必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Thailand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 223.204.50.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6614
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;223.204.50.141.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 18:09:55 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
141.50.204.223.in-addr.arpa domain name pointer mx-ll-223.204.50-141.dynamic.3bb.co.th.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.50.204.223.in-addr.arpa	name = mx-ll-223.204.50-141.dynamic.3bb.co.th.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
188.131.233.36 attackspam
Oct 10 18:17:27 cdc sshd[14876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.233.36  user=root
Oct 10 18:17:28 cdc sshd[14876]: Failed password for invalid user root from 188.131.233.36 port 43590 ssh2
2020-10-11 03:56:06
83.4.54.238 attackbotsspam
23/tcp
[2020-10-09]1pkt
2020-10-11 03:40:38
197.238.193.89 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-10-11 03:46:13
183.82.34.246 attack
Oct 8 16:55:39 *hidden* sshd[11314]: Failed password for *hidden* from 183.82.34.246 port 52850 ssh2 Oct 8 17:01:01 *hidden* sshd[14537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.34.246 user=root Oct 8 17:01:03 *hidden* sshd[14537]: Failed password for *hidden* from 183.82.34.246 port 55404 ssh2
2020-10-11 03:57:50
62.171.162.136 attackspam
Oct 10 08:36:55 firewall sshd[20181]: Invalid user zlh from 62.171.162.136
Oct 10 08:36:57 firewall sshd[20181]: Failed password for invalid user zlh from 62.171.162.136 port 34224 ssh2
Oct 10 08:39:20 firewall sshd[20253]: Invalid user zte from 62.171.162.136
...
2020-10-11 03:33:33
45.14.224.182 attack
SSH break in attempt
...
2020-10-11 04:00:18
5.189.143.170 attack
 TCP (SYN) 5.189.143.170:43609 -> port 81, len 44
2020-10-11 03:32:32
138.68.226.175 attack
k+ssh-bruteforce
2020-10-11 03:58:06
18.234.164.207 attackspambots
18.234.164.207 (US/United States/-), 7 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 10 11:45:22 jbs1 sshd[12288]: Failed password for root from 34.92.27.85 port 48694 ssh2
Oct 10 11:49:11 jbs1 sshd[13376]: Failed password for root from 34.92.27.85 port 47464 ssh2
Oct 10 11:55:52 jbs1 sshd[15964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.70.43.103  user=root
Oct 10 11:40:23 jbs1 sshd[10178]: Failed password for root from 165.22.129.117 port 53136 ssh2
Oct 10 11:41:22 jbs1 sshd[10583]: Failed password for root from 18.234.164.207 port 48590 ssh2
Oct 10 11:41:14 jbs1 sshd[10586]: Failed password for root from 34.92.27.85 port 49922 ssh2
Oct 10 11:40:21 jbs1 sshd[10178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.129.117  user=root

IP Addresses Blocked:

34.92.27.85 (-)
81.70.43.103 (CN/China/-)
165.22.129.117 (US/United States/-)
2020-10-11 03:28:57
172.104.139.66 attackspam
172.104.139.66 - - [10/Oct/2020:17:25:15 +0100] "GET /api/v1/pods HTTP/1.1" 444 0 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36"
...
2020-10-11 03:34:48
187.22.184.153 attackbots
Sending SPAM email
2020-10-11 03:38:25
171.34.78.119 attackbots
(sshd) Failed SSH login from 171.34.78.119 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct 10 13:56:22 optimus sshd[26037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.78.119  user=root
Oct 10 13:56:24 optimus sshd[26037]: Failed password for root from 171.34.78.119 port 15899 ssh2
Oct 10 14:36:58 optimus sshd[8225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.78.119  user=root
Oct 10 14:37:00 optimus sshd[8225]: Failed password for root from 171.34.78.119 port 15901 ssh2
Oct 10 14:40:45 optimus sshd[9503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.34.78.119  user=root
2020-10-11 03:47:23
106.13.187.27 attackspam
Oct 10 21:33:23 ip106 sshd[2551]: Failed password for root from 106.13.187.27 port 18889 ssh2
...
2020-10-11 03:44:39
190.98.228.54 attack
$f2bV_matches
2020-10-11 03:31:03
218.59.129.110 attack
Oct  9 20:09:38 shivevps sshd[17454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.59.129.110
Oct  9 20:09:40 shivevps sshd[17454]: Failed password for invalid user w from 218.59.129.110 port 7390 ssh2
Oct  9 20:12:54 shivevps sshd[17545]: Invalid user williams from 218.59.129.110 port 7406
...
2020-10-11 04:01:51

最近上报的IP列表

77.135.25.129 51.22.12.237 31.234.148.247 200.132.45.207
15.39.78.222 123.91.77.214 29.142.44.192 246.94.127.240
231.50.42.122 192.72.132.111 252.11.128.233 231.86.199.110
218.101.27.201 86.225.54.92 117.221.202.163 36.66.152.150
127.149.93.219 152.0.183.196 101.66.177.120 56.51.14.165