必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.18.20.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58794
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.18.20.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121703 1800 900 604800 86400

;; Query time: 220 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 18 12:29:31 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
242.20.18.50.in-addr.arpa domain name pointer ec2-50-18-20-242.us-west-1.compute.amazonaws.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.20.18.50.in-addr.arpa	name = ec2-50-18-20-242.us-west-1.compute.amazonaws.com.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
46.35.19.18 attackspam
20 attempts against mh-ssh on cloud
2020-09-09 06:55:48
188.166.9.210 attackbotsspam
(sshd) Failed SSH login from 188.166.9.210 (NL/Netherlands/-): 5 in the last 3600 secs
2020-09-09 06:48:48
187.176.185.65 attackspambots
Sep  8 20:15:59 eventyay sshd[3555]: Failed password for root from 187.176.185.65 port 45050 ssh2
Sep  8 20:20:05 eventyay sshd[3643]: Failed password for root from 187.176.185.65 port 51010 ssh2
...
2020-09-09 06:44:38
128.199.254.188 attackbots
Sep  8 20:30:08 jane sshd[20866]: Failed password for root from 128.199.254.188 port 49989 ssh2
...
2020-09-09 06:38:17
222.186.180.17 attack
Sep  8 23:42:56 ajax sshd[25215]: Failed password for root from 222.186.180.17 port 60904 ssh2
Sep  8 23:43:00 ajax sshd[25215]: Failed password for root from 222.186.180.17 port 60904 ssh2
2020-09-09 06:45:00
61.174.171.62 attack
2020-09-08T00:58:10.751586hostname sshd[28107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.174.171.62  user=bin
2020-09-08T00:58:12.674913hostname sshd[28107]: Failed password for bin from 61.174.171.62 port 62940 ssh2
2020-09-08T01:02:08.012956hostname sshd[30320]: Invalid user green from 61.174.171.62 port 64275
...
2020-09-09 06:56:42
218.92.0.199 attack
2020-09-09T00:05:28.350444rem.lavrinenko.info sshd[30418]: refused connect from 218.92.0.199 (218.92.0.199)
2020-09-09T00:07:02.069983rem.lavrinenko.info sshd[30420]: refused connect from 218.92.0.199 (218.92.0.199)
2020-09-09T00:08:28.794741rem.lavrinenko.info sshd[30423]: refused connect from 218.92.0.199 (218.92.0.199)
2020-09-09T00:10:04.423896rem.lavrinenko.info sshd[30424]: refused connect from 218.92.0.199 (218.92.0.199)
2020-09-09T00:11:27.753825rem.lavrinenko.info sshd[30427]: refused connect from 218.92.0.199 (218.92.0.199)
...
2020-09-09 06:19:30
212.58.121.105 attackspam
1599584062 - 09/08/2020 18:54:22 Host: 212.58.121.105/212.58.121.105 Port: 445 TCP Blocked
2020-09-09 06:57:22
103.75.149.106 attack
$f2bV_matches
2020-09-09 06:33:25
142.93.195.15 attack
2020-09-08T18:59:04+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-09-09 06:31:32
106.12.40.74 attack
" "
2020-09-09 06:24:52
51.178.27.237 attackbots
*Port Scan* detected from 51.178.27.237 (FR/France/Hauts-de-France/Gravelines/237.ip-51-178-27.eu). 4 hits in the last 235 seconds
2020-09-09 06:25:46
222.186.31.166 attackbots
Sep  9 00:49:47 * sshd[21655]: Failed password for root from 222.186.31.166 port 50619 ssh2
2020-09-09 06:54:35
85.209.0.100 attackspambots
 TCP (SYN) 85.209.0.100:6818 -> port 22, len 60
2020-09-09 06:46:31
170.239.47.251 attackbots
2020-09-08T20:07:44.662996vps773228.ovh.net sshd[20685]: Failed password for root from 170.239.47.251 port 36548 ssh2
2020-09-08T20:12:41.339409vps773228.ovh.net sshd[20687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=sgp.ddsatnet.com.br  user=root
2020-09-08T20:12:43.060767vps773228.ovh.net sshd[20687]: Failed password for root from 170.239.47.251 port 50070 ssh2
2020-09-08T20:17:17.384920vps773228.ovh.net sshd[20689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=sgp.ddsatnet.com.br  user=root
2020-09-08T20:17:19.657686vps773228.ovh.net sshd[20689]: Failed password for root from 170.239.47.251 port 35182 ssh2
...
2020-09-09 06:51:23

最近上报的IP列表

84.39.243.12 54.197.39.68 86.41.49.27 54.88.235.125
56.141.96.11 162.205.107.227 245.172.78.113 59.38.50.15
154.109.106.253 234.254.192.250 243.247.116.110 207.180.143.209
107.125.6.215 248.19.189.130 152.226.7.96 233.161.31.133
19.72.194.144 175.35.222.131 213.123.58.163 189.40.181.169