必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.50.114.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59340
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.50.114.254.			IN	A

;; AUTHORITY SECTION:
.			379	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023032901 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 29 23:01:30 CST 2023
;; MSG SIZE  rcvd: 107
HOST信息:
254.114.50.220.in-addr.arpa domain name pointer softbank220050114254.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
254.114.50.220.in-addr.arpa	name = softbank220050114254.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
216.155.93.77 attackbotsspam
SSH Brute Force
2020-08-09 01:42:40
185.172.110.231 attack
 UDP 185.172.110.231:37163 -> port 123, len 220
2020-08-09 01:44:22
106.54.245.12 attackspambots
Aug  8 15:33:45 ajax sshd[8264]: Failed password for root from 106.54.245.12 port 55134 ssh2
2020-08-09 01:09:53
93.70.80.132 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-09 01:16:29
114.112.96.30 attackbots
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-08-09 01:36:33
1.9.128.17 attackbotsspam
Aug  8 18:41:58 Ubuntu-1404-trusty-64-minimal sshd\[24303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.128.17  user=root
Aug  8 18:42:00 Ubuntu-1404-trusty-64-minimal sshd\[24303\]: Failed password for root from 1.9.128.17 port 21249 ssh2
Aug  8 18:50:29 Ubuntu-1404-trusty-64-minimal sshd\[28543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.128.17  user=root
Aug  8 18:50:31 Ubuntu-1404-trusty-64-minimal sshd\[28543\]: Failed password for root from 1.9.128.17 port 2199 ssh2
Aug  8 18:55:04 Ubuntu-1404-trusty-64-minimal sshd\[30075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.9.128.17  user=root
2020-08-09 01:12:44
173.239.198.92 attackbots
0,50-01/01 [bc04/m27] PostRequest-Spammer scoring: essen
2020-08-09 01:31:20
117.93.211.39 attackspam
Aug  8 19:58:25 takio sshd[26183]: Invalid user pi from 117.93.211.39 port 42359
Aug  8 19:58:28 takio sshd[26185]: Invalid user pi from 117.93.211.39 port 43490
Aug  8 19:58:48 takio sshd[26187]: Invalid user pi from 117.93.211.39 port 44110
2020-08-09 01:09:02
52.142.146.243 attackspam
natural.cannabis.gummies@textualselection.com, edf40220.ukwest.cloudapp.azure.com, arthurcdumas010+58zer4gq@gmail.com, support@podio.com,
2020-08-09 01:11:24
37.49.224.192 attack
Aug  8 19:33:18 OPSO sshd\[3112\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.192  user=root
Aug  8 19:33:21 OPSO sshd\[3112\]: Failed password for root from 37.49.224.192 port 59184 ssh2
Aug  8 19:33:37 OPSO sshd\[3148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.192  user=root
Aug  8 19:33:39 OPSO sshd\[3148\]: Failed password for root from 37.49.224.192 port 51642 ssh2
Aug  8 19:33:56 OPSO sshd\[3150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.49.224.192  user=root
2020-08-09 01:35:55
49.233.84.59 attack
Aug  8 20:18:28 webhost01 sshd[14449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.84.59
Aug  8 20:18:30 webhost01 sshd[14449]: Failed password for invalid user abcd1234!@#$ from 49.233.84.59 port 53478 ssh2
...
2020-08-09 01:44:03
179.131.11.234 attackbotsspam
$f2bV_matches
2020-08-09 01:25:18
67.205.144.65 attackspambots
xmlrpc attack
2020-08-09 01:24:15
167.172.196.255 attackbotsspam
Aug  4 02:22:32 v26 sshd[16691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.196.255  user=r.r
Aug  4 02:22:34 v26 sshd[16691]: Failed password for r.r from 167.172.196.255 port 17018 ssh2
Aug  4 02:22:34 v26 sshd[16691]: Received disconnect from 167.172.196.255 port 17018:11: Bye Bye [preauth]
Aug  4 02:22:34 v26 sshd[16691]: Disconnected from 167.172.196.255 port 17018 [preauth]
Aug  4 02:28:19 v26 sshd[17261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.196.255  user=r.r
Aug  4 02:28:22 v26 sshd[17261]: Failed password for r.r from 167.172.196.255 port 49334 ssh2
Aug  4 02:28:22 v26 sshd[17261]: Received disconnect from 167.172.196.255 port 49334:11: Bye Bye [preauth]
Aug  4 02:28:22 v26 sshd[17261]: Disconnected from 167.172.196.255 port 49334 [preauth]
Aug  4 02:36:30 v26 sshd[18287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse........
-------------------------------
2020-08-09 01:49:24
222.186.169.194 attackbotsspam
Aug  8 10:39:51 dignus sshd[31579]: Failed password for root from 222.186.169.194 port 1110 ssh2
Aug  8 10:39:53 dignus sshd[31579]: Failed password for root from 222.186.169.194 port 1110 ssh2
Aug  8 10:39:57 dignus sshd[31579]: Failed password for root from 222.186.169.194 port 1110 ssh2
Aug  8 10:40:00 dignus sshd[31579]: Failed password for root from 222.186.169.194 port 1110 ssh2
Aug  8 10:40:03 dignus sshd[31579]: Failed password for root from 222.186.169.194 port 1110 ssh2
...
2020-08-09 01:46:11

最近上报的IP列表

51.211.17.178 229.3.34.225 129.54.40.43 109.70.66.89
242.186.135.222 145.165.45.96 181.39.128.150 150.230.174.145
66.18.23.137 100.248.163.245 63.115.69.182 108.52.17.139
237.240.100.141 197.237.51.7 105.250.19.37 107.71.197.43
71.175.190.26 200.107.192.230 226.166.205.254 87.57.197.187