必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.50.84.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55628
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.50.84.193.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031303 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 07:38:00 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 193.84.50.142.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 142.50.84.193.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
140.143.67.243 attackspam
Port scan detected on ports: 1433[TCP], 1433[TCP], 65529[TCP]
2019-12-21 07:30:10
50.62.176.151 attackspam
Sat Dec 21 00:58:59 2019 \[pid 14527\] \[2018\] FTP response: Client "50.62.176.151", "530 Permission denied."
Sat Dec 21 00:59:02 2019 \[pid 14537\] \[dators\] FTP response: Client "50.62.176.151", "530 Permission denied."
Sat Dec 21 00:59:05 2019 \[pid 14551\] \[hosting\] FTP response: Client "50.62.176.151", "530 Permission denied."
2019-12-21 07:14:40
49.235.36.51 attack
Dec 21 00:09:33 markkoudstaal sshd[12040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.36.51
Dec 21 00:09:35 markkoudstaal sshd[12040]: Failed password for invalid user test from 49.235.36.51 port 50434 ssh2
Dec 21 00:14:50 markkoudstaal sshd[12591]: Failed password for root from 49.235.36.51 port 44728 ssh2
2019-12-21 07:14:56
189.153.108.171 attackbotsspam
1576882688 - 12/20/2019 23:58:08 Host: 189.153.108.171/189.153.108.171 Port: 445 TCP Blocked
2019-12-21 07:28:27
221.0.232.118 attackspambots
Bruteforce on smtp
2019-12-21 07:23:40
194.67.197.109 attackbots
Dec 20 23:08:20 web8 sshd\[29295\]: Invalid user sonnenberg from 194.67.197.109
Dec 20 23:08:20 web8 sshd\[29295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.67.197.109
Dec 20 23:08:22 web8 sshd\[29295\]: Failed password for invalid user sonnenberg from 194.67.197.109 port 55650 ssh2
Dec 20 23:13:26 web8 sshd\[31863\]: Invalid user plesse from 194.67.197.109
Dec 20 23:13:26 web8 sshd\[31863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.67.197.109
2019-12-21 07:25:26
165.231.33.66 attackspam
Dec 21 00:13:12 OPSO sshd\[21534\]: Invalid user czes from 165.231.33.66 port 33810
Dec 21 00:13:12 OPSO sshd\[21534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.231.33.66
Dec 21 00:13:14 OPSO sshd\[21534\]: Failed password for invalid user czes from 165.231.33.66 port 33810 ssh2
Dec 21 00:18:15 OPSO sshd\[22552\]: Invalid user sebens from 165.231.33.66 port 38648
Dec 21 00:18:15 OPSO sshd\[22552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.231.33.66
2019-12-21 07:28:52
14.186.177.155 attackspam
Attempts against SMTP/SSMTP
2019-12-21 07:22:32
58.33.11.82 attackbots
Dec 21 00:09:16 eventyay sshd[11652]: Failed password for root from 58.33.11.82 port 57434 ssh2
Dec 21 00:14:52 eventyay sshd[11903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.33.11.82
Dec 21 00:14:54 eventyay sshd[11903]: Failed password for invalid user server from 58.33.11.82 port 60058 ssh2
...
2019-12-21 07:26:28
221.178.157.244 attack
Dec 21 00:15:28 eventyay sshd[11943]: Failed password for root from 221.178.157.244 port 4769 ssh2
Dec 21 00:22:24 eventyay sshd[12271]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.178.157.244
Dec 21 00:22:27 eventyay sshd[12271]: Failed password for invalid user policand from 221.178.157.244 port 15809 ssh2
...
2019-12-21 07:31:58
173.249.53.95 attackspambots
Automatic report - SSH Brute-Force Attack
2019-12-21 07:32:17
218.92.0.155 attackspam
SSH Brute Force, server-1 sshd[6067]: Failed password for root from 218.92.0.155 port 17964 ssh2
2019-12-21 07:02:19
193.34.145.203 attackspambots
Brute force VPN server
2019-12-21 07:03:33
181.169.252.31 attackbots
$f2bV_matches
2019-12-21 07:16:41
36.155.102.212 attackbots
Dec 20 23:58:20 vpn01 sshd[16866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.102.212
Dec 20 23:58:21 vpn01 sshd[16866]: Failed password for invalid user gean from 36.155.102.212 port 34344 ssh2
...
2019-12-21 07:17:56

最近上报的IP列表

22.196.52.163 248.199.131.228 143.40.38.88 233.206.144.60
29.62.127.137 104.220.122.149 156.167.93.80 134.92.92.67
199.178.235.61 85.177.30.220 36.166.69.4 245.59.113.20
54.28.142.165 253.228.86.59 98.237.122.17 167.22.96.250
25.65.24.193 174.170.52.1 227.133.251.176 151.196.69.59