必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 248.229.50.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;248.229.50.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 18:34:19 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 57.50.229.248.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.50.229.248.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
141.98.81.112 attackspambots
2020-04-04T17:12:37.273341shield sshd\[23502\]: Invalid user admin from 141.98.81.112 port 44833
2020-04-04T17:12:37.277223shield sshd\[23502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.112
2020-04-04T17:12:39.100176shield sshd\[23502\]: Failed password for invalid user admin from 141.98.81.112 port 44833 ssh2
2020-04-04T17:13:19.102639shield sshd\[23608\]: Invalid user Admin from 141.98.81.112 port 38759
2020-04-04T17:13:19.106373shield sshd\[23608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.112
2020-04-05 01:17:01
141.98.81.110 attackspambots
Apr  4 20:07:53 hosting sshd[3955]: Invalid user 1234 from 141.98.81.110 port 55162
Apr  4 20:07:53 hosting sshd[3955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.110
Apr  4 20:07:53 hosting sshd[3955]: Invalid user 1234 from 141.98.81.110 port 55162
Apr  4 20:07:55 hosting sshd[3955]: Failed password for invalid user 1234 from 141.98.81.110 port 55162 ssh2
Apr  4 20:08:39 hosting sshd[4160]: Invalid user user from 141.98.81.110 port 48946
...
2020-04-05 01:10:01
128.199.43.160 attackbots
Apr  4 18:04:56 ArkNodeAT sshd\[2040\]: Invalid user v from 128.199.43.160
Apr  4 18:04:56 ArkNodeAT sshd\[2040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.43.160
Apr  4 18:04:59 ArkNodeAT sshd\[2040\]: Failed password for invalid user v from 128.199.43.160 port 39684 ssh2
2020-04-05 01:08:13
175.140.138.193 attack
$f2bV_matches
2020-04-05 01:04:41
3.86.30.66 attackspambots
Automatically reported by fail2ban report script (mx1)
2020-04-05 01:34:43
106.124.141.229 attack
frenzy
2020-04-05 01:49:43
222.186.175.167 attackspambots
web-1 [ssh_2] SSH Attack
2020-04-05 01:37:21
185.79.156.167 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-05 01:03:06
178.34.156.249 attack
$f2bV_matches
2020-04-05 01:31:50
141.98.81.111 attack
2020-04-04T17:12:32.247039shield sshd\[23490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.111  user=root
2020-04-04T17:12:34.381490shield sshd\[23490\]: Failed password for root from 141.98.81.111 port 38953 ssh2
2020-04-04T17:13:10.047390shield sshd\[23588\]: Invalid user guest from 141.98.81.111 port 34151
2020-04-04T17:13:10.050823shield sshd\[23588\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.111
2020-04-04T17:13:12.069603shield sshd\[23588\]: Failed password for invalid user guest from 141.98.81.111 port 34151 ssh2
2020-04-05 01:18:45
77.71.16.37 attackbotsspam
Honeypot attack, port: 81, PTR: ip-37-16-71-77.bgwan.com.
2020-04-05 01:17:30
91.207.40.42 attackspambots
Apr  4 18:29:56 h2779839 sshd[31940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.42  user=root
Apr  4 18:29:58 h2779839 sshd[31940]: Failed password for root from 91.207.40.42 port 55856 ssh2
Apr  4 18:34:03 h2779839 sshd[32008]: Invalid user ts from 91.207.40.42 port 36944
Apr  4 18:34:03 h2779839 sshd[32008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.42
Apr  4 18:34:03 h2779839 sshd[32008]: Invalid user ts from 91.207.40.42 port 36944
Apr  4 18:34:05 h2779839 sshd[32008]: Failed password for invalid user ts from 91.207.40.42 port 36944 ssh2
Apr  4 18:38:12 h2779839 sshd[32041]: Invalid user ts from 91.207.40.42 port 46490
Apr  4 18:38:12 h2779839 sshd[32041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.42
Apr  4 18:38:12 h2779839 sshd[32041]: Invalid user ts from 91.207.40.42 port 46490
Apr  4 18:38:14 h2779839 sshd[32041
...
2020-04-05 01:08:55
159.89.177.46 attackspam
$f2bV_matches
2020-04-05 01:09:22
64.225.111.233 attack
2020-04-04T18:53:01.893502vps751288.ovh.net sshd\[30711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.111.233  user=root
2020-04-04T18:53:03.937784vps751288.ovh.net sshd\[30711\]: Failed password for root from 64.225.111.233 port 56136 ssh2
2020-04-04T18:55:21.219860vps751288.ovh.net sshd\[30751\]: Invalid user heguimei from 64.225.111.233 port 41082
2020-04-04T18:55:21.227859vps751288.ovh.net sshd\[30751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.111.233
2020-04-04T18:55:22.489443vps751288.ovh.net sshd\[30751\]: Failed password for invalid user heguimei from 64.225.111.233 port 41082 ssh2
2020-04-05 01:28:45
182.253.68.122 attackbotsspam
Apr  3 15:32:42 cumulus sshd[26436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.68.122  user=r.r
Apr  3 15:32:44 cumulus sshd[26436]: Failed password for r.r from 182.253.68.122 port 41594 ssh2
Apr  3 15:32:44 cumulus sshd[26436]: Received disconnect from 182.253.68.122 port 41594:11: Bye Bye [preauth]
Apr  3 15:32:44 cumulus sshd[26436]: Disconnected from 182.253.68.122 port 41594 [preauth]
Apr  3 15:45:47 cumulus sshd[27267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.68.122  user=r.r
Apr  3 15:45:48 cumulus sshd[27267]: Failed password for r.r from 182.253.68.122 port 44170 ssh2
Apr  3 15:45:49 cumulus sshd[27267]: Received disconnect from 182.253.68.122 port 44170:11: Bye Bye [preauth]
Apr  3 15:45:49 cumulus sshd[27267]: Disconnected from 182.253.68.122 port 44170 [preauth]
Apr  3 15:50:02 cumulus sshd[27443]: pam_unix(sshd:auth): authentication failure; lognam........
-------------------------------
2020-04-05 01:48:17

最近上报的IP列表

58.154.43.160 19.48.57.28 74.160.239.211 148.94.232.22
134.40.187.107 203.235.200.5 84.34.28.35 63.72.26.28
253.242.58.114 237.212.206.53 243.96.219.43 42.120.173.96
65.16.14.87 12.185.232.7 214.205.118.72 139.194.244.140
99.92.130.191 75.88.127.223 116.67.186.181 163.107.123.134