必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.50.107.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42957
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.50.107.147.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 10:17:06 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 147.107.50.161.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.107.50.161.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
82.127.207.128 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2019-06-23/08-20]11pkt,1pt.(tcp)
2019-08-21 18:50:49
206.167.33.17 attackbotsspam
Aug 20 22:09:45 web1 sshd\[11940\]: Invalid user 1qaz2wsx3edc from 206.167.33.17
Aug 20 22:09:45 web1 sshd\[11940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.17
Aug 20 22:09:48 web1 sshd\[11940\]: Failed password for invalid user 1qaz2wsx3edc from 206.167.33.17 port 37562 ssh2
Aug 20 22:16:21 web1 sshd\[12540\]: Invalid user P@ssw0rd from 206.167.33.17
Aug 20 22:16:21 web1 sshd\[12540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.167.33.17
2019-08-21 19:08:29
131.0.8.49 attackspambots
Aug 21 05:39:56 yabzik sshd[9681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.8.49
Aug 21 05:39:58 yabzik sshd[9681]: Failed password for invalid user xys from 131.0.8.49 port 60399 ssh2
Aug 21 05:49:11 yabzik sshd[13028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=131.0.8.49
2019-08-21 19:09:26
106.13.82.49 attack
Aug 21 06:39:15 dedicated sshd[24033]: Invalid user registry from 106.13.82.49 port 50256
2019-08-21 18:59:16
62.215.132.169 attackspam
445/tcp 445/tcp
[2019-07-30/08-20]2pkt
2019-08-21 18:43:58
181.174.83.226 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-08-21 19:08:59
198.108.67.51 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-21 18:39:39
220.134.209.126 attackspam
Aug 21 12:10:33 h2177944 sshd\[22156\]: Invalid user klind from 220.134.209.126 port 17644
Aug 21 12:10:33 h2177944 sshd\[22156\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.209.126
Aug 21 12:10:34 h2177944 sshd\[22156\]: Failed password for invalid user klind from 220.134.209.126 port 17644 ssh2
Aug 21 12:15:09 h2177944 sshd\[22239\]: Invalid user usuario from 220.134.209.126 port 62796
Aug 21 12:15:09 h2177944 sshd\[22239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.209.126
...
2019-08-21 19:01:12
184.105.139.126 attackbotsspam
Splunk® : port scan detected:
Aug 20 23:06:00 testbed kernel: Firewall: *UDP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:64:c3:d6:0b:ef:f0:08:00 SRC=184.105.139.126 DST=104.248.11.191 LEN=42 TOS=0x00 PREC=0x00 TTL=57 ID=21528 DF PROTO=UDP SPT=33352 DPT=69 LEN=22
2019-08-21 19:14:02
200.54.170.198 attackbots
2019-08-21T04:02:46.606222abusebot-2.cloudsearch.cf sshd\[6745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-54-170-198.static.tie.cl  user=root
2019-08-21 19:03:59
180.245.145.76 attackbotsspam
Aug 20 21:26:01 localhost kernel: [88576.934572] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=180.245.145.76 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=3440 DF PROTO=TCP SPT=59822 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 20 21:26:01 localhost kernel: [88576.934580] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=180.245.145.76 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=3440 DF PROTO=TCP SPT=59822 DPT=8291 SEQ=136457212 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405840103030201010402) 
Aug 20 21:26:19 localhost kernel: [88594.948604] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=180.245.145.76 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=12154 DF PROTO=TCP SPT=53815 DPT=8728 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug 20 21:26:19 localhost kernel: [88594.948626] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=180.245.145.76 DST
2019-08-21 19:12:05
40.113.104.81 attackbotsspam
Aug  6 11:28:19 server sshd\[199492\]: Invalid user xbox from 40.113.104.81
Aug  6 11:28:19 server sshd\[199492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.113.104.81
Aug  6 11:28:22 server sshd\[199492\]: Failed password for invalid user xbox from 40.113.104.81 port 6144 ssh2
...
2019-08-21 19:23:53
111.231.215.244 attackbots
Aug 20 23:50:10 lcdev sshd\[4447\]: Invalid user ggg from 111.231.215.244
Aug 20 23:50:10 lcdev sshd\[4447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.215.244
Aug 20 23:50:12 lcdev sshd\[4447\]: Failed password for invalid user ggg from 111.231.215.244 port 23831 ssh2
Aug 20 23:55:16 lcdev sshd\[4884\]: Invalid user tasha from 111.231.215.244
Aug 20 23:55:16 lcdev sshd\[4884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.215.244
2019-08-21 18:40:59
213.239.206.90 attackspam
Automatic report - Banned IP Access
2019-08-21 19:03:01
150.107.0.25 attack
Invalid user tc from 150.107.0.25 port 45436
2019-08-21 18:59:02

最近上报的IP列表

235.215.95.3 232.76.197.33 114.76.94.51 245.12.183.3
64.110.76.98 136.147.240.182 116.9.65.43 201.36.1.38
38.199.92.120 63.239.88.73 26.121.245.83 133.212.230.89
222.180.39.141 69.137.82.64 53.63.178.198 3.245.101.64
138.54.244.176 109.145.194.133 164.168.6.212 16.246.122.38