必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.95.50.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.95.50.234.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 05:42:07 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 234.50.95.14.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.50.95.14.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.54.160.38 attack
firewall-block, port(s): 3854/tcp, 5632/tcp, 5914/tcp, 8838/tcp, 9925/tcp, 9935/tcp, 10774/tcp, 11485/tcp, 12642/tcp, 14460/tcp, 16000/tcp, 16866/tcp, 16870/tcp, 19964/tcp, 20808/tcp, 21026/tcp, 21034/tcp, 21315/tcp, 21326/tcp, 21358/tcp, 21857/tcp, 21869/tcp, 22046/tcp, 22649/tcp, 22865/tcp, 23285/tcp, 23457/tcp, 24076/tcp, 24161/tcp, 27877/tcp, 28636/tcp, 32128/tcp, 32951/tcp, 36145/tcp, 37032/tcp, 38021/tcp, 38186/tcp, 38241/tcp, 39167/tcp, 39221/tcp, 39677/tcp, 39836/tcp, 42314/tcp, 42425/tcp, 43804/tcp, 45450/tcp, 45712/tcp, 46142/tcp, 46285/tcp, 46289/tcp, 46602/tcp, 47126/tcp, 47130/tcp, 51414/tcp, 52572/tcp, 52609/tcp, 53379/tcp, 53391/tcp, 54138/tcp, 55175/tcp, 55183/tcp, 55199/tcp, 55785/tcp, 58471/tcp, 58479/tcp, 58666/tcp, 59505/tcp, 61241/tcp, 64374/tcp
2020-08-11 04:30:35
115.118.241.170 attackbotsspam
Unauthorized connection attempt from IP address 115.118.241.170 on Port 445(SMB)
2020-08-11 04:20:12
112.133.251.240 attackbots
Unauthorized connection attempt from IP address 112.133.251.240 on Port 445(SMB)
2020-08-11 04:09:15
199.43.204.170 attackbots
20/8/10@08:00:52: FAIL: Alarm-Network address from=199.43.204.170
...
2020-08-11 03:59:33
210.16.86.180 attack
firewall-block, port(s): 445/tcp
2020-08-11 04:24:44
46.41.101.97 attackspam
Unauthorized connection attempt from IP address 46.41.101.97 on Port 445(SMB)
2020-08-11 04:23:23
195.158.4.210 attackspambots
Brute-force attempt banned
2020-08-11 04:17:00
83.48.29.116 attackbotsspam
SSH brute-force attempt
2020-08-11 04:12:24
77.68.116.37 attackbots
port scan and connect, tcp 80 (http)
2020-08-11 04:17:56
106.39.21.10 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-11 04:02:17
177.129.191.231 attackspam
Port probing on unauthorized port 1433
2020-08-11 04:08:50
45.141.84.219 attackspambots
[H1.VM7] Blocked by UFW
2020-08-11 04:01:33
158.140.181.59 attackspambots
Aug 10 14:00:50 sd-69548 sshd[3229926]: Invalid user admina from 158.140.181.59 port 50814
Aug 10 14:00:50 sd-69548 sshd[3229926]: Connection closed by invalid user admina 158.140.181.59 port 50814 [preauth]
...
2020-08-11 04:02:00
202.142.151.6 attack
Unauthorized connection attempt from IP address 202.142.151.6 on Port 445(SMB)
2020-08-11 04:35:26
51.79.55.141 attack
Tried sshing with brute force.
2020-08-11 04:35:07

最近上报的IP列表

107.192.184.26 238.161.90.82 130.122.216.231 33.166.244.146
48.70.231.15 56.126.36.10 212.175.53.194 91.4.126.255
205.3.191.69 69.104.114.61 143.41.156.217 6.249.208.240
162.162.233.136 211.117.200.78 149.64.139.149 246.79.177.158
222.227.207.237 13.224.105.19 126.38.81.37 9.162.75.60