必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.50.22.198
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56733
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.50.22.198.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 22:13:26 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 198.22.50.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 198.22.50.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.78.12.22 attackspambots
Dec 17 12:12:35 microserver sshd[24042]: Invalid user user from 27.78.12.22 port 57376
Dec 17 12:12:38 microserver sshd[24042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.78.12.22
Dec 17 12:12:40 microserver sshd[24042]: Failed password for invalid user user from 27.78.12.22 port 57376 ssh2
Dec 17 12:14:24 microserver sshd[24204]: Invalid user guest from 27.78.12.22 port 43926
Dec 17 12:14:27 microserver sshd[24204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.78.12.22
Dec 18 11:09:53 microserver sshd[48754]: Invalid user support from 27.78.12.22 port 42246
Dec 18 11:09:55 microserver sshd[48754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.78.12.22
Dec 18 11:09:57 microserver sshd[48754]: Failed password for invalid user support from 27.78.12.22 port 42246 ssh2
Dec 18 11:10:36 microserver sshd[49188]: Invalid user system from 27.78.12.22 port 33456
Dec 18 11:10:37 micr
2019-12-18 15:27:27
110.78.178.190 attack
Unauthorized connection attempt detected from IP address 110.78.178.190 to port 445
2019-12-18 14:58:35
164.132.192.19 attack
2019-12-18T07:21:15.573276struts4.enskede.local sshd\[2890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=19.ip-164-132-192.eu  user=root
2019-12-18T07:21:18.556027struts4.enskede.local sshd\[2890\]: Failed password for root from 164.132.192.19 port 34192 ssh2
2019-12-18T07:29:37.304758struts4.enskede.local sshd\[2901\]: Invalid user sistemas from 164.132.192.19 port 51032
2019-12-18T07:29:37.314120struts4.enskede.local sshd\[2901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=19.ip-164-132-192.eu
2019-12-18T07:29:41.172810struts4.enskede.local sshd\[2901\]: Failed password for invalid user sistemas from 164.132.192.19 port 51032 ssh2
...
2019-12-18 15:04:52
222.186.42.4 attackbotsspam
Dec 18 07:25:39 zeus sshd[25249]: Failed password for root from 222.186.42.4 port 12750 ssh2
Dec 18 07:25:43 zeus sshd[25249]: Failed password for root from 222.186.42.4 port 12750 ssh2
Dec 18 07:25:46 zeus sshd[25249]: Failed password for root from 222.186.42.4 port 12750 ssh2
Dec 18 07:25:50 zeus sshd[25249]: Failed password for root from 222.186.42.4 port 12750 ssh2
Dec 18 07:25:54 zeus sshd[25249]: Failed password for root from 222.186.42.4 port 12750 ssh2
2019-12-18 15:28:34
138.68.250.76 attackspam
Dec 18 09:03:13 sauna sshd[18602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.250.76
Dec 18 09:03:15 sauna sshd[18602]: Failed password for invalid user mybotuser@123 from 138.68.250.76 port 45144 ssh2
...
2019-12-18 15:14:39
109.238.14.172 attackspam
" "
2019-12-18 15:15:34
106.12.208.27 attack
Dec 18 07:58:43 vps647732 sshd[5243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.208.27
Dec 18 07:58:45 vps647732 sshd[5243]: Failed password for invalid user Silver from 106.12.208.27 port 34802 ssh2
...
2019-12-18 15:08:11
89.133.103.216 attack
Dec 18 06:56:18 game-panel sshd[18254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.133.103.216
Dec 18 06:56:20 game-panel sshd[18254]: Failed password for invalid user diekman from 89.133.103.216 port 52030 ssh2
Dec 18 07:01:34 game-panel sshd[18448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.133.103.216
2019-12-18 15:16:06
148.70.116.223 attackspambots
Sep 29 23:03:30 vtv3 sshd[31019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.116.223
Sep 29 23:17:31 vtv3 sshd[6043]: Invalid user sharleen from 148.70.116.223 port 52408
Sep 29 23:17:31 vtv3 sshd[6043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.116.223
Sep 29 23:17:33 vtv3 sshd[6043]: Failed password for invalid user sharleen from 148.70.116.223 port 52408 ssh2
Sep 29 23:22:11 vtv3 sshd[8393]: Invalid user usuario from 148.70.116.223 port 43568
Sep 29 23:22:11 vtv3 sshd[8393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.116.223
Sep 29 23:35:52 vtv3 sshd[15220]: Invalid user ld from 148.70.116.223 port 45273
Sep 29 23:35:52 vtv3 sshd[15220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.116.223
Sep 29 23:35:54 vtv3 sshd[15220]: Failed password for invalid user ld from 148.70.116.223 port 45273 ssh2
Sep 29 23
2019-12-18 15:21:42
154.126.32.138 attack
Dec 18 07:21:09 vps691689 sshd[2566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.126.32.138
Dec 18 07:21:11 vps691689 sshd[2566]: Failed password for invalid user host from 154.126.32.138 port 45854 ssh2
...
2019-12-18 14:56:00
51.68.44.13 attack
Dec 18 07:11:06 zeus sshd[24907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.13 
Dec 18 07:11:08 zeus sshd[24907]: Failed password for invalid user corzo from 51.68.44.13 port 37970 ssh2
Dec 18 07:16:27 zeus sshd[25041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.13 
Dec 18 07:16:29 zeus sshd[25041]: Failed password for invalid user abc from 51.68.44.13 port 46580 ssh2
2019-12-18 15:19:54
167.114.3.105 attackspam
Dec 18 07:13:36 localhost sshd[51337]: Failed password for invalid user maniwa from 167.114.3.105 port 50906 ssh2
Dec 18 07:24:55 localhost sshd[51624]: Failed password for invalid user harmsen from 167.114.3.105 port 43322 ssh2
Dec 18 07:29:58 localhost sshd[51789]: Failed password for invalid user guest from 167.114.3.105 port 51000 ssh2
2019-12-18 15:27:57
182.16.249.130 attack
Dec 18 07:59:12 MK-Soft-VM7 sshd[24077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.16.249.130 
Dec 18 07:59:15 MK-Soft-VM7 sshd[24077]: Failed password for invalid user admin from 182.16.249.130 port 10023 ssh2
...
2019-12-18 15:24:00
134.209.50.169 attack
Dec 18 07:29:58 MK-Soft-VM7 sshd[23700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.50.169 
Dec 18 07:29:59 MK-Soft-VM7 sshd[23700]: Failed password for invalid user gdm from 134.209.50.169 port 41726 ssh2
...
2019-12-18 15:25:29
54.39.44.47 attackbotsspam
Dec 18 01:25:15 ny01 sshd[18711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.44.47
Dec 18 01:25:17 ny01 sshd[18711]: Failed password for invalid user lashell from 54.39.44.47 port 57492 ssh2
Dec 18 01:30:27 ny01 sshd[19410]: Failed password for root from 54.39.44.47 port 35734 ssh2
2019-12-18 14:52:04

最近上报的IP列表

90.71.52.62 69.3.207.104 213.210.185.0 213.122.154.126
173.123.197.233 98.37.106.134 238.174.3.0 196.251.70.124
194.162.67.168 221.77.112.240 230.49.167.127 190.148.73.153
188.69.194.228 163.199.145.37 93.32.25.107 232.66.71.28
214.191.89.226 193.204.35.167 60.4.204.234 155.21.167.148