必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.244.50.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26708
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.244.50.214.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 533 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:54:20 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
214.50.244.199.in-addr.arpa domain name pointer lhm3.nc2augdavid.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.50.244.199.in-addr.arpa	name = lhm3.nc2augdavid.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
58.210.96.156 attack
Jun 21 22:38:43 bouncer sshd\[29842\]: Invalid user vncuser from 58.210.96.156 port 53317
Jun 21 22:38:43 bouncer sshd\[29842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.96.156 
Jun 21 22:38:45 bouncer sshd\[29842\]: Failed password for invalid user vncuser from 58.210.96.156 port 53317 ssh2
...
2019-06-22 11:07:51
213.32.83.233 attackspam
xmlrpc attack
2019-06-22 11:15:40
87.237.42.98 attack
[portscan] Port scan
2019-06-22 11:39:48
121.129.112.106 attackspam
Automatic report - Web App Attack
2019-06-22 11:04:10
185.53.91.50 attackbots
22.06.2019 02:44:38 Connection to port 5038 blocked by firewall
2019-06-22 11:06:50
109.201.154.229 attackbots
Bad Bot Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 (compatible; Uptimebot/1.0;  http://www.uptime.com/uptimebot)"
2019-06-22 11:04:30
178.212.53.2 attackspambots
Request: "GET / HTTP/1.1"
2019-06-22 11:25:38
83.228.96.34 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 11:40:31
91.205.131.124 attack
Jun 21 21:30:03 mail kernel: \[190949.275208\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=91.205.131.124 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=246 ID=48623 DF PROTO=TCP SPT=14995 DPT=8291 WINDOW=14600 RES=0x00 SYN URGP=0 
Jun 21 21:34:12 mail kernel: \[191198.269009\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=91.205.131.124 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=246 ID=15887 DF PROTO=TCP SPT=62626 DPT=7547 WINDOW=14600 RES=0x00 SYN URGP=0 
Jun 21 21:36:11 mail kernel: \[191317.272887\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=91.205.131.124 DST=91.205.173.180 LEN=44 TOS=0x00 PREC=0x00 TTL=246 ID=65086 DF PROTO=TCP SPT=33713 DPT=23 WINDOW=14600 RES=0x00 SYN URGP=0
2019-06-22 11:26:12
178.34.144.55 attackbotsspam
SSH Bruteforce attack
2019-06-22 11:41:21
185.234.217.9 attack
[munged]::80 185.234.217.9 - - [22/Jun/2019:05:14:59 +0200] "POST /[munged]: HTTP/1.1" 200 4444 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0"
[munged]::80 185.234.217.9 - - [22/Jun/2019:05:14:59 +0200] "POST /[munged]: HTTP/1.1" 200 4444 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0"
[munged]::80 185.234.217.9 - - [22/Jun/2019:05:14:59 +0200] "POST /[munged]: HTTP/1.1" 200 4444 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0"
[munged]::80 185.234.217.9 - - [22/Jun/2019:05:15:00 +0200] "POST /[munged]: HTTP/1.1" 200 4444 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0"
[munged]::80 185.234.217.9 - - [22/Jun/2019:05:15:00 +0200] "POST /[munged]: HTTP/1.1" 200 4444 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0"
[munged]::80 185.234.217.9 - - [22/Jun/2019:05:15:00 +0200] "POST /[munged]: HTTP/1.1" 200 4444 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gec
2019-06-22 11:44:58
221.231.126.2 attackbots
Request: "GET / HTTP/1.1"
2019-06-22 11:48:47
27.115.124.4 attackspam
" "
2019-06-22 11:12:52
91.214.114.7 attack
Jun 18 00:57:04 our-server-hostname sshd[3483]: reveeclipse mapping checking getaddrinfo for mail.lonil.ru [91.214.114.7] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 18 00:57:04 our-server-hostname sshd[3483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7  user=r.r
Jun 18 00:57:07 our-server-hostname sshd[3483]: Failed password for r.r from 91.214.114.7 port 52496 ssh2
Jun 18 01:02:15 our-server-hostname sshd[6690]: reveeclipse mapping checking getaddrinfo for mail.lonil.ru [91.214.114.7] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 18 01:02:15 our-server-hostname sshd[6690]: Invalid user xguest from 91.214.114.7
Jun 18 01:02:15 our-server-hostname sshd[6690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7 
Jun 18 01:02:18 our-server-hostname sshd[6690]: Failed password for invalid user xguest from 91.214.114.7 port 49550 ssh2


........
-----------------------------------------------
https://www.blocklist.de/e
2019-06-22 11:27:10
197.255.188.147 attack
Request: "GET / HTTP/1.1"
2019-06-22 11:41:02

最近上报的IP列表

169.95.37.194 96.131.154.141 166.208.199.103 17.98.124.73
70.205.28.209 106.254.184.136 48.171.132.34 64.84.74.167
48.114.89.1 60.58.51.168 129.231.197.223 138.170.44.37
175.168.19.41 125.223.186.3 200.173.191.182 189.63.14.81
66.171.81.32 252.217.32.73 85.38.192.4 51.52.177.248