必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.31.244.92
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27624
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.31.244.92.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022702 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 05:43:56 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
92.244.31.50.in-addr.arpa domain name pointer unknown.servercentral.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
92.244.31.50.in-addr.arpa	name = unknown.servercentral.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.255.168.127 attack
Sep 21 17:49:16 mail sshd\[11068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.127
Sep 21 17:49:18 mail sshd\[11068\]: Failed password for invalid user marko from 51.255.168.127 port 51720 ssh2
Sep 21 17:53:19 mail sshd\[11650\]: Invalid user celeste from 51.255.168.127 port 35730
Sep 21 17:53:19 mail sshd\[11650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.168.127
Sep 21 17:53:22 mail sshd\[11650\]: Failed password for invalid user celeste from 51.255.168.127 port 35730 ssh2
2019-09-22 00:00:40
194.28.50.23 attack
Sep 21 17:51:47 mail sshd\[11515\]: Invalid user wwwrun from 194.28.50.23 port 48370
Sep 21 17:51:47 mail sshd\[11515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.28.50.23
Sep 21 17:51:49 mail sshd\[11515\]: Failed password for invalid user wwwrun from 194.28.50.23 port 48370 ssh2
Sep 21 17:55:44 mail sshd\[11868\]: Invalid user operator from 194.28.50.23 port 59126
Sep 21 17:55:44 mail sshd\[11868\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.28.50.23
2019-09-21 23:58:14
1.71.129.49 attack
Sep 21 17:38:05 vps691689 sshd[22039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.71.129.49
Sep 21 17:38:07 vps691689 sshd[22039]: Failed password for invalid user mysql from 1.71.129.49 port 51687 ssh2
...
2019-09-21 23:56:46
209.17.97.74 attackspam
Automatic report - Banned IP Access
2019-09-21 23:37:23
46.38.144.32 attackspam
Sep 21 17:39:51 relay postfix/smtpd\[27687\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 21 17:40:17 relay postfix/smtpd\[22654\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 21 17:42:15 relay postfix/smtpd\[27687\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 21 17:42:42 relay postfix/smtpd\[824\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 21 17:44:41 relay postfix/smtpd\[23396\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-21 23:48:37
5.135.181.11 attackbotsspam
Sep 21 15:44:34 Ubuntu-1404-trusty-64-minimal sshd\[4650\]: Invalid user www from 5.135.181.11
Sep 21 15:44:34 Ubuntu-1404-trusty-64-minimal sshd\[4650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.11
Sep 21 15:44:36 Ubuntu-1404-trusty-64-minimal sshd\[4650\]: Failed password for invalid user www from 5.135.181.11 port 49400 ssh2
Sep 21 16:00:40 Ubuntu-1404-trusty-64-minimal sshd\[18406\]: Invalid user ceinfo from 5.135.181.11
Sep 21 16:00:40 Ubuntu-1404-trusty-64-minimal sshd\[18406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.135.181.11
2019-09-22 00:02:09
213.6.8.38 attackbots
Sep 21 15:48:37 hcbbdb sshd\[19021\]: Invalid user less from 213.6.8.38
Sep 21 15:48:37 hcbbdb sshd\[19021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.8.38
Sep 21 15:48:39 hcbbdb sshd\[19021\]: Failed password for invalid user less from 213.6.8.38 port 57913 ssh2
Sep 21 15:53:59 hcbbdb sshd\[19654\]: Invalid user admin from 213.6.8.38
Sep 21 15:53:59 hcbbdb sshd\[19654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.6.8.38
2019-09-22 00:19:12
132.232.40.86 attackbots
Sep 21 17:08:40 vps647732 sshd[4841]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.40.86
Sep 21 17:08:42 vps647732 sshd[4841]: Failed password for invalid user vj from 132.232.40.86 port 40922 ssh2
...
2019-09-21 23:42:52
104.236.94.202 attackbotsspam
$f2bV_matches
2019-09-21 23:57:13
118.24.102.248 attackbotsspam
Sep 21 14:30:03 server sshd[28237]: Failed password for invalid user ty from 118.24.102.248 port 33042 ssh2
Sep 21 15:10:42 server sshd[33473]: Failed password for invalid user sonos from 118.24.102.248 port 34836 ssh2
Sep 21 15:14:49 server sshd[34013]: Failed password for root from 118.24.102.248 port 37504 ssh2
2019-09-22 00:14:12
218.92.0.191 attackbotsspam
Sep 21 17:47:11 dcd-gentoo sshd[28636]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Sep 21 17:47:14 dcd-gentoo sshd[28636]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Sep 21 17:47:11 dcd-gentoo sshd[28636]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Sep 21 17:47:14 dcd-gentoo sshd[28636]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Sep 21 17:47:11 dcd-gentoo sshd[28636]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Sep 21 17:47:14 dcd-gentoo sshd[28636]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Sep 21 17:47:14 dcd-gentoo sshd[28636]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 57610 ssh2
...
2019-09-21 23:49:03
157.230.103.135 attackbotsspam
2019-09-21T12:56:05.053065abusebot-4.cloudsearch.cf sshd\[16376\]: Invalid user us from 157.230.103.135 port 51644
2019-09-21 23:50:02
118.69.73.241 attack
Sep 21 17:56:32 mail sshd\[12192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.73.241  user=root
Sep 21 17:56:34 mail sshd\[12192\]: Failed password for root from 118.69.73.241 port 37142 ssh2
Sep 21 17:57:01 mail sshd\[12220\]: Invalid user guest from 118.69.73.241
...
2019-09-22 00:15:10
49.88.112.68 attack
Sep 21 17:45:54 mail sshd\[10690\]: Failed password for root from 49.88.112.68 port 27890 ssh2
Sep 21 17:45:57 mail sshd\[10690\]: Failed password for root from 49.88.112.68 port 27890 ssh2
Sep 21 17:45:59 mail sshd\[10690\]: Failed password for root from 49.88.112.68 port 27890 ssh2
Sep 21 17:49:42 mail sshd\[11099\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.68  user=root
Sep 21 17:49:44 mail sshd\[11099\]: Failed password for root from 49.88.112.68 port 38866 ssh2
2019-09-22 00:01:08
181.129.14.218 attackbotsspam
$f2bV_matches
2019-09-21 23:43:23

最近上报的IP列表

234.116.98.113 131.137.128.176 160.26.198.239 247.184.212.108
103.217.46.0 138.254.152.201 153.62.103.233 15.95.229.127
161.232.221.93 55.27.229.82 52.231.100.243 218.20.101.111
40.215.248.72 138.110.180.120 250.5.180.114 115.32.220.255
107.247.71.128 191.46.49.84 47.145.208.4 191.51.160.228