必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.161.29.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.161.29.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 22:49:45 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
68.29.161.50.in-addr.arpa domain name pointer c-50-161-29-68.unallocated.comcastbusiness.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.29.161.50.in-addr.arpa	name = c-50-161-29-68.unallocated.comcastbusiness.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
147.135.207.193 attackspam
Automatic report - Web App Attack
2019-07-07 12:01:19
212.129.55.152 attackspam
ssh failed login
2019-07-07 12:02:16
168.228.148.156 attackspam
failed_logins
2019-07-07 11:36:42
192.68.11.219 attackbots
Jul  7 01:45:40 vps691689 sshd[15860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.68.11.219
Jul  7 01:45:42 vps691689 sshd[15860]: Failed password for invalid user www from 192.68.11.219 port 64851 ssh2
...
2019-07-07 11:34:39
201.116.12.217 attackspambots
Triggered by Fail2Ban
2019-07-07 12:28:07
178.128.86.127 attack
detected by Fail2Ban
2019-07-07 12:26:17
61.19.38.146 attack
Jul  7 05:57:59 MK-Soft-Root2 sshd\[16230\]: Invalid user anonymous from 61.19.38.146 port 40448
Jul  7 05:57:59 MK-Soft-Root2 sshd\[16230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.38.146
Jul  7 05:58:01 MK-Soft-Root2 sshd\[16230\]: Failed password for invalid user anonymous from 61.19.38.146 port 40448 ssh2
...
2019-07-07 12:01:43
180.76.108.110 attackspambots
Jul  6 23:07:56 *** sshd[30176]: Invalid user olga from 180.76.108.110
2019-07-07 11:43:12
107.179.29.79 attack
Unauthorised access (Jul  7) SRC=107.179.29.79 LEN=40 TOS=0x08 PREC=0x20 TTL=235 ID=7949 TCP DPT=445 WINDOW=1024 SYN
2019-07-07 12:24:58
77.247.110.219 attackspam
07.07.2019 02:40:29 HTTP access blocked by firewall
2019-07-07 11:41:20
119.146.150.134 attackbotsspam
Jul  7 05:57:48 ks10 sshd[30018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.150.134 
Jul  7 05:57:50 ks10 sshd[30018]: Failed password for invalid user enlace from 119.146.150.134 port 38970 ssh2
...
2019-07-07 12:05:29
104.248.116.140 attackbots
Invalid user formation from 104.248.116.140 port 35674
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.116.140
Failed password for invalid user formation from 104.248.116.140 port 35674 ssh2
Invalid user eoffice from 104.248.116.140 port 43026
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.116.140
2019-07-07 12:12:04
123.201.20.30 attack
Jul  7 06:04:02 mail sshd\[26522\]: Invalid user gpadmin from 123.201.20.30 port 46625
Jul  7 06:04:02 mail sshd\[26522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.20.30
Jul  7 06:04:04 mail sshd\[26522\]: Failed password for invalid user gpadmin from 123.201.20.30 port 46625 ssh2
Jul  7 06:06:40 mail sshd\[26922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.201.20.30  user=root
Jul  7 06:06:42 mail sshd\[26922\]: Failed password for root from 123.201.20.30 port 59217 ssh2
2019-07-07 12:24:21
107.170.197.221 attackbotsspam
firewall-block, port(s): 8118/tcp
2019-07-07 11:40:26
185.254.122.23 attackbots
Jul  7 03:43:10 mail kernel: [2968840.114429] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.254.122.23 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=22388 PROTO=TCP SPT=45581 DPT=47881 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  7 03:43:26 mail kernel: [2968856.213313] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.254.122.23 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=17932 PROTO=TCP SPT=45581 DPT=36529 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  7 03:43:56 mail kernel: [2968885.925019] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.254.122.23 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=19677 PROTO=TCP SPT=45581 DPT=19186 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  7 03:45:00 mail kernel: [2968949.328506] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=185.254.122.23 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=46610 PROTO=TCP SPT=45581 DPT=57044 WINDOW=1024 RES=0
2019-07-07 12:21:43

最近上报的IP列表

21.46.49.62 172.155.102.175 160.112.44.115 98.38.222.85
254.214.143.243 34.38.141.125 196.162.73.74 224.93.114.176
210.193.174.13 115.65.234.86 75.24.53.210 53.15.119.179
13.123.77.230 193.115.12.4 234.77.189.68 9.87.161.181
205.84.36.50 48.149.191.144 251.3.179.2 42.220.56.108