必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.13.50.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.13.50.218.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 03:05:39 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 218.50.13.161.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 218.50.13.161.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.7.239.117 attack
Oct 10 05:51:58 php1 sshd\[29994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pd907ef75.dip0.t-ipconnect.de  user=root
Oct 10 05:52:01 php1 sshd\[29994\]: Failed password for root from 217.7.239.117 port 17764 ssh2
Oct 10 05:57:02 php1 sshd\[30537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pd907ef75.dip0.t-ipconnect.de  user=root
Oct 10 05:57:05 php1 sshd\[30537\]: Failed password for root from 217.7.239.117 port 58369 ssh2
Oct 10 06:01:46 php1 sshd\[31118\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=pd907ef75.dip0.t-ipconnect.de  user=root
2019-10-11 04:04:54
202.73.9.76 attackbots
$f2bV_matches
2019-10-11 04:12:41
42.112.27.171 attack
Oct 10 15:50:22 *** sshd[18867]: User root from 42.112.27.171 not allowed because not listed in AllowUsers
2019-10-11 03:49:49
80.211.41.73 attackspambots
Oct 10 19:21:30 reporting1 sshd[32459]: reveeclipse mapping checking getaddrinfo for host73-41-211-80.serverdedicati.aruba.hostname [80.211.41.73] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 10 19:21:30 reporting1 sshd[32459]: User r.r from 80.211.41.73 not allowed because not listed in AllowUsers
Oct 10 19:21:30 reporting1 sshd[32459]: Failed password for invalid user r.r from 80.211.41.73 port 53294 ssh2
Oct 10 19:30:56 reporting1 sshd[6109]: reveeclipse mapping checking getaddrinfo for host73-41-211-80.serverdedicati.aruba.hostname [80.211.41.73] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 10 19:30:56 reporting1 sshd[6109]: User r.r from 80.211.41.73 not allowed because not listed in AllowUsers
Oct 10 19:30:56 reporting1 sshd[6109]: Failed password for invalid user r.r from 80.211.41.73 port 49954 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=80.211.41.73
2019-10-11 03:44:14
51.89.169.100 attackbotsspam
Oct 10 13:45:19 mail postfix/smtpd[14353]: warning: ip100.ip-51-89-169.eu[51.89.169.100]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 10 13:45:25 mail postfix/smtpd[31250]: warning: ip100.ip-51-89-169.eu[51.89.169.100]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 10 13:45:35 mail postfix/smtpd[31249]: warning: ip100.ip-51-89-169.eu[51.89.169.100]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-11 04:07:18
124.40.250.58 attackbots
Unauthorized access detected from banned ip
2019-10-11 04:05:11
120.244.109.58 attack
Oct  8 15:25:04 *** sshd[20719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.244.109.58  user=r.r
Oct  8 15:25:06 *** sshd[20719]: Failed password for r.r from 120.244.109.58 port 10503 ssh2
Oct  8 15:25:06 *** sshd[20719]: Received disconnect from 120.244.109.58: 11: Bye Bye [preauth]
Oct  8 15:33:39 *** sshd[21990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.244.109.58  user=r.r
Oct  8 15:33:41 *** sshd[21990]: Failed password for r.r from 120.244.109.58 port 10627 ssh2
Oct  8 15:33:41 *** sshd[21990]: Received disconnect from 120.244.109.58: 11: Bye Bye [preauth]
Oct  8 15:53:45 *** sshd[24609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.244.109.58  user=r.r
Oct  8 15:53:46 *** sshd[24609]: Failed password for r.r from 120.244.109.58 port 10522 ssh2
Oct  8 15:53:47 *** sshd[24609]: Received disconnect from 120.244.109.58: 1........
-------------------------------
2019-10-11 03:49:09
5.57.33.71 attackbotsspam
Oct 10 11:50:45 xtremcommunity sshd\[378387\]: Invalid user Angela@123 from 5.57.33.71 port 9453
Oct 10 11:50:45 xtremcommunity sshd\[378387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.57.33.71
Oct 10 11:50:48 xtremcommunity sshd\[378387\]: Failed password for invalid user Angela@123 from 5.57.33.71 port 9453 ssh2
Oct 10 11:54:18 xtremcommunity sshd\[378461\]: Invalid user Lyon!23 from 5.57.33.71 port 25458
Oct 10 11:54:18 xtremcommunity sshd\[378461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.57.33.71
...
2019-10-11 04:03:19
117.50.17.253 attackbots
Oct 10 18:06:45 MK-Soft-VM4 sshd[31214]: Failed password for root from 117.50.17.253 port 40044 ssh2
...
2019-10-11 03:42:35
221.207.156.189 attackspam
Unauthorised access (Oct 10) SRC=221.207.156.189 LEN=40 TTL=49 ID=26738 TCP DPT=8080 WINDOW=57311 SYN 
Unauthorised access (Oct 10) SRC=221.207.156.189 LEN=40 TTL=49 ID=59471 TCP DPT=8080 WINDOW=7099 SYN 
Unauthorised access (Oct 10) SRC=221.207.156.189 LEN=40 TTL=49 ID=34277 TCP DPT=8080 WINDOW=10859 SYN 
Unauthorised access (Oct  9) SRC=221.207.156.189 LEN=40 TTL=49 ID=21411 TCP DPT=8080 WINDOW=10859 SYN 
Unauthorised access (Oct  9) SRC=221.207.156.189 LEN=40 TTL=49 ID=58534 TCP DPT=8080 WINDOW=31615 SYN 
Unauthorised access (Oct  9) SRC=221.207.156.189 LEN=40 TTL=49 ID=43631 TCP DPT=8080 WINDOW=31615 SYN 
Unauthorised access (Oct  8) SRC=221.207.156.189 LEN=40 TTL=49 ID=16996 TCP DPT=8080 WINDOW=7099 SYN
2019-10-11 04:15:41
1.55.17.162 attackspam
2019-10-10T19:44:37.928450abusebot-4.cloudsearch.cf sshd\[5094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.55.17.162  user=root
2019-10-11 03:50:57
106.54.213.28 attack
Oct 10 05:40:14 hanapaa sshd\[26008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.213.28  user=root
Oct 10 05:40:16 hanapaa sshd\[26008\]: Failed password for root from 106.54.213.28 port 50518 ssh2
Oct 10 05:45:19 hanapaa sshd\[26385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.213.28  user=root
Oct 10 05:45:21 hanapaa sshd\[26385\]: Failed password for root from 106.54.213.28 port 55536 ssh2
Oct 10 05:50:03 hanapaa sshd\[26761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.213.28  user=root
2019-10-11 03:52:02
185.58.53.66 attackspam
Oct 10 16:29:58 arianus sshd\[28857\]: Unable to negotiate with 185.58.53.66 port 33572: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 \[preauth\]
...
2019-10-11 03:52:16
132.232.30.87 attackspam
Oct 10 08:30:58 php1 sshd\[21607\]: Invalid user Hugo-123 from 132.232.30.87
Oct 10 08:30:58 php1 sshd\[21607\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.30.87
Oct 10 08:31:00 php1 sshd\[21607\]: Failed password for invalid user Hugo-123 from 132.232.30.87 port 55042 ssh2
Oct 10 08:36:18 php1 sshd\[22601\]: Invalid user Profond from 132.232.30.87
Oct 10 08:36:18 php1 sshd\[22601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.30.87
2019-10-11 03:57:58
192.42.116.16 attackbotsspam
2019-10-10T19:31:48.617243abusebot.cloudsearch.cf sshd\[25441\]: Invalid user test from 192.42.116.16 port 38366
2019-10-11 03:42:06

最近上报的IP列表

122.2.199.79 139.156.126.209 133.241.27.69 152.171.118.250
86.236.136.225 192.160.112.72 119.104.115.177 132.179.36.22
134.211.118.70 98.87.91.130 31.128.46.94 135.197.31.217
56.248.88.196 2.197.201.181 254.171.171.109 12.77.177.47
219.242.37.172 58.206.117.41 152.9.194.225 199.143.4.162