必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.168.91.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42382
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.168.91.132.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 03:18:40 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
132.91.168.50.in-addr.arpa domain name pointer c-50-168-91-132.unallocated.comcastbusiness.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.91.168.50.in-addr.arpa	name = c-50-168-91-132.unallocated.comcastbusiness.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
191.8.187.245 attackbots
Sep 11 07:51:33 main sshd[27799]: Failed password for invalid user oracle from 191.8.187.245 port 41838 ssh2
Sep 11 08:05:52 main sshd[27890]: Failed password for invalid user natalia from 191.8.187.245 port 60608 ssh2
Sep 11 08:10:32 main sshd[27965]: Failed password for invalid user richetti from 191.8.187.245 port 38647 ssh2
Sep 11 08:19:50 main sshd[28028]: Failed password for invalid user sanjay from 191.8.187.245 port 51161 ssh2
Sep 11 08:33:47 main sshd[28120]: Failed password for invalid user admin from 191.8.187.245 port 41691 ssh2
Sep 11 08:38:31 main sshd[28151]: Failed password for invalid user inssserver from 191.8.187.245 port 47954 ssh2
Sep 11 09:07:01 main sshd[28415]: Failed password for invalid user test3 from 191.8.187.245 port 57251 ssh2
2020-09-12 05:19:32
36.91.40.132 attackspambots
Sep 12 02:13:22 dhoomketu sshd[3020042]: Failed password for root from 36.91.40.132 port 36416 ssh2
Sep 12 02:14:53 dhoomketu sshd[3020068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.40.132  user=root
Sep 12 02:14:56 dhoomketu sshd[3020068]: Failed password for root from 36.91.40.132 port 54298 ssh2
Sep 12 02:16:49 dhoomketu sshd[3020091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.40.132  user=root
Sep 12 02:16:50 dhoomketu sshd[3020091]: Failed password for root from 36.91.40.132 port 43950 ssh2
...
2020-09-12 05:03:52
121.201.119.77 attackbotsspam
20/9/11@12:57:29: FAIL: Alarm-Intrusion address from=121.201.119.77
...
2020-09-12 05:28:18
157.45.29.243 attackspam
20/9/11@12:57:40: FAIL: Alarm-Intrusion address from=157.45.29.243
20/9/11@12:57:41: FAIL: Alarm-Intrusion address from=157.45.29.243
...
2020-09-12 05:21:22
106.54.253.41 attackspambots
Sep 11 22:13:52 sshgateway sshd\[21513\]: Invalid user admin from 106.54.253.41
Sep 11 22:13:52 sshgateway sshd\[21513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.253.41
Sep 11 22:13:53 sshgateway sshd\[21513\]: Failed password for invalid user admin from 106.54.253.41 port 36276 ssh2
2020-09-12 05:07:17
222.186.30.112 attackspambots
Sep 11 17:00:05 ny01 sshd[31326]: Failed password for root from 222.186.30.112 port 38380 ssh2
Sep 11 17:00:13 ny01 sshd[31341]: Failed password for root from 222.186.30.112 port 34466 ssh2
Sep 11 17:00:16 ny01 sshd[31341]: Failed password for root from 222.186.30.112 port 34466 ssh2
2020-09-12 05:00:35
106.12.219.184 attackspambots
2020-09-11 15:48:10.053029-0500  localhost sshd[67814]: Failed password for root from 106.12.219.184 port 55268 ssh2
2020-09-12 05:08:52
51.68.44.13 attackspambots
2020-09-12T03:05:34.571591hostname sshd[5385]: Failed password for root from 51.68.44.13 port 47268 ssh2
2020-09-12T03:09:39.903369hostname sshd[7081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.ip-51-68-44.eu  user=root
2020-09-12T03:09:42.046089hostname sshd[7081]: Failed password for root from 51.68.44.13 port 58790 ssh2
...
2020-09-12 05:13:36
51.83.68.213 attackbotsspam
Sep 11 23:26:28 vpn01 sshd[4230]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.68.213
Sep 11 23:26:30 vpn01 sshd[4230]: Failed password for invalid user 12123434 from 51.83.68.213 port 35738 ssh2
...
2020-09-12 05:31:15
118.244.128.4 attack
Sep 11 22:26:22 sshgateway sshd\[23515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.244.128.4  user=root
Sep 11 22:26:25 sshgateway sshd\[23515\]: Failed password for root from 118.244.128.4 port 23999 ssh2
Sep 11 22:28:15 sshgateway sshd\[23757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.244.128.4  user=root
2020-09-12 05:23:58
103.197.92.193 attackspambots
20/9/11@13:29:15: FAIL: Alarm-Network address from=103.197.92.193
20/9/11@13:29:15: FAIL: Alarm-Network address from=103.197.92.193
...
2020-09-12 05:01:31
177.37.71.40 attack
Sep 11 21:58:16 sshgateway sshd\[18884\]: Invalid user aunon from 177.37.71.40
Sep 11 21:58:16 sshgateway sshd\[18884\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.37.71.40
Sep 11 21:58:18 sshgateway sshd\[18884\]: Failed password for invalid user aunon from 177.37.71.40 port 51825 ssh2
2020-09-12 05:02:35
189.206.165.62 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-09-12 05:30:00
195.54.167.153 attackspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-09-11T15:03:25Z and 2020-09-11T16:58:07Z
2020-09-12 05:04:38
116.58.172.118 attackspambots
Sep 11 19:58:36 jane sshd[13706]: Failed password for root from 116.58.172.118 port 53937 ssh2
...
2020-09-12 05:14:21

最近上报的IP列表

209.12.107.46 208.71.125.153 54.205.78.113 74.121.53.31
64.2.95.91 192.115.191.75 55.62.203.42 16.61.104.62
35.76.26.91 238.244.83.242 243.39.56.225 179.45.236.211
233.243.247.29 85.109.88.47 30.215.243.116 232.224.78.103
151.46.231.59 72.110.133.97 144.51.156.102 121.255.86.208