必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Comcast Cable Communications, LLC

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.136.181.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55299
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.136.181.1.			IN	A

;; AUTHORITY SECTION:
.			2099	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050200 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri May 03 00:42:29 +08 2019
;; MSG SIZE  rcvd: 116

HOST信息:
1.181.136.50.in-addr.arpa domain name pointer c-50-136-181-1.hsd1.ca.comcast.net.
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
1.181.136.50.in-addr.arpa	name = c-50-136-181-1.hsd1.ca.comcast.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.117.0 attack
Sep  8 15:48:50 melroy-server sshd[3990]: Failed password for root from 178.128.117.0 port 59404 ssh2
...
2020-09-08 22:13:23
61.218.134.110 attack
 TCP (SYN) 61.218.134.110:51570 -> port 445, len 44
2020-09-08 22:43:21
92.63.194.104 attackspam
Port scan: Attack repeated for 24 hours
2020-09-08 22:24:07
49.73.177.108 attack
Brute forcing email accounts
2020-09-08 22:46:47
222.186.42.137 attackbots
Sep  8 16:28:55 ovpn sshd\[6376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
Sep  8 16:28:57 ovpn sshd\[6376\]: Failed password for root from 222.186.42.137 port 40017 ssh2
Sep  8 16:29:00 ovpn sshd\[6376\]: Failed password for root from 222.186.42.137 port 40017 ssh2
Sep  8 16:29:02 ovpn sshd\[6376\]: Failed password for root from 222.186.42.137 port 40017 ssh2
Sep  8 16:29:10 ovpn sshd\[6431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.137  user=root
2020-09-08 22:32:26
113.161.82.85 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-09-08 23:01:31
190.121.4.152 attackspambots
2020-09-07T18:52:29.879284cyberdyne sshd[88194]: Failed password for invalid user pi from 190.121.4.152 port 53990 ssh2
2020-09-07T18:52:28.161870cyberdyne sshd[88196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.121.4.152
2020-09-07T18:52:27.916424cyberdyne sshd[88196]: Invalid user pi from 190.121.4.152 port 53992
2020-09-07T18:52:29.914888cyberdyne sshd[88196]: Failed password for invalid user pi from 190.121.4.152 port 53992 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.121.4.152
2020-09-08 22:44:16
106.12.165.53 attack
Jul  8 09:22:28 server sshd[19804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.165.53
Jul  8 09:22:29 server sshd[19804]: Failed password for invalid user zoro from 106.12.165.53 port 58776 ssh2
Jul  8 10:27:17 server sshd[23614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.165.53
Jul  8 10:27:18 server sshd[23614]: Failed password for invalid user steaua from 106.12.165.53 port 44710 ssh2
2020-09-08 22:46:25
140.143.244.91 attackbotsspam
Sep  8 11:20:28 rancher-0 sshd[1495338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.244.91  user=root
Sep  8 11:20:30 rancher-0 sshd[1495338]: Failed password for root from 140.143.244.91 port 34954 ssh2
...
2020-09-08 22:18:28
178.33.66.25 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-08 22:45:06
218.92.0.208 attackbots
Sep  8 13:10:43 eventyay sshd[26690]: Failed password for root from 218.92.0.208 port 37899 ssh2
Sep  8 13:12:09 eventyay sshd[26703]: Failed password for root from 218.92.0.208 port 40793 ssh2
Sep  8 13:12:11 eventyay sshd[26703]: Failed password for root from 218.92.0.208 port 40793 ssh2
...
2020-09-08 22:12:31
83.150.8.14 attack
83.150.8.14 - - [07/Sep/2020:16:51:22 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
83.150.8.14 - - [07/Sep/2020:16:51:22 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
83.150.8.14 - - [07/Sep/2020:18:52:43 +0200] "GET /wp-login.php HTTP/1.1" 200 9184 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-08 22:35:55
5.190.81.105 attackspam
2020-09-07 02:41:53 plain_virtual_exim authenticator failed for ([5.190.81.105]) [5.190.81.105]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.190.81.105
2020-09-08 23:00:00
82.141.161.227 attackspambots
Aug 30 13:50:18 mail.srvfarm.net postfix/smtpd[3748496]: warning: unknown[82.141.161.227]: SASL PLAIN authentication failed: 
Aug 30 13:50:18 mail.srvfarm.net postfix/smtpd[3748496]: lost connection after AUTH from unknown[82.141.161.227]
Aug 30 13:55:47 mail.srvfarm.net postfix/smtps/smtpd[3751855]: warning: unknown[82.141.161.227]: SASL PLAIN authentication failed: 
Aug 30 13:55:47 mail.srvfarm.net postfix/smtps/smtpd[3751855]: lost connection after AUTH from unknown[82.141.161.227]
Aug 30 13:56:45 mail.srvfarm.net postfix/smtpd[3756796]: warning: unknown[82.141.161.227]: SASL PLAIN authentication failed: 
Aug 30 13:56:45 mail.srvfarm.net postfix/smtpd[3756796]: lost connection after AUTH from unknown[82.141.161.227]
2020-09-08 23:03:33
5.188.108.158 attackbotsspam
Email rejected due to spam filtering
2020-09-08 22:23:06

最近上报的IP列表

148.224.61.204 212.103.181.253 162.251.121.143 39.47.92.235
98.2.85.0 64.226.153.88 172.104.94.121 182.78.20.176
118.220.175.92 141.67.142.86 104.131.11.76 192.217.197.180
185.26.147.175 129.67.30.73 39.100.146.128 151.243.16.126
118.234.234.119 211.103.131.74 107.170.234.235 23.27.109.30