必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ashburn

省份(region): Virginia

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.16.158.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15618
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.16.158.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 04 08:00:09 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
138.158.16.50.in-addr.arpa domain name pointer ec2-50-16-158-138.compute-1.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.158.16.50.in-addr.arpa	name = ec2-50-16-158-138.compute-1.amazonaws.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.169.91.106 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 23-03-2020 06:35:08.
2020-03-23 19:25:26
87.119.69.74 attack
23/tcp
[2020-03-23]1pkt
2020-03-23 20:00:19
139.99.125.22 attackspam
3320/tcp
[2020-03-23]1pkt
2020-03-23 20:06:07
171.246.130.4 attackspam
5555/tcp
[2020-03-23]1pkt
2020-03-23 19:48:04
217.113.10.250 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-03-23 20:07:09
194.32.119.158 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/194.32.119.158/ 
 
 NL - 1H : (5)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NL 
 NAME ASN : ASN207083 
 
 IP : 194.32.119.158 
 
 CIDR : 194.32.119.0/24 
 
 PREFIX COUNT : 24 
 
 UNIQUE IP COUNT : 9216 
 
 
 ATTACKS DETECTED ASN207083 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-03-23 07:34:43 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2020-03-23 20:05:14
103.131.71.61 attackbots
(mod_security) mod_security (id:210730) triggered by 103.131.71.61 (VN/Vietnam/bot-103-131-71-61.coccoc.com): 5 in the last 3600 secs
2020-03-23 19:58:12
83.13.209.154 attackbots
Mar 23 11:00:20 IngegnereFirenze sshd[2797]: Did not receive identification string from 83.13.209.154 port 53744
...
2020-03-23 19:41:56
177.69.187.241 attackspam
Mar 23 08:26:33 santamaria sshd\[7507\]: Invalid user weuser from 177.69.187.241
Mar 23 08:26:33 santamaria sshd\[7507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.187.241
Mar 23 08:26:35 santamaria sshd\[7507\]: Failed password for invalid user weuser from 177.69.187.241 port 4545 ssh2
...
2020-03-23 19:39:58
113.183.10.255 attackspam
Unauthorized connection attempt from IP address 113.183.10.255 on Port 445(SMB)
2020-03-23 19:24:55
125.224.161.239 attackspam
20/3/23@03:37:55: FAIL: Alarm-Network address from=125.224.161.239
20/3/23@03:37:55: FAIL: Alarm-Network address from=125.224.161.239
...
2020-03-23 19:32:37
61.95.233.61 attackspam
2020-03-23T11:50:59.410468shield sshd\[9711\]: Invalid user wc from 61.95.233.61 port 41202
2020-03-23T11:50:59.418929shield sshd\[9711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61
2020-03-23T11:51:01.045455shield sshd\[9711\]: Failed password for invalid user wc from 61.95.233.61 port 41202 ssh2
2020-03-23T11:55:14.896730shield sshd\[11097\]: Invalid user fl from 61.95.233.61 port 54692
2020-03-23T11:55:14.900702shield sshd\[11097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61
2020-03-23 19:55:32
220.191.50.144 attackbotsspam
Unauthorised access (Mar 23) SRC=220.191.50.144 LEN=40 TTL=52 ID=13962 TCP DPT=8080 WINDOW=48782 SYN 
Unauthorised access (Mar 23) SRC=220.191.50.144 LEN=40 TTL=52 ID=41143 TCP DPT=8080 WINDOW=48782 SYN 
Unauthorised access (Mar 23) SRC=220.191.50.144 LEN=40 TTL=52 ID=18853 TCP DPT=8080 WINDOW=63920 SYN 
Unauthorised access (Mar 23) SRC=220.191.50.144 LEN=40 TTL=52 ID=14388 TCP DPT=8080 WINDOW=63920 SYN
2020-03-23 19:31:47
185.139.68.152 attackbots
SSH/22 MH Probe, BF, Hack -
2020-03-23 19:38:30
27.156.125.22 attack
Mar 23 10:23:51 vps339862 kernel: \[4174347.141390\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=27.156.125.22 DST=51.254.206.43 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=58890 DF PROTO=TCP SPT=56152 DPT=12850 SEQ=4248240840 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 OPT \(020405AC0402080A4D9E7E110000000001030307\) 
Mar 23 10:23:52 vps339862 kernel: \[4174348.158480\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=27.156.125.22 DST=51.254.206.43 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=58891 DF PROTO=TCP SPT=56152 DPT=12850 SEQ=4248240840 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 OPT \(020405AC0402080A4D9E82090000000001030307\) 
Mar 23 10:23:54 vps339862 kernel: \[4174350.173289\] \[iptables\] PORT DENIED: IN=eth0 OUT= MAC=fa:16:3e:65:a1:f6:06:39:8f:aa:3b:a2:08:00 SRC=27.156.125.22 DST=51.254.206.43 LEN=60 TOS=0x00 PREC=0x00 TTL=47 ID=58892 DF PROTO=TCP SPT=56152 DPT=12850 SEQ=4248240840 ACK=0 WINDOW=29200 RES=0x00 SY
...
2020-03-23 19:33:16

最近上报的IP列表

18.207.156.125 10.79.248.185 14.152.91.194 14.152.91.139
34.229.122.210 213.199.38.249 113.220.39.243 113.220.10.130
240e:469:5240:213:d80a:b8ff:fefc:3ae8 240e:469:5206:25f:d84d:33ff:fe81:f605 240e:469:5247:607:88ca:ecff:fe59:e813 108.130.164.240
183.7.149.229 167.99.228.84 195.184.76.2 119.147.6.237
107.173.123.98 20.169.107.49 113.215.189.132 210.177.227.51