必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Hungary

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.12.94.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.12.94.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 16:10:33 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
50.94.12.149.in-addr.arpa domain name pointer 50.94.12.149.in-addr.arpa.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.94.12.149.in-addr.arpa	name = 50.94.12.149.in-addr.arpa.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.64.67.116 attackspambots
Dec  2 04:52:27 zeus sshd[11742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.67.116 
Dec  2 04:52:29 zeus sshd[11742]: Failed password for invalid user cassiana from 212.64.67.116 port 58514 ssh2
Dec  2 04:58:50 zeus sshd[11888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.67.116 
Dec  2 04:58:52 zeus sshd[11888]: Failed password for invalid user sanz from 212.64.67.116 port 39104 ssh2
2019-12-02 13:19:29
179.232.1.252 attack
Dec  1 18:50:53 auw2 sshd\[10059\]: Invalid user ec2-user from 179.232.1.252
Dec  1 18:50:53 auw2 sshd\[10059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.252
Dec  1 18:50:54 auw2 sshd\[10059\]: Failed password for invalid user ec2-user from 179.232.1.252 port 48102 ssh2
Dec  1 18:58:38 auw2 sshd\[10818\]: Invalid user guest from 179.232.1.252
Dec  1 18:58:38 auw2 sshd\[10818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.232.1.252
2019-12-02 13:29:07
51.255.197.164 attack
Dec  2 00:39:08 plusreed sshd[17837]: Invalid user gonzo from 51.255.197.164
...
2019-12-02 13:44:16
218.94.136.90 attackbotsspam
Dec  2 06:38:59 * sshd[11298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.94.136.90
Dec  2 06:39:01 * sshd[11298]: Failed password for invalid user sistema from 218.94.136.90 port 56796 ssh2
2019-12-02 13:51:56
27.128.162.98 attackspambots
Dec  2 05:52:02 tux-35-217 sshd\[27535\]: Invalid user finite from 27.128.162.98 port 53122
Dec  2 05:52:02 tux-35-217 sshd\[27535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.162.98
Dec  2 05:52:04 tux-35-217 sshd\[27535\]: Failed password for invalid user finite from 27.128.162.98 port 53122 ssh2
Dec  2 05:58:49 tux-35-217 sshd\[27597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.162.98  user=root
...
2019-12-02 13:22:13
140.246.32.143 attack
Dec  2 06:31:12 vps647732 sshd[11935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.32.143
Dec  2 06:31:14 vps647732 sshd[11935]: Failed password for invalid user pagsisihan from 140.246.32.143 port 43874 ssh2
...
2019-12-02 13:33:43
20.36.23.221 attackspam
Dec  2 07:18:25 sauna sshd[173783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.36.23.221
Dec  2 07:18:28 sauna sshd[173783]: Failed password for invalid user clennito from 20.36.23.221 port 2048 ssh2
...
2019-12-02 13:21:02
186.31.37.203 attack
Dec  2 05:10:07 game-panel sshd[16239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.37.203
Dec  2 05:10:09 game-panel sshd[16239]: Failed password for invalid user rpc from 186.31.37.203 port 44778 ssh2
Dec  2 05:16:55 game-panel sshd[16501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.31.37.203
2019-12-02 13:32:27
3.95.38.46 attackspam
Dec  1 19:36:52 eddieflores sshd\[21967\]: Invalid user flater from 3.95.38.46
Dec  1 19:36:52 eddieflores sshd\[21967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-95-38-46.compute-1.amazonaws.com
Dec  1 19:36:54 eddieflores sshd\[21967\]: Failed password for invalid user flater from 3.95.38.46 port 60444 ssh2
Dec  1 19:42:14 eddieflores sshd\[22583\]: Invalid user tay from 3.95.38.46
Dec  1 19:42:14 eddieflores sshd\[22583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-3-95-38-46.compute-1.amazonaws.com
2019-12-02 13:44:36
222.184.233.222 attackspam
Dec  2 06:32:56 dev0-dcde-rnet sshd[11154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.184.233.222
Dec  2 06:32:58 dev0-dcde-rnet sshd[11154]: Failed password for invalid user leonmfs from 222.184.233.222 port 44134 ssh2
Dec  2 06:39:21 dev0-dcde-rnet sshd[11291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.184.233.222
2019-12-02 13:51:32
182.61.27.149 attackspambots
Dec  2 05:51:12 MainVPS sshd[31295]: Invalid user frits from 182.61.27.149 port 56154
Dec  2 05:51:12 MainVPS sshd[31295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.27.149
Dec  2 05:51:12 MainVPS sshd[31295]: Invalid user frits from 182.61.27.149 port 56154
Dec  2 05:51:14 MainVPS sshd[31295]: Failed password for invalid user frits from 182.61.27.149 port 56154 ssh2
Dec  2 05:58:51 MainVPS sshd[12971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.27.149  user=root
Dec  2 05:58:53 MainVPS sshd[12971]: Failed password for root from 182.61.27.149 port 38522 ssh2
...
2019-12-02 13:19:44
190.34.184.214 attackspam
SSH Bruteforce attempt
2019-12-02 13:28:20
113.28.150.75 attack
Dec  2 05:58:50 MK-Soft-Root1 sshd[8788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.28.150.75 
Dec  2 05:58:51 MK-Soft-Root1 sshd[8788]: Failed password for invalid user webadmin from 113.28.150.75 port 3969 ssh2
...
2019-12-02 13:20:46
218.92.0.212 attackbotsspam
Dec  2 06:35:53 MainVPS sshd[14919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Dec  2 06:35:54 MainVPS sshd[14919]: Failed password for root from 218.92.0.212 port 1677 ssh2
Dec  2 06:36:04 MainVPS sshd[14919]: Failed password for root from 218.92.0.212 port 1677 ssh2
Dec  2 06:35:53 MainVPS sshd[14919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Dec  2 06:35:54 MainVPS sshd[14919]: Failed password for root from 218.92.0.212 port 1677 ssh2
Dec  2 06:36:04 MainVPS sshd[14919]: Failed password for root from 218.92.0.212 port 1677 ssh2
Dec  2 06:35:53 MainVPS sshd[14919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Dec  2 06:35:54 MainVPS sshd[14919]: Failed password for root from 218.92.0.212 port 1677 ssh2
Dec  2 06:36:04 MainVPS sshd[14919]: Failed password for root from 218.92.0.212 port 1677 ssh2
Dec  2
2019-12-02 13:37:47
149.202.56.194 attackbots
Dec  1 19:09:46 php1 sshd\[19519\]: Invalid user sequence1234 from 149.202.56.194
Dec  1 19:09:46 php1 sshd\[19519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.ip-149-202-56.eu
Dec  1 19:09:48 php1 sshd\[19519\]: Failed password for invalid user sequence1234 from 149.202.56.194 port 41562 ssh2
Dec  1 19:15:22 php1 sshd\[20364\]: Invalid user bjar from 149.202.56.194
Dec  1 19:15:22 php1 sshd\[20364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.ip-149-202-56.eu
2019-12-02 13:23:10

最近上报的IP列表

231.106.247.75 253.245.136.237 135.104.133.183 164.187.129.197
212.63.84.188 17.218.3.67 230.239.142.145 165.167.51.104
103.163.50.132 232.179.88.22 250.225.84.85 230.204.117.34
61.222.56.5 77.184.31.158 218.75.160.237 140.1.221.21
165.117.175.149 226.89.149.253 57.231.35.0 143.36.177.193