必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Osaka

省份(region): Osaka

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '150.0.0.0 - 150.255.255.255'

% Abuse contact for '150.0.0.0 - 150.255.255.255' is 'helpdesk@apnic.net'

inetnum:        150.0.0.0 - 150.255.255.255
netname:        ERX-NETBLOCK
descr:          Early registration addresses
remarks:        ------------------------------------------------------
remarks:        Important:
remarks:
remarks:        Networks in this range were allocated by InterNIC
remarks:        prior to the formation of Regional Internet
remarks:        Registries (RIRs): AfriNIC, APNIC, ARIN, LACNIC and RIPE NCC.
remarks:
remarks:        Address ranges from this historical space have now
remarks:        been transferred to the appropriate RIR database.remarks:
remarks:        If your search has returned this record, it means the
remarks:        address range is not administered by APNIC.
remarks:
remarks:        Instead, please search one of the following databases:
remarks:
remarks:        - AfriNIC (Africa)
remarks:        website: http://www.afrinic.net/
remarks:        command line: whois.afrinic.net
remarks:
remarks:        - ARIN (Northern America)
remarks:        website: http://www.arin.net/
remarks:        command line: whois.arin.net
remarks:
remarks:        - LACNIC (Latin America and the Carribean)
remarks:        website: http://www.lacnic.net/
remarks:        command line: whois.lacnic.net
remarks:
remarks:        - RIPE NCC (Europe)
remarks:        website: http://www.ripe.net/
remarks:        command line: whois.ripe.net
remarks:
remarks:        For information on the Early Registration Transfer
remarks:        (ERX) project, see:
remarks:
remarks:        http://www.apnic.net/db/erx
remarks:
remarks:        ------------------------------------------------------
country:        AU
admin-c:        IANA1-AP
tech-c:         IANA1-AP
mnt-by:         APNIC-HM
mnt-lower:      APNIC-HM
status:         ALLOCATED PORTABLE
last-modified:  2015-08-28T00:31:15Z
source:         APNIC
mnt-irt:        IRT-APNIC-AP

irt:            IRT-APNIC-AP
address:        Brisbane, Australia
e-mail:         helpdesk@apnic.net
abuse-mailbox:  helpdesk@apnic.net
admin-c:        HM20-AP
tech-c:         NO4-AP
remarks:        APNIC is a Regional Internet Registry.
remarks:        We do not operate the referring network and
remarks:        are unable to investigate complaints of network abuse.
remarks:        For information about IRT, see www.apnic.net/irt
remarks:        helpdesk@apnic.net was validated on 2020-02-03
auth:           # Filtered
mnt-by:         APNIC-HM
last-modified:  2025-11-18T00:26:21Z
source:         APNIC

role:           Internet Assigned Numbers Authority
address:        see http://www.iana.org.
admin-c:        IANA1-AP
tech-c:         IANA1-AP
nic-hdl:        IANA1-AP
remarks:        For more information on IANA services
remarks:        go to IANA web site at http://www.iana.org.
mnt-by:         MAINT-APNIC-AP
last-modified:  2018-06-22T22:34:30Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.230.59.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20251
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.230.59.62.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012902 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 30 12:20:08 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 62.59.230.150.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 62.59.230.150.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
60.176.39.83 attackspam
Lines containing failures of 60.176.39.83
Sep 12 07:30:07 hvs sshd[32388]: error: maximum authentication attempts exceeded for r.r from 60.176.39.83 port 35354 ssh2 [preauth]
Sep 12 07:30:07 hvs sshd[32388]: Disconnecting authenticating user r.r 60.176.39.83 port 35354: Too many authentication failures [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=60.176.39.83
2019-09-12 15:08:46
134.175.241.163 attackspam
SSH invalid-user multiple login try
2019-09-12 15:05:37
182.61.181.138 attackspambots
2019-09-12T07:31:03.120127abusebot.cloudsearch.cf sshd\[21895\]: Invalid user postgres from 182.61.181.138 port 54566
2019-09-12 15:38:15
52.187.37.188 attackbots
Sep 12 06:56:19 www sshd\[8358\]: Invalid user jenkins from 52.187.37.188
Sep 12 06:56:19 www sshd\[8358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.187.37.188
Sep 12 06:56:20 www sshd\[8358\]: Failed password for invalid user jenkins from 52.187.37.188 port 42746 ssh2
...
2019-09-12 14:45:29
157.230.91.45 attackbots
Sep 11 21:02:31 hpm sshd\[19124\]: Invalid user 123456 from 157.230.91.45
Sep 11 21:02:31 hpm sshd\[19124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45
Sep 11 21:02:33 hpm sshd\[19124\]: Failed password for invalid user 123456 from 157.230.91.45 port 57862 ssh2
Sep 11 21:08:20 hpm sshd\[19656\]: Invalid user sysadmin123 from 157.230.91.45
Sep 11 21:08:20 hpm sshd\[19656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45
2019-09-12 15:20:22
130.61.72.90 attack
Sep 11 20:32:17 web1 sshd\[9177\]: Invalid user odoo from 130.61.72.90
Sep 11 20:32:17 web1 sshd\[9177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.72.90
Sep 11 20:32:19 web1 sshd\[9177\]: Failed password for invalid user odoo from 130.61.72.90 port 59688 ssh2
Sep 11 20:38:19 web1 sshd\[9686\]: Invalid user user from 130.61.72.90
Sep 11 20:38:19 web1 sshd\[9686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.72.90
2019-09-12 14:52:14
40.86.180.19 attack
Sep 12 03:19:15 vps200512 sshd\[26109\]: Invalid user webuser from 40.86.180.19
Sep 12 03:19:15 vps200512 sshd\[26109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.86.180.19
Sep 12 03:19:17 vps200512 sshd\[26109\]: Failed password for invalid user webuser from 40.86.180.19 port 4608 ssh2
Sep 12 03:25:39 vps200512 sshd\[26283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.86.180.19  user=ubuntu
Sep 12 03:25:41 vps200512 sshd\[26283\]: Failed password for ubuntu from 40.86.180.19 port 4608 ssh2
2019-09-12 15:34:33
117.50.44.215 attack
$f2bV_matches
2019-09-12 15:27:57
103.76.252.6 attack
Sep 12 08:41:25 tuxlinux sshd[49697]: Invalid user admin2 from 103.76.252.6 port 51553
Sep 12 08:41:25 tuxlinux sshd[49697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6 
Sep 12 08:41:25 tuxlinux sshd[49697]: Invalid user admin2 from 103.76.252.6 port 51553
Sep 12 08:41:25 tuxlinux sshd[49697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6 
Sep 12 08:41:25 tuxlinux sshd[49697]: Invalid user admin2 from 103.76.252.6 port 51553
Sep 12 08:41:25 tuxlinux sshd[49697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.76.252.6 
Sep 12 08:41:27 tuxlinux sshd[49697]: Failed password for invalid user admin2 from 103.76.252.6 port 51553 ssh2
...
2019-09-12 14:49:07
46.105.31.249 attack
Sep 12 08:09:56 h2177944 sshd\[18689\]: Invalid user a1b1c3 from 46.105.31.249 port 57316
Sep 12 08:09:56 h2177944 sshd\[18689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.31.249
Sep 12 08:09:58 h2177944 sshd\[18689\]: Failed password for invalid user a1b1c3 from 46.105.31.249 port 57316 ssh2
Sep 12 08:15:26 h2177944 sshd\[18905\]: Invalid user test from 46.105.31.249 port 33058
...
2019-09-12 15:00:40
180.250.76.126 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 03:39:44,413 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.250.76.126)
2019-09-12 15:36:44
190.211.160.253 attackbots
Sep 11 20:31:01 lcdev sshd\[5891\]: Invalid user db2admin from 190.211.160.253
Sep 11 20:31:01 lcdev sshd\[5891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.160.253
Sep 11 20:31:04 lcdev sshd\[5891\]: Failed password for invalid user db2admin from 190.211.160.253 port 54582 ssh2
Sep 11 20:38:55 lcdev sshd\[6581\]: Invalid user user2 from 190.211.160.253
Sep 11 20:38:55 lcdev sshd\[6581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.211.160.253
2019-09-12 14:56:33
139.59.98.76 attackspambots
Sep 12 08:44:31 apollo sshd\[7790\]: Invalid user git from 139.59.98.76Sep 12 08:44:34 apollo sshd\[7790\]: Failed password for invalid user git from 139.59.98.76 port 50658 ssh2Sep 12 08:57:38 apollo sshd\[7850\]: Invalid user teamspeak from 139.59.98.76
...
2019-09-12 15:37:21
193.77.155.50 attack
Sep 11 21:17:20 lcprod sshd\[10327\]: Invalid user user9 from 193.77.155.50
Sep 11 21:17:20 lcprod sshd\[10327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bsn-77-155-50.static.siol.net
Sep 11 21:17:22 lcprod sshd\[10327\]: Failed password for invalid user user9 from 193.77.155.50 port 34742 ssh2
Sep 11 21:23:41 lcprod sshd\[10921\]: Invalid user 123 from 193.77.155.50
Sep 11 21:23:41 lcprod sshd\[10921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=bsn-77-155-50.static.siol.net
2019-09-12 15:28:36
196.216.206.2 attackbotsspam
Sep 12 09:23:30 SilenceServices sshd[16661]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.216.206.2
Sep 12 09:23:32 SilenceServices sshd[16661]: Failed password for invalid user deploy from 196.216.206.2 port 43416 ssh2
Sep 12 09:29:25 SilenceServices sshd[18795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.216.206.2
2019-09-12 15:35:13

最近上报的IP列表

112.49.161.15 47.252.34.1 20.169.80.121 188.166.174.151
159.65.40.220 68.183.230.58 66.228.53.174 72.31.127.180
14.22.74.62 134.122.194.161 156.245.124.172 40.124.173.6
134.122.194.131 45.194.92.17 165.227.116.84 34.76.139.101
64.225.10.249 211.149.206.83 167.99.48.101 142.171.149.137