必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Viet Nam

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.114.219.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36348
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.114.219.50.			IN	A

;; AUTHORITY SECTION:
.			284	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 00:41:49 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 50.219.114.42.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 50.219.114.42.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.12.151.250 attackbotsspam
Sep 27 07:08:38 www sshd\[5681\]: Invalid user qz from 121.12.151.250
Sep 27 07:08:38 www sshd\[5681\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.12.151.250
Sep 27 07:08:40 www sshd\[5681\]: Failed password for invalid user qz from 121.12.151.250 port 37956 ssh2
...
2019-09-27 14:39:36
77.42.109.75 attackspambots
Automatic report - Port Scan Attack
2019-09-27 14:32:20
188.120.243.23 attack
" "
2019-09-27 14:33:58
187.162.36.210 attackbotsspam
Automatic report - Port Scan Attack
2019-09-27 14:47:19
191.252.2.113 attack
Sep 27 07:57:39 nextcloud sshd\[18728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.2.113  user=root
Sep 27 07:57:41 nextcloud sshd\[18728\]: Failed password for root from 191.252.2.113 port 43198 ssh2
Sep 27 08:02:47 nextcloud sshd\[26267\]: Invalid user jukebox from 191.252.2.113
Sep 27 08:02:47 nextcloud sshd\[26267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.252.2.113
...
2019-09-27 15:10:53
106.13.74.162 attackbotsspam
Sep 27 07:05:50 eventyay sshd[4758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.74.162
Sep 27 07:05:52 eventyay sshd[4758]: Failed password for invalid user public from 106.13.74.162 port 53278 ssh2
Sep 27 07:10:03 eventyay sshd[4878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.74.162
...
2019-09-27 15:11:22
118.24.143.233 attackspambots
Sep 27 08:57:12 markkoudstaal sshd[11759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.143.233
Sep 27 08:57:14 markkoudstaal sshd[11759]: Failed password for invalid user la from 118.24.143.233 port 37900 ssh2
Sep 27 09:02:46 markkoudstaal sshd[12310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.143.233
2019-09-27 15:07:59
51.75.52.241 attack
Sep 27 07:01:44 web8 sshd\[28894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.52.241  user=root
Sep 27 07:01:46 web8 sshd\[28894\]: Failed password for root from 51.75.52.241 port 37724 ssh2
Sep 27 07:05:50 web8 sshd\[30793\]: Invalid user nurul from 51.75.52.241
Sep 27 07:05:50 web8 sshd\[30793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.52.241
Sep 27 07:05:53 web8 sshd\[30793\]: Failed password for invalid user nurul from 51.75.52.241 port 53492 ssh2
2019-09-27 15:06:36
206.189.165.34 attackspam
Invalid user ringside from 206.189.165.34 port 51234
2019-09-27 14:59:36
165.227.96.190 attackbots
Sep 27 07:04:20 site2 sshd\[33894\]: Invalid user hadoop from 165.227.96.190Sep 27 07:04:22 site2 sshd\[33894\]: Failed password for invalid user hadoop from 165.227.96.190 port 46904 ssh2Sep 27 07:07:44 site2 sshd\[34134\]: Invalid user sinusbot from 165.227.96.190Sep 27 07:07:46 site2 sshd\[34134\]: Failed password for invalid user sinusbot from 165.227.96.190 port 58602 ssh2Sep 27 07:11:12 site2 sshd\[34704\]: Invalid user emecha from 165.227.96.190
...
2019-09-27 15:09:28
222.186.52.124 attackbotsspam
Sep 27 08:32:31 cvbnet sshd[9797]: Failed password for root from 222.186.52.124 port 57258 ssh2
Sep 27 08:32:33 cvbnet sshd[9797]: Failed password for root from 222.186.52.124 port 57258 ssh2
...
2019-09-27 14:35:33
196.13.207.52 attackbots
Sep 27 01:23:45 Tower sshd[37722]: Connection from 196.13.207.52 port 41852 on 192.168.10.220 port 22
Sep 27 01:23:46 Tower sshd[37722]: Invalid user clamav1 from 196.13.207.52 port 41852
Sep 27 01:23:46 Tower sshd[37722]: error: Could not get shadow information for NOUSER
Sep 27 01:23:46 Tower sshd[37722]: Failed password for invalid user clamav1 from 196.13.207.52 port 41852 ssh2
Sep 27 01:23:46 Tower sshd[37722]: Received disconnect from 196.13.207.52 port 41852:11: Bye Bye [preauth]
Sep 27 01:23:46 Tower sshd[37722]: Disconnected from invalid user clamav1 196.13.207.52 port 41852 [preauth]
2019-09-27 14:43:04
167.71.56.82 attack
2019-09-27T06:37:43.225477abusebot-8.cloudsearch.cf sshd\[6620\]: Invalid user meika from 167.71.56.82 port 42738
2019-09-27 15:06:01
222.186.52.89 attackbots
Sep 27 08:56:25 MK-Soft-Root1 sshd[9259]: Failed password for root from 222.186.52.89 port 39506 ssh2
Sep 27 08:56:26 MK-Soft-Root1 sshd[9259]: Failed password for root from 222.186.52.89 port 39506 ssh2
...
2019-09-27 15:00:01
49.88.112.113 attack
Sep 26 18:52:57 web9 sshd\[19761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Sep 26 18:52:59 web9 sshd\[19761\]: Failed password for root from 49.88.112.113 port 48972 ssh2
Sep 26 18:53:29 web9 sshd\[19867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Sep 26 18:53:31 web9 sshd\[19867\]: Failed password for root from 49.88.112.113 port 26798 ssh2
Sep 26 18:53:54 web9 sshd\[19957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
2019-09-27 14:55:43

最近上报的IP列表

109.169.85.38 167.99.121.27 45.133.1.100 117.193.122.57
87.107.158.230 125.162.166.237 185.27.99.122 27.114.179.211
209.85.218.47 5.188.206.206 81.34.152.7 113.111.186.201
5.198.147.29 45.226.22.164 45.83.64.110 177.22.227.178
124.232.156.201 112.80.137.23 212.170.53.52 69.116.111.253