必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.226.150.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8407
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.226.150.6.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 01:19:45 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 6.150.226.21.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 6.150.226.21.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.89.190 attack
$f2bV_matches
2019-09-15 09:39:19
198.27.90.106 attackbots
Sep 14 21:15:18 TORMINT sshd\[25193\]: Invalid user ubuntu from 198.27.90.106
Sep 14 21:15:18 TORMINT sshd\[25193\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.90.106
Sep 14 21:15:20 TORMINT sshd\[25193\]: Failed password for invalid user ubuntu from 198.27.90.106 port 43053 ssh2
...
2019-09-15 09:18:38
139.59.22.169 attackbotsspam
Sep 14 08:08:44 wbs sshd\[3525\]: Invalid user carlosfarah from 139.59.22.169
Sep 14 08:08:44 wbs sshd\[3525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.22.169
Sep 14 08:08:46 wbs sshd\[3525\]: Failed password for invalid user carlosfarah from 139.59.22.169 port 37298 ssh2
Sep 14 08:13:26 wbs sshd\[3987\]: Invalid user admin from 139.59.22.169
Sep 14 08:13:26 wbs sshd\[3987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.22.169
2019-09-15 09:14:18
52.51.236.249 attack
Sep 14 19:18:55 xb3 sshd[8700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-51-236-249.eu-west-1.compute.amazonaws.com
Sep 14 19:18:57 xb3 sshd[8700]: Failed password for invalid user mv from 52.51.236.249 port 57908 ssh2
Sep 14 19:18:57 xb3 sshd[8700]: Received disconnect from 52.51.236.249: 11: Bye Bye [preauth]
Sep 14 19:30:13 xb3 sshd[25885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-51-236-249.eu-west-1.compute.amazonaws.com
Sep 14 19:30:15 xb3 sshd[25885]: Failed password for invalid user swadmin from 52.51.236.249 port 51096 ssh2
Sep 14 19:30:15 xb3 sshd[25885]: Received disconnect from 52.51.236.249: 11: Bye Bye [preauth]
Sep 14 19:33:48 xb3 sshd[8991]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=em3-52-51-236-249.eu-west-1.compute.amazonaws.com
Sep 14 19:33:51 xb3 sshd[8991]: Failed password for invalid user vx from........
-------------------------------
2019-09-15 09:52:25
180.248.162.38 attack
Automatic report - Port Scan Attack
2019-09-15 09:18:15
149.56.132.202 attackbotsspam
Sep 14 20:03:22 vtv3 sshd\[26762\]: Invalid user cody from 149.56.132.202 port 37706
Sep 14 20:03:22 vtv3 sshd\[26762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202
Sep 14 20:03:25 vtv3 sshd\[26762\]: Failed password for invalid user cody from 149.56.132.202 port 37706 ssh2
Sep 14 20:07:11 vtv3 sshd\[28736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202  user=root
Sep 14 20:07:13 vtv3 sshd\[28736\]: Failed password for root from 149.56.132.202 port 53938 ssh2
Sep 14 20:19:00 vtv3 sshd\[1968\]: Invalid user cfg from 149.56.132.202 port 46078
Sep 14 20:19:00 vtv3 sshd\[1968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.132.202
Sep 14 20:19:02 vtv3 sshd\[1968\]: Failed password for invalid user cfg from 149.56.132.202 port 46078 ssh2
Sep 14 20:23:09 vtv3 sshd\[4182\]: Invalid user wayne from 149.56.132.202 port 34026
Sep 14 20:23:09 vtv3
2019-09-15 09:22:38
54.37.156.188 attack
Invalid user oracle from 54.37.156.188 port 36173
2019-09-15 09:24:56
54.38.242.233 attack
Sep 15 02:56:24 MK-Soft-Root2 sshd\[26050\]: Invalid user ts from 54.38.242.233 port 58090
Sep 15 02:56:24 MK-Soft-Root2 sshd\[26050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.233
Sep 15 02:56:26 MK-Soft-Root2 sshd\[26050\]: Failed password for invalid user ts from 54.38.242.233 port 58090 ssh2
...
2019-09-15 09:48:27
91.1.220.72 attackbotsspam
Sep 14 23:04:02 XXX sshd[54304]: Invalid user client from 91.1.220.72 port 41980
2019-09-15 09:55:43
157.230.116.99 attackbotsspam
Sep 14 15:42:41 Tower sshd[2594]: Connection from 157.230.116.99 port 49866 on 192.168.10.220 port 22
Sep 14 15:42:42 Tower sshd[2594]: Invalid user teamspeak from 157.230.116.99 port 49866
Sep 14 15:42:42 Tower sshd[2594]: error: Could not get shadow information for NOUSER
Sep 14 15:42:42 Tower sshd[2594]: Failed password for invalid user teamspeak from 157.230.116.99 port 49866 ssh2
Sep 14 15:42:42 Tower sshd[2594]: Received disconnect from 157.230.116.99 port 49866:11: Bye Bye [preauth]
Sep 14 15:42:42 Tower sshd[2594]: Disconnected from invalid user teamspeak 157.230.116.99 port 49866 [preauth]
2019-09-15 09:20:01
106.13.144.8 attackspambots
Sep 15 02:44:48 DAAP sshd[29984]: Invalid user server02 from 106.13.144.8 port 60220
Sep 15 02:44:48 DAAP sshd[29984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.144.8
Sep 15 02:44:48 DAAP sshd[29984]: Invalid user server02 from 106.13.144.8 port 60220
Sep 15 02:44:50 DAAP sshd[29984]: Failed password for invalid user server02 from 106.13.144.8 port 60220 ssh2
Sep 15 02:49:05 DAAP sshd[30072]: Invalid user mdom from 106.13.144.8 port 41544
...
2019-09-15 09:14:47
121.233.66.24 attackbots
Sep 14 21:11:39 elektron postfix/smtpd\[15383\]: NOQUEUE: reject: RCPT from unknown\[121.233.66.24\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[121.233.66.24\]\; from=\ to=\ proto=ESMTP helo=\
Sep 14 21:12:42 elektron postfix/smtpd\[15383\]: NOQUEUE: reject: RCPT from unknown\[121.233.66.24\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[121.233.66.24\]\; from=\ to=\ proto=ESMTP helo=\
Sep 14 21:13:39 elektron postfix/smtpd\[15383\]: NOQUEUE: reject: RCPT from unknown\[121.233.66.24\]: 450 4.7.1 Client host rejected: cannot find your hostname, \[121.233.66.24\]\; from=\ to=\ proto=ESMTP helo=\
2019-09-15 09:24:09
206.189.76.64 attackspambots
$f2bV_matches
2019-09-15 09:19:13
106.12.218.193 attackspam
$f2bV_matches
2019-09-15 09:07:10
132.232.120.158 attackbots
Sep 15 02:35:11 tuotantolaitos sshd[23174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.120.158
Sep 15 02:35:13 tuotantolaitos sshd[23174]: Failed password for invalid user carol from 132.232.120.158 port 28890 ssh2
...
2019-09-15 09:23:07

最近上报的IP列表

17.31.187.200 160.57.220.37 47.150.197.122 124.14.34.173
167.232.255.172 124.114.35.180 56.133.194.81 151.215.51.36
59.123.131.42 204.42.6.124 19.172.130.131 100.48.146.129
116.254.8.1 94.30.157.56 201.13.143.154 225.250.221.176
79.35.123.172 89.162.204.234 55.220.121.228 70.224.16.249