必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.50.250.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43479
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.50.250.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031100 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 11 15:33:04 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 119.250.50.148.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.250.50.148.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.101.1.198 attackspam
2019-08-17T03:45:16.609934abusebot-2.cloudsearch.cf sshd\[7342\]: Invalid user test from 46.101.1.198 port 43974
2019-08-17 12:04:44
211.54.40.81 attackbotsspam
Aug 17 04:36:50 debian sshd\[4967\]: Invalid user zabbix from 211.54.40.81 port 38423
Aug 17 04:36:50 debian sshd\[4967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.54.40.81
...
2019-08-17 11:54:11
167.99.75.174 attackbots
Aug 17 05:33:27 jane sshd\[9751\]: Invalid user ftpuser from 167.99.75.174 port 38292
Aug 17 05:33:27 jane sshd\[9751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.75.174
Aug 17 05:33:30 jane sshd\[9751\]: Failed password for invalid user ftpuser from 167.99.75.174 port 38292 ssh2
...
2019-08-17 11:45:13
51.68.174.248 attackspambots
Aug 16 22:41:43 xtremcommunity sshd\[13297\]: Invalid user othello from 51.68.174.248 port 47088
Aug 16 22:41:43 xtremcommunity sshd\[13297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.174.248
Aug 16 22:41:45 xtremcommunity sshd\[13297\]: Failed password for invalid user othello from 51.68.174.248 port 47088 ssh2
Aug 16 22:45:58 xtremcommunity sshd\[13446\]: Invalid user pentaho from 51.68.174.248 port 37938
Aug 16 22:45:58 xtremcommunity sshd\[13446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.174.248
...
2019-08-17 12:07:27
111.67.205.202 attack
Automatic report - Banned IP Access
2019-08-17 12:03:00
181.198.35.108 attackbotsspam
Invalid user user1 from 181.198.35.108 port 51142
2019-08-17 12:00:56
145.239.57.37 attack
Aug 17 06:10:18 SilenceServices sshd[26185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.57.37
Aug 17 06:10:20 SilenceServices sshd[26185]: Failed password for invalid user com123 from 145.239.57.37 port 24361 ssh2
Aug 17 06:14:37 SilenceServices sshd[29539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.57.37
2019-08-17 12:19:28
66.70.188.25 attack
Aug 17 03:28:46 *** sshd[27202]: Invalid user oracle4 from 66.70.188.25
2019-08-17 11:42:10
177.103.163.253 attackspam
Unauthorized connection attempt from IP address 177.103.163.253 on Port 445(SMB)
2019-08-17 11:39:43
138.219.176.5 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2019-08-17 11:49:50
106.13.78.56 attack
Aug 17 03:40:48 tuotantolaitos sshd[18431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.78.56
Aug 17 03:40:51 tuotantolaitos sshd[18431]: Failed password for invalid user password123 from 106.13.78.56 port 37126 ssh2
...
2019-08-17 11:55:57
45.55.176.165 attackbotsspam
Aug 16 21:58:52 xeon cyrus/imap[50789]: badlogin: [45.55.176.165] plain [SASL(-13): authentication failure: Password verification failed]
2019-08-17 11:51:48
182.23.42.196 attack
Aug 17 01:33:38 vps691689 sshd[28490]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.23.42.196
Aug 17 01:33:41 vps691689 sshd[28490]: Failed password for invalid user teamspeak from 182.23.42.196 port 48519 ssh2
...
2019-08-17 12:16:41
31.172.80.89 attackspambots
Aug 17 00:22:29 cp sshd[32572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.172.80.89
2019-08-17 12:07:53
40.73.25.111 attackspambots
Automatic report - Banned IP Access
2019-08-17 12:12:42

最近上报的IP列表

232.117.39.188 219.47.155.9 119.203.213.214 28.227.23.154
166.63.156.123 252.102.157.225 27.226.202.23 156.126.166.108
240.151.232.127 186.106.16.217 144.55.91.87 42.33.87.66
67.45.149.140 143.14.111.102 16.156.124.196 82.137.186.35
125.197.195.249 124.212.232.123 210.88.63.3 87.73.15.95