必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.166.190.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53078
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.166.190.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 11:59:00 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 50.190.166.144.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 50.190.166.144.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.105.26.111 attack
May 12 01:33:13 meumeu sshd[9633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.105.26.111 
May 12 01:33:15 meumeu sshd[9633]: Failed password for invalid user gmodserver from 51.105.26.111 port 44126 ssh2
May 12 01:37:06 meumeu sshd[10213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.105.26.111 
...
2020-05-12 07:45:43
193.112.5.66 attack
May 12 00:49:48 lock-38 sshd[2264042]: Disconnected from authenticating user root 193.112.5.66 port 42372 [preauth]
May 12 01:03:47 lock-38 sshd[2264489]: Invalid user deploy from 193.112.5.66 port 10899
May 12 01:03:47 lock-38 sshd[2264489]: Invalid user deploy from 193.112.5.66 port 10899
May 12 01:03:47 lock-38 sshd[2264489]: Failed password for invalid user deploy from 193.112.5.66 port 10899 ssh2
May 12 01:03:47 lock-38 sshd[2264489]: Disconnected from invalid user deploy 193.112.5.66 port 10899 [preauth]
...
2020-05-12 07:32:28
114.67.106.137 attackspam
Invalid user ykim from 114.67.106.137 port 49184
2020-05-12 07:28:01
185.143.223.244 attackspambots
Multiport scan 22 ports : 2289(x3) 3383(x4) 3384(x5) 3385(x6) 3386(x6) 3387(x6) 3388(x19) 3390(x27) 3391(x21) 3392(x18) 3393(x19) 3394(x18) 3395(x7) 3396(x7) 3397(x4) 3398(x4) 3399(x3) 4489(x2) 5589(x2) 6689(x2) 7789(x3) 8889(x3)
2020-05-12 07:53:27
112.85.42.232 attack
May 12 01:05:34 home sshd[6936]: Failed password for root from 112.85.42.232 port 35837 ssh2
May 12 01:06:55 home sshd[7115]: Failed password for root from 112.85.42.232 port 15712 ssh2
May 12 01:06:57 home sshd[7115]: Failed password for root from 112.85.42.232 port 15712 ssh2
...
2020-05-12 07:23:58
51.38.134.150 attack
May  5 22:14:40 localhost sshd[126570]: Invalid user fsd from 51.38.134.150 port 60626
May  5 22:14:40 localhost sshd[126570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.134.150 
May  5 22:14:40 localhost sshd[126570]: Invalid user fsd from 51.38.134.150 port 60626
May  5 22:14:42 localhost sshd[126570]: Failed password for invalid user fsd from 51.38.134.150 port 60626 ssh2
May  5 22:28:53 localhost sshd[130112]: Invalid user administrador from 51.38.134.150 port 40212
May  5 22:28:53 localhost sshd[130112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.134.150 
May  5 22:28:53 localhost sshd[130112]: Invalid user administrador from 51.38.134.150 port 40212
May  5 22:28:55 localhost sshd[130112]: Failed password for invalid user administrador from 51.38.134.150 port 40212 ssh2
May  5 22:33:13 localhost sshd[131288]: Invalid user rapa from 51.38.134.150 port 45760


........
-------------------------------------
2020-05-12 07:45:59
129.226.174.114 attackspambots
SSH brute-force attempt
2020-05-12 07:38:11
123.146.23.149 attackspambots
Port probing on unauthorized port 6433
2020-05-12 07:26:13
91.121.145.227 attackbots
SSH Brute Force
2020-05-12 07:43:11
188.166.247.82 attack
bruteforce detected
2020-05-12 07:22:32
195.54.160.121 attack
IP: 195.54.160.121
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS49505 OOO Network of data-centers Selectel
   Russia (RU)
   CIDR 195.54.160.0/23
Log Date: 11/05/2020 11:12:43 PM UTC
2020-05-12 07:51:51
162.243.138.94 attackbots
GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak
2020-05-12 07:55:30
164.132.225.151 attack
SSH Brute Force
2020-05-12 07:54:45
49.234.98.155 attack
SSH Brute Force
2020-05-12 07:46:24
164.132.98.75 attackspam
May 11 23:06:13 pve1 sshd[28850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75 
May 11 23:06:15 pve1 sshd[28850]: Failed password for invalid user orange from 164.132.98.75 port 38741 ssh2
...
2020-05-12 07:35:37

最近上报的IP列表

237.58.94.118 252.78.152.241 49.178.107.105 39.14.114.97
28.70.186.147 154.220.126.234 37.66.77.245 226.174.86.80
249.157.24.236 162.77.74.178 73.35.251.71 5.5.99.81
198.227.104.226 130.212.97.13 251.152.101.245 6.83.120.142
164.203.120.58 33.52.229.100 236.31.197.236 59.158.116.77