必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan (Province of China)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 27.242.50.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15029
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;27.242.50.46.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:15:15 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
46.50.242.27.in-addr.arpa domain name pointer 27-242-50-46.adsl.fetnet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.50.242.27.in-addr.arpa	name = 27-242-50-46.adsl.fetnet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.244.73.223 attack
Invalid user huntsinger from 104.244.73.223 port 47534
2019-12-18 21:53:21
109.110.52.77 attackbotsspam
Dec 18 15:08:46 icecube sshd[84858]: Failed password for root from 109.110.52.77 port 54738 ssh2
2019-12-18 22:12:38
139.159.27.62 attackbotsspam
Dec 18 07:43:10 vmd17057 sshd\[20942\]: Invalid user schaul from 139.159.27.62 port 54714
Dec 18 07:43:10 vmd17057 sshd\[20942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.159.27.62
Dec 18 07:43:12 vmd17057 sshd\[20942\]: Failed password for invalid user schaul from 139.159.27.62 port 54714 ssh2
...
2019-12-18 22:01:17
45.6.72.17 attackbotsspam
2019-12-18T13:23:54.481821struts4.enskede.local sshd\[4071\]: Invalid user serack from 45.6.72.17 port 32880
2019-12-18T13:23:54.491014struts4.enskede.local sshd\[4071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17.leonetprovedor.com.br
2019-12-18T13:23:57.148006struts4.enskede.local sshd\[4071\]: Failed password for invalid user serack from 45.6.72.17 port 32880 ssh2
2019-12-18T13:30:24.354223struts4.enskede.local sshd\[4074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.17.leonetprovedor.com.br  user=root
2019-12-18T13:30:28.320369struts4.enskede.local sshd\[4074\]: Failed password for root from 45.6.72.17 port 40098 ssh2
...
2019-12-18 22:04:21
178.62.117.106 attack
Brute-force attempt banned
2019-12-18 21:57:48
212.47.246.150 attackspambots
Dec 18 03:43:36 wbs sshd\[5839\]: Invalid user test from 212.47.246.150
Dec 18 03:43:36 wbs sshd\[5839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150-246-47-212.rev.cloud.scaleway.com
Dec 18 03:43:38 wbs sshd\[5839\]: Failed password for invalid user test from 212.47.246.150 port 36314 ssh2
Dec 18 03:49:02 wbs sshd\[6353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150-246-47-212.rev.cloud.scaleway.com  user=root
Dec 18 03:49:04 wbs sshd\[6353\]: Failed password for root from 212.47.246.150 port 43932 ssh2
2019-12-18 22:03:10
45.134.179.20 attack
12/18/2019-08:14:04.090853 45.134.179.20 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-18 22:09:06
37.120.12.212 attack
Invalid user news from 37.120.12.212 port 54507
2019-12-18 22:13:19
222.186.173.238 attackspambots
Dec 18 15:19:12 eventyay sshd[4608]: Failed password for root from 222.186.173.238 port 25848 ssh2
Dec 18 15:19:15 eventyay sshd[4608]: Failed password for root from 222.186.173.238 port 25848 ssh2
Dec 18 15:19:19 eventyay sshd[4608]: Failed password for root from 222.186.173.238 port 25848 ssh2
Dec 18 15:19:22 eventyay sshd[4608]: Failed password for root from 222.186.173.238 port 25848 ssh2
...
2019-12-18 22:21:33
40.92.70.72 attack
Dec 18 16:38:48 debian-2gb-vpn-nbg1-1 kernel: [1054692.803753] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.70.72 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=483 DF PROTO=TCP SPT=58695 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-18 21:49:16
14.233.85.147 attackbots
Unauthorized connection attempt detected from IP address 14.233.85.147 to port 445
2019-12-18 22:18:26
221.6.15.178 attackbotsspam
Dec 17 02:09:51 srv01 sshd[12239]: Invalid user iwanyk from 221.6.15.178
Dec 17 02:09:51 srv01 sshd[12239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.6.15.178 
Dec 17 02:09:54 srv01 sshd[12239]: Failed password for invalid user iwanyk from 221.6.15.178 port 2249 ssh2
Dec 17 02:09:54 srv01 sshd[12239]: Received disconnect from 221.6.15.178: 11: Bye Bye [preauth]
Dec 17 02:23:56 srv01 sshd[12722]: Invalid user admin from 221.6.15.178
Dec 17 02:23:56 srv01 sshd[12722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.6.15.178 
Dec 17 02:23:58 srv01 sshd[12722]: Failed password for invalid user admin from 221.6.15.178 port 2250 ssh2
Dec 17 02:23:59 srv01 sshd[12722]: Received disconnect from 221.6.15.178: 11: Bye Bye [preauth]
Dec 17 02:30:40 srv01 sshd[13070]: Connection closed by 221.6.15.178 [preauth]
Dec 17 02:37:35 srv01 sshd[13293]: Invalid user mfajre from 221.6.15.178
Dec 17........
-------------------------------
2019-12-18 22:25:20
80.247.110.70 attack
Honeypot attack, port: 23, PTR: server.actozil.ru.
2019-12-18 22:00:11
40.92.72.92 attackspambots
Dec 18 09:24:06 debian-2gb-vpn-nbg1-1 kernel: [1028610.970798] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.72.92 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=26696 DF PROTO=TCP SPT=8455 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-18 22:04:41
106.12.217.180 attackspam
Invalid user vasintha from 106.12.217.180 port 59426
2019-12-18 22:27:47

最近上报的IP列表

239.139.81.177 178.248.29.38 28.53.176.122 219.169.222.148
66.162.107.66 251.73.164.90 152.144.4.91 188.84.134.166
207.190.148.22 43.122.116.157 225.224.246.166 178.23.165.230
122.224.139.161 189.12.169.84 242.12.114.179 235.123.67.0
180.249.24.53 87.183.141.59 203.242.216.173 34.174.51.70