必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.140.4.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19917
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.140.4.127.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 18:27:59 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
127.4.140.50.in-addr.arpa domain name pointer c-50-140-4-127.hsd1.fl.comcast.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
127.4.140.50.in-addr.arpa	name = c-50-140-4-127.hsd1.fl.comcast.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
13.77.68.171 attackspambots
2019-12-17T14:51:45.885016shield sshd\[4424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.68.171  user=root
2019-12-17T14:51:48.271267shield sshd\[4424\]: Failed password for root from 13.77.68.171 port 59624 ssh2
2019-12-17T14:51:58.865391shield sshd\[4510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.68.171  user=root
2019-12-17T14:52:00.704473shield sshd\[4510\]: Failed password for root from 13.77.68.171 port 39456 ssh2
2019-12-17T14:52:15.365750shield sshd\[4654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.77.68.171  user=root
2019-12-18 03:17:58
51.89.68.141 attackbotsspam
Dec 17 16:33:26 eventyay sshd[21843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.68.141
Dec 17 16:33:28 eventyay sshd[21843]: Failed password for invalid user icinga from 51.89.68.141 port 57158 ssh2
Dec 17 16:39:03 eventyay sshd[22035]: Failed password for root from 51.89.68.141 port 39902 ssh2
...
2019-12-18 03:25:54
167.99.217.194 attackspambots
Dec 17 18:12:43 v22018086721571380 sshd[27540]: Failed password for invalid user mir from 167.99.217.194 port 39076 ssh2
2019-12-18 03:47:05
181.225.67.170 attack
Unauthorized connection attempt detected from IP address 181.225.67.170 to port 445
2019-12-18 03:31:30
122.49.35.37 attackbots
Dec 17 18:54:31 localhost sshd\[3956\]: Invalid user test from 122.49.35.37 port 56552
Dec 17 18:54:31 localhost sshd\[3956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.49.35.37
Dec 17 18:54:33 localhost sshd\[3956\]: Failed password for invalid user test from 122.49.35.37 port 56552 ssh2
...
2019-12-18 03:28:26
46.101.224.184 attack
Dec 17 22:11:39 server sshd\[20876\]: Invalid user hirayama from 46.101.224.184
Dec 17 22:11:39 server sshd\[20876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184 
Dec 17 22:11:40 server sshd\[20876\]: Failed password for invalid user hirayama from 46.101.224.184 port 34460 ssh2
Dec 17 22:21:34 server sshd\[23718\]: Invalid user claros from 46.101.224.184
Dec 17 22:21:34 server sshd\[23718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.224.184 
...
2019-12-18 03:49:43
68.183.236.92 attack
Dec 17 18:17:43 vps647732 sshd[12194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92
Dec 17 18:17:44 vps647732 sshd[12194]: Failed password for invalid user obata from 68.183.236.92 port 56522 ssh2
...
2019-12-18 03:46:07
111.119.251.58 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=10022)(12172003)
2019-12-18 03:47:21
89.222.181.58 attackspam
Dec 17 20:05:34 localhost sshd\[30205\]: Invalid user wingate from 89.222.181.58 port 48578
Dec 17 20:05:34 localhost sshd\[30205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.222.181.58
Dec 17 20:05:36 localhost sshd\[30205\]: Failed password for invalid user wingate from 89.222.181.58 port 48578 ssh2
2019-12-18 03:25:35
196.189.56.34 attackbots
Dec 17 15:15:42 mxgate1 postfix/postscreen[29220]: CONNECT from [196.189.56.34]:46438 to [176.31.12.44]:25
Dec 17 15:15:42 mxgate1 postfix/dnsblog[29437]: addr 196.189.56.34 listed by domain zen.spamhaus.org as 127.0.0.3
Dec 17 15:15:42 mxgate1 postfix/dnsblog[29437]: addr 196.189.56.34 listed by domain zen.spamhaus.org as 127.0.0.11
Dec 17 15:15:42 mxgate1 postfix/dnsblog[29437]: addr 196.189.56.34 listed by domain zen.spamhaus.org as 127.0.0.4
Dec 17 15:15:42 mxgate1 postfix/dnsblog[29435]: addr 196.189.56.34 listed by domain cbl.abuseat.org as 127.0.0.2
Dec 17 15:15:42 mxgate1 postfix/dnsblog[29434]: addr 196.189.56.34 listed by domain bl.spamcop.net as 127.0.0.2
Dec 17 15:15:42 mxgate1 postfix/dnsblog[29436]: addr 196.189.56.34 listed by domain b.barracudacentral.org as 127.0.0.2
Dec 17 15:15:48 mxgate1 postfix/postscreen[29220]: DNSBL rank 5 for [196.189.56.34]:46438
Dec x@x
Dec 17 15:15:49 mxgate1 postfix/postscreen[29220]: HANGUP after 0.78 from [196.189.56.34]:4........
-------------------------------
2019-12-18 03:16:59
142.93.26.245 attackspambots
Dec 17 16:50:33 vps691689 sshd[7956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.26.245
Dec 17 16:50:36 vps691689 sshd[7956]: Failed password for invalid user liesel from 142.93.26.245 port 55640 ssh2
...
2019-12-18 03:53:06
54.38.192.96 attackbots
Dec 17 17:24:55 lnxweb61 sshd[29455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.192.96
2019-12-18 03:27:19
219.93.20.155 attackspambots
Feb 28 01:29:10 vtv3 sshd[16517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.93.20.155
Mar  2 23:04:06 vtv3 sshd[28736]: Invalid user administrator from 219.93.20.155 port 36681
Mar  2 23:04:06 vtv3 sshd[28736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.93.20.155
Mar  2 23:04:08 vtv3 sshd[28736]: Failed password for invalid user administrator from 219.93.20.155 port 36681 ssh2
Mar  2 23:07:09 vtv3 sshd[30184]: Invalid user jtf from 219.93.20.155 port 53058
Mar  2 23:07:09 vtv3 sshd[30184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.93.20.155
Mar  4 21:45:41 vtv3 sshd[4111]: Invalid user tx from 219.93.20.155 port 53240
Mar  4 21:45:41 vtv3 sshd[4111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.93.20.155
Mar  4 21:45:43 vtv3 sshd[4111]: Failed password for invalid user tx from 219.93.20.155 port 53240 ssh2
Mar  4 21:
2019-12-18 03:41:47
106.12.93.25 attackspam
Dec 17 11:31:32 plusreed sshd[18756]: Invalid user ssh from 106.12.93.25
...
2019-12-18 03:34:38
81.16.117.210 attackbotsspam
Unauthorized connection attempt from IP address 81.16.117.210
2019-12-18 03:26:51

最近上报的IP列表

95.13.63.224 173.123.55.248 80.95.63.117 226.208.198.35
56.80.112.130 224.240.59.188 125.239.101.108 2.154.113.252
164.179.216.106 162.23.101.9 172.182.189.249 234.96.130.178
187.123.185.48 36.167.63.12 97.36.171.150 225.20.131.170
98.95.157.223 142.72.169.44 247.77.207.155 192.209.251.124