必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Chicago

省份(region): Illinois

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): Comcast Cable Communications, LLC

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.193.107.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28638
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.193.107.149.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061400 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jun 15 03:15:55 CST 2019
;; MSG SIZE  rcvd: 118

HOST信息:
149.107.193.50.in-addr.arpa domain name pointer 50-193-107-149-static.hfc.comcastbusiness.net.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
149.107.193.50.in-addr.arpa	name = 50-193-107-149-static.hfc.comcastbusiness.net.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.89.23.22 attack
2020-02-21T00:58:39.091Z CLOSE host=51.89.23.22 port=50868 fd=4 time=20.006 bytes=8
...
2020-03-13 03:03:39
45.147.228.41 attack
looking for open 25/tcp
2020-03-13 02:48:42
51.141.11.226 attackbots
2019-11-27T01:59:12.206Z CLOSE host=51.141.11.226 port=32838 fd=4 time=50.034 bytes=71
2019-11-27T01:59:12.206Z CLOSE host=51.141.11.226 port=36034 fd=5 time=40.021 bytes=63
2019-11-27T01:59:12.208Z CLOSE host=51.141.11.226 port=39534 fd=6 time=30.002 bytes=36
...
2020-03-13 03:10:10
27.78.14.83 attackbotsspam
sshd jail - ssh hack attempt
2020-03-13 02:55:30
58.56.161.52 attack
2020-02-17T03:15:14.814Z CLOSE host=58.56.161.52 port=37323 fd=4 time=20.011 bytes=27
...
2020-03-13 02:52:40
77.42.126.212 attackspambots
Automatic report - Port Scan Attack
2020-03-13 03:23:26
177.154.224.38 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 02:50:04
196.246.200.192 attackspambots
Mar 12 19:28:35 lcl-usvr-02 sshd[5154]: Invalid user admin from 196.246.200.192 port 59054
Mar 12 19:28:35 lcl-usvr-02 sshd[5154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.246.200.192
Mar 12 19:28:35 lcl-usvr-02 sshd[5154]: Invalid user admin from 196.246.200.192 port 59054
Mar 12 19:28:37 lcl-usvr-02 sshd[5154]: Failed password for invalid user admin from 196.246.200.192 port 59054 ssh2
Mar 12 19:28:51 lcl-usvr-02 sshd[5165]: Invalid user admin from 196.246.200.192 port 59330
...
2020-03-13 03:16:51
193.104.205.80 attack
Wordpress attack
2020-03-13 03:12:42
54.38.188.34 attack
Mar 12 19:03:03 tuxlinux sshd[24372]: Invalid user eric from 54.38.188.34 port 36370
Mar 12 19:03:03 tuxlinux sshd[24372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.188.34 
Mar 12 19:03:03 tuxlinux sshd[24372]: Invalid user eric from 54.38.188.34 port 36370
Mar 12 19:03:03 tuxlinux sshd[24372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.188.34 
Mar 12 19:03:03 tuxlinux sshd[24372]: Invalid user eric from 54.38.188.34 port 36370
Mar 12 19:03:03 tuxlinux sshd[24372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.188.34 
Mar 12 19:03:04 tuxlinux sshd[24372]: Failed password for invalid user eric from 54.38.188.34 port 36370 ssh2
...
2020-03-13 02:46:51
113.23.6.139 attackbotsspam
1584016132 - 03/12/2020 13:28:52 Host: 113.23.6.139/113.23.6.139 Port: 445 TCP Blocked
2020-03-13 03:15:29
50.237.139.58 attack
2020-01-07T05:35:22.352Z CLOSE host=50.237.139.58 port=56585 fd=4 time=20.020 bytes=21
...
2020-03-13 03:10:21
206.189.114.0 attackbots
Mar 12 20:10:10 tuxlinux sshd[25801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.114.0  user=root
Mar 12 20:10:12 tuxlinux sshd[25801]: Failed password for root from 206.189.114.0 port 33128 ssh2
Mar 12 20:10:10 tuxlinux sshd[25801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.114.0  user=root
Mar 12 20:10:12 tuxlinux sshd[25801]: Failed password for root from 206.189.114.0 port 33128 ssh2
Mar 12 20:13:14 tuxlinux sshd[25844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.114.0  user=root
...
2020-03-13 03:22:58
187.162.63.143 attackspambots
Automatic report - Port Scan Attack
2020-03-13 03:04:56
49.235.58.208 attackbotsspam
...
2020-03-13 03:04:38

最近上报的IP列表

110.14.155.204 37.35.90.230 24.33.43.218 117.224.42.137
46.97.199.206 213.164.239.100 72.181.121.202 198.98.53.76
173.211.75.210 47.85.160.220 217.62.105.139 77.111.244.168
95.21.221.3 80.50.222.95 198.162.217.60 63.192.245.213
66.21.82.210 100.251.95.201 81.61.22.90 36.161.34.17