必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.23.40.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63784
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.23.40.14.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019062301 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jun 24 06:58:32 CST 2019
;; MSG SIZE  rcvd: 115
HOST信息:
14.40.23.50.in-addr.arpa domain name pointer e.28.1732.ip4.static.sl-reverse.com.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
14.40.23.50.in-addr.arpa	name = e.28.1732.ip4.static.sl-reverse.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
201.234.195.154 attackspam
Unauthorized connection attempt detected from IP address 201.234.195.154 to port 3389
2020-07-01 12:27:51
202.72.225.17 attackspam
Multiple SSH authentication failures from 202.72.225.17
2020-07-01 12:21:51
141.98.9.157 attack
Brute-force attempt banned
2020-07-01 12:37:34
94.102.51.58 attackbotsspam
 TCP (SYN) 94.102.51.58:43379 -> port 136, len 44
2020-07-01 12:35:23
20.50.126.86 attack
Jun 30 17:58:23 ajax sshd[2261]: Failed password for root from 20.50.126.86 port 27772 ssh2
2020-07-01 12:30:35
193.46.77.209 attack
Unauthorized connection attempt detected from IP address 193.46.77.209 to port 445 [T]
2020-07-01 12:03:31
187.237.121.34 attackspam
Unauthorized connection attempt: SRC=187.237.121.34
...
2020-07-01 12:48:01
80.82.65.253 attackbotsspam
TCP port : 34456
2020-07-01 10:48:15
43.242.214.183 attack
 TCP (SYN) 43.242.214.183:46264 -> port 1433, len 40
2020-07-01 12:30:11
111.68.103.248 attackspambots
Honeypot attack, port: 445, PTR: ciitlahore.edu.pk.
2020-07-01 12:39:02
103.93.136.242 attackspambots
webserver:80 [28/Jun/2020]  "GET /admin/login.asp HTTP/1.1" 400 0
2020-07-01 12:45:19
1.160.33.180 attackspambots
 TCP (SYN) 1.160.33.180:36695 -> port 23, len 40
2020-07-01 12:06:55
131.196.1.52 attack
Unauthorized connection attempt detected from IP address 131.196.1.52 to port 8080
2020-07-01 12:03:51
180.71.58.82 attackbots
Jun 30 14:03:48 XXXXXX sshd[31729]: Invalid user zuperman from 180.71.58.82 port 34402
2020-07-01 12:01:39
14.139.62.139 attackspam
Unauthorized connection attempt detected from IP address 14.139.62.139 to port 1433
2020-07-01 12:16:14

最近上报的IP列表

186.249.94.135 177.64.208.225 66.94.85.26 36.73.198.199
170.78.123.48 212.87.156.18 41.47.66.193 61.163.176.117
13.232.253.80 129.126.68.238 121.226.60.243 222.252.16.190
92.222.130.123 154.65.33.198 114.143.107.194 35.226.254.53
203.7.96.159 107.175.147.211 185.86.164.101 179.191.63.43