必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 182.120.50.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;182.120.50.46.			IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:46:10 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
46.50.120.182.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.50.120.182.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
196.245.243.160 attack
Unauthorized access detected from banned ip
2019-10-01 15:20:31
95.128.43.164 attackbots
Oct  1 05:51:16 rotator sshd\[22915\]: Failed password for root from 95.128.43.164 port 33530 ssh2Oct  1 05:51:18 rotator sshd\[22915\]: Failed password for root from 95.128.43.164 port 33530 ssh2Oct  1 05:51:21 rotator sshd\[22915\]: Failed password for root from 95.128.43.164 port 33530 ssh2Oct  1 05:51:23 rotator sshd\[22915\]: Failed password for root from 95.128.43.164 port 33530 ssh2Oct  1 05:51:26 rotator sshd\[22915\]: Failed password for root from 95.128.43.164 port 33530 ssh2Oct  1 05:51:28 rotator sshd\[22915\]: Failed password for root from 95.128.43.164 port 33530 ssh2
...
2019-10-01 15:22:13
182.61.177.109 attackbotsspam
Oct  1 08:53:02 meumeu sshd[23969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.177.109 
Oct  1 08:53:04 meumeu sshd[23969]: Failed password for invalid user stop from 182.61.177.109 port 60378 ssh2
Oct  1 08:57:45 meumeu sshd[24656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.177.109 
...
2019-10-01 15:00:11
213.166.70.101 attack
10/01/2019-03:13:45.423864 213.166.70.101 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-01 15:27:48
45.6.72.17 attack
Oct  1 03:06:20 xtremcommunity sshd\[58025\]: Invalid user snwokedi from 45.6.72.17 port 48520
Oct  1 03:06:20 xtremcommunity sshd\[58025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17
Oct  1 03:06:22 xtremcommunity sshd\[58025\]: Failed password for invalid user snwokedi from 45.6.72.17 port 48520 ssh2
Oct  1 03:11:18 xtremcommunity sshd\[58202\]: Invalid user inux from 45.6.72.17 port 60788
Oct  1 03:11:18 xtremcommunity sshd\[58202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17
...
2019-10-01 15:14:45
90.144.145.186 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/90.144.145.186/ 
 SE - 1H : (56)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SE 
 NAME ASN : ASN1257 
 
 IP : 90.144.145.186 
 
 CIDR : 90.144.0.0/16 
 
 PREFIX COUNT : 263 
 
 UNIQUE IP COUNT : 4174848 
 
 
 WYKRYTE ATAKI Z ASN1257 :  
  1H - 1 
  3H - 2 
  6H - 3 
 12H - 3 
 24H - 3 
 
 DateTime : 2019-10-01 05:51:15 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 15:35:00
51.75.32.141 attackbots
2019-10-01T07:00:24.511399abusebot-3.cloudsearch.cf sshd\[29847\]: Invalid user admin from 51.75.32.141 port 36490
2019-10-01 15:19:55
1.34.72.86 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/1.34.72.86/ 
 TW - 1H : (219)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 1.34.72.86 
 
 CIDR : 1.34.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 19 
  3H - 46 
  6H - 59 
 12H - 89 
 24H - 151 
 
 DateTime : 2019-10-01 05:51:15 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 15:36:08
83.166.251.37 attackspambots
Sep 30 18:03:53 hanapaa sshd\[1459\]: Invalid user nn from 83.166.251.37
Sep 30 18:03:53 hanapaa sshd\[1459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.166.251.37
Sep 30 18:03:56 hanapaa sshd\[1459\]: Failed password for invalid user nn from 83.166.251.37 port 35772 ssh2
Sep 30 18:08:05 hanapaa sshd\[1794\]: Invalid user csgosrv from 83.166.251.37
Sep 30 18:08:05 hanapaa sshd\[1794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.166.251.37
2019-10-01 15:13:51
101.102.99.189 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/101.102.99.189/ 
 JP - 1H : (124)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : JP 
 NAME ASN : ASN4713 
 
 IP : 101.102.99.189 
 
 CIDR : 101.102.96.0/22 
 
 PREFIX COUNT : 301 
 
 UNIQUE IP COUNT : 28900096 
 
 
 WYKRYTE ATAKI Z ASN4713 :  
  1H - 3 
  3H - 5 
  6H - 8 
 12H - 9 
 24H - 13 
 
 DateTime : 2019-10-01 05:51:15 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-01 15:33:44
79.137.34.248 attackbotsspam
Sep 30 02:33:42 plesk sshd[16762]: Failed password for sshd from 79.137.34.248 port 42085 ssh2
Sep 30 02:33:42 plesk sshd[16762]: Received disconnect from 79.137.34.248: 11: Bye Bye [preauth]
Sep 30 02:41:11 plesk sshd[17291]: Invalid user fabrizio from 79.137.34.248
Sep 30 02:41:13 plesk sshd[17291]: Failed password for invalid user fabrizio from 79.137.34.248 port 50408 ssh2
Sep 30 02:41:13 plesk sshd[17291]: Received disconnect from 79.137.34.248: 11: Bye Bye [preauth]
Sep 30 02:44:35 plesk sshd[17432]: Invalid user service from 79.137.34.248
Sep 30 02:44:37 plesk sshd[17432]: Failed password for invalid user service from 79.137.34.248 port 42957 ssh2
Sep 30 02:44:37 plesk sshd[17432]: Received disconnect from 79.137.34.248: 11: Bye Bye [preauth]
Sep 30 02:47:59 plesk sshd[17608]: Invalid user user from 79.137.34.248


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=79.137.34.248
2019-10-01 14:56:51
37.49.227.12 attackbots
10/01/2019-06:56:24.204883 37.49.227.12 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-01 15:01:26
54.38.49.152 attackbotsspam
Sep 29 23:01:33 wp sshd[5232]: Did not receive identification string from 54.38.49.152
Sep 29 23:03:53 wp sshd[5241]: Failed password for r.r from 54.38.49.152 port 49918 ssh2
Sep 29 23:03:53 wp sshd[5241]: Received disconnect from 54.38.49.152: 11: Normal Shutdown, Thank you for playing [preauth]
Sep 29 23:05:35 wp sshd[5253]: Failed password for r.r from 54.38.49.152 port 59648 ssh2
Sep 29 23:05:35 wp sshd[5253]: Received disconnect from 54.38.49.152: 11: Normal Shutdown, Thank you for playing [preauth]
Sep 29 23:07:15 wp sshd[5279]: Failed password for r.r from 54.38.49.152 port 41144 ssh2
Sep 29 23:07:15 wp sshd[5279]: Received disconnect from 54.38.49.152: 11: Normal Shutdown, Thank you for playing [preauth]
Sep 29 23:08:53 wp sshd[5309]: Failed password for r.r from 54.38.49.152 port 50864 ssh2
Sep 29 23:08:53 wp sshd[5309]: Received disconnect from 54.38.49.152: 11: Normal Shutdown, Thank you for playing [preauth]
Sep 29 23:10:29 wp sshd[5335]: Failed password fo........
-------------------------------
2019-10-01 14:56:00
36.233.40.199 attackspambots
Port scan
2019-10-01 15:06:41
197.224.112.153 attackspam
Oct  1 05:51:52 meumeu sshd[24901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.224.112.153 
Oct  1 05:51:52 meumeu sshd[24900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.224.112.153 
Oct  1 05:51:54 meumeu sshd[24901]: Failed password for invalid user pi from 197.224.112.153 port 50728 ssh2
...
2019-10-01 15:03:51

最近上报的IP列表

185.200.80.20 210.211.117.212 80.66.88.17 183.94.121.56
85.190.237.221 87.14.255.69 41.97.199.22 79.143.30.163
41.64.175.212 200.194.20.103 79.143.89.169 223.213.17.208
192.159.39.30 78.165.73.190 171.35.104.232 41.62.127.82
116.48.109.205 103.59.210.156 112.32.119.191 185.166.74.32