必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Minnetonka

省份(region): Minnesota

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.50.113.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27531
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.50.113.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 12:40:30 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 66.113.50.208.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.113.50.208.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
92.118.37.88 attack
firewall-block, port(s): 4489/tcp, 7002/tcp, 7004/tcp, 7005/tcp, 7008/tcp, 7009/tcp, 7010/tcp, 8889/tcp, 44489/tcp, 45678/tcp, 55589/tcp
2019-12-20 15:06:37
123.127.45.152 attack
Invalid user uesugi from 123.127.45.152 port 56846
2019-12-20 14:20:35
196.179.234.98 attack
Dec 20 08:31:01 ncomp sshd[20823]: Invalid user temp from 196.179.234.98
Dec 20 08:31:01 ncomp sshd[20823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.234.98
Dec 20 08:31:01 ncomp sshd[20823]: Invalid user temp from 196.179.234.98
Dec 20 08:31:03 ncomp sshd[20823]: Failed password for invalid user temp from 196.179.234.98 port 39872 ssh2
2019-12-20 14:57:15
36.72.214.40 attackbotsspam
12/20/2019-07:30:01.813508 36.72.214.40 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-12-20 15:09:06
142.93.109.129 attackbots
Dec 20 05:45:28 Ubuntu-1404-trusty-64-minimal sshd\[27952\]: Invalid user webmail from 142.93.109.129
Dec 20 05:45:28 Ubuntu-1404-trusty-64-minimal sshd\[27952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.109.129
Dec 20 05:45:30 Ubuntu-1404-trusty-64-minimal sshd\[27952\]: Failed password for invalid user webmail from 142.93.109.129 port 46658 ssh2
Dec 20 05:55:33 Ubuntu-1404-trusty-64-minimal sshd\[32668\]: Invalid user ria2000 from 142.93.109.129
Dec 20 05:55:33 Ubuntu-1404-trusty-64-minimal sshd\[32668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.109.129
2019-12-20 14:16:16
149.56.46.220 attack
Dec 19 20:25:01 hanapaa sshd\[17159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.ip-149-56-46.net  user=root
Dec 19 20:25:03 hanapaa sshd\[17159\]: Failed password for root from 149.56.46.220 port 40800 ssh2
Dec 19 20:30:08 hanapaa sshd\[17604\]: Invalid user uc from 149.56.46.220
Dec 19 20:30:08 hanapaa sshd\[17604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.ip-149-56-46.net
Dec 19 20:30:10 hanapaa sshd\[17604\]: Failed password for invalid user uc from 149.56.46.220 port 49888 ssh2
2019-12-20 14:51:32
46.166.88.166 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 04:55:16.
2019-12-20 14:27:05
112.198.43.130 attackbots
Dec 20 07:09:30 root sshd[19284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.43.130 
Dec 20 07:09:33 root sshd[19284]: Failed password for invalid user wwwadmin from 112.198.43.130 port 48475 ssh2
Dec 20 07:30:28 root sshd[19557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.43.130 
...
2019-12-20 14:44:42
36.77.94.213 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 04:55:15.
2019-12-20 14:29:26
164.132.62.233 attackspambots
Dec 19 20:25:03 web9 sshd\[24666\]: Invalid user espina from 164.132.62.233
Dec 19 20:25:03 web9 sshd\[24666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.62.233
Dec 19 20:25:06 web9 sshd\[24666\]: Failed password for invalid user espina from 164.132.62.233 port 54138 ssh2
Dec 19 20:30:07 web9 sshd\[25493\]: Invalid user karna from 164.132.62.233
Dec 19 20:30:07 web9 sshd\[25493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.62.233
2019-12-20 14:58:39
217.182.70.125 attack
Dec 20 06:24:37 game-panel sshd[6182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.70.125
Dec 20 06:24:38 game-panel sshd[6182]: Failed password for invalid user sheng from 217.182.70.125 port 54717 ssh2
Dec 20 06:30:12 game-panel sshd[6441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.70.125
2019-12-20 14:48:47
40.92.42.36 attack
Dec 20 07:55:25 debian-2gb-vpn-nbg1-1 kernel: [1196085.019377] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.42.36 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=230 ID=10809 DF PROTO=TCP SPT=26208 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-20 14:23:48
51.255.162.65 attackbotsspam
Dec 19 19:59:39 wbs sshd\[21754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.ip-51-255-162.eu  user=root
Dec 19 19:59:40 wbs sshd\[21754\]: Failed password for root from 51.255.162.65 port 59126 ssh2
Dec 19 20:04:43 wbs sshd\[22200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.ip-51-255-162.eu  user=root
Dec 19 20:04:45 wbs sshd\[22200\]: Failed password for root from 51.255.162.65 port 33962 ssh2
Dec 19 20:09:36 wbs sshd\[22833\]: Invalid user smmsp from 51.255.162.65
2019-12-20 14:20:52
149.7.217.27 attackbotsspam
Dec 20 07:30:08 serwer sshd\[15886\]: Invalid user ezell from 149.7.217.27 port 37750
Dec 20 07:30:08 serwer sshd\[15886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.7.217.27
Dec 20 07:30:11 serwer sshd\[15886\]: Failed password for invalid user ezell from 149.7.217.27 port 37750 ssh2
...
2019-12-20 14:52:08
187.35.91.198 attack
Dec 20 07:22:34 mail sshd\[12997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.35.91.198  user=bin
Dec 20 07:22:36 mail sshd\[12997\]: Failed password for bin from 187.35.91.198 port 46177 ssh2
Dec 20 07:30:05 mail sshd\[13240\]: Invalid user schinkel from 187.35.91.198
Dec 20 07:30:05 mail sshd\[13240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.35.91.198
...
2019-12-20 14:49:44

最近上报的IP列表

110.27.35.172 145.118.66.149 90.119.153.31 192.62.236.146
244.193.18.239 244.254.113.45 40.208.72.106 47.59.129.210
33.16.91.234 24.39.144.162 22.211.70.180 50.217.184.38
204.120.74.171 115.160.254.187 135.76.89.154 134.17.30.209
74.191.166.205 6.17.166.153 206.81.147.195 34.58.238.89