mar 28 00:17:33 mail sshd\[27459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=204.44.99.109
Mar 28 00:17:35 mail sshd\[27459\]: Failed password for invalid user res from 204.44.99.109 port 45898 ssh2
...
2020-03-28 09:08:31
197.253.207.155 attackspam
IP blocked
2020-03-28 09:24:05
51.83.77.154 attackbots
2020-03-28T01:55:35.984246librenms sshd[3525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.ip-51-83-77.eu
2020-03-28T01:55:35.975473librenms sshd[3525]: Invalid user coco from 51.83.77.154 port 51178
2020-03-28T01:55:37.897573librenms sshd[3525]: Failed password for invalid user coco from 51.83.77.154 port 51178 ssh2
...
2020-03-28 09:01:49
93.49.11.206 attackbotsspam
(sshd) Failed SSH login from 93.49.11.206 (IT/Italy/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 28 01:56:55 ubnt-55d23 sshd[20444]: Invalid user fwc from 93.49.11.206 port 53897
Mar 28 01:56:57 ubnt-55d23 sshd[20444]: Failed password for invalid user fwc from 93.49.11.206 port 53897 ssh2
2020-03-28 09:20:32

最近上报的IP列表

61.213.34.179 29.220.166.125 91.40.151.224 15.41.167.40
45.49.85.120 103.46.20.104 55.165.116.46 208.0.190.165
107.125.227.44 18.49.49.161 226.76.243.107 241.90.174.222
203.33.231.132 81.229.54.79 29.94.52.151 212.63.26.192
115.89.11.211 157.43.55.34 68.25.14.62 244.178.132.249