必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.34.30.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.34.30.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 05:04:53 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
147.30.34.50.in-addr.arpa domain name pointer static-50-34-30-147.evrt.wa.ptr.ziplyfiber.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.30.34.50.in-addr.arpa	name = static-50-34-30-147.evrt.wa.ptr.ziplyfiber.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.236.215.68 attack
Aug 14 14:51:31 XXX sshd[6774]: Invalid user backend from 104.236.215.68 port 45226
2019-08-14 22:15:27
122.175.55.196 attack
Aug 14 14:51:10 XXX sshd[6751]: Invalid user lehranstalt from 122.175.55.196 port 59742
2019-08-14 22:39:18
200.108.130.50 attackspambots
fail2ban
2019-08-15 00:07:24
72.189.130.39 attackspam
Aug 14 14:51:15 XXX sshd[6757]: Invalid user nagios1 from 72.189.130.39 port 56324
2019-08-14 22:29:36
187.84.212.211 attack
$f2bV_matches
2019-08-14 22:08:30
178.62.17.167 attack
Aug 14 14:50:50 XXX sshd[6730]: Invalid user nscd from 178.62.17.167 port 42688
2019-08-14 23:00:39
106.12.94.65 attackspam
Aug 14 15:04:41 h2177944 sshd\[29741\]: Invalid user support from 106.12.94.65 port 33326
Aug 14 15:04:41 h2177944 sshd\[29741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.94.65
Aug 14 15:04:43 h2177944 sshd\[29741\]: Failed password for invalid user support from 106.12.94.65 port 33326 ssh2
Aug 14 15:11:27 h2177944 sshd\[29895\]: Invalid user mcm from 106.12.94.65 port 44270
...
2019-08-14 22:24:15
187.73.162.150 attackspambots
Aug 14 14:49:28 XXX sshd[6637]: Invalid user ananda from 187.73.162.150 port 58998
2019-08-15 00:09:41
122.55.90.45 attack
Aug 14 14:51:16 XXX sshd[6759]: Invalid user oraprod from 122.55.90.45 port 34188
2019-08-14 22:28:37
89.248.172.85 attack
08/14/2019-09:11:31.449715 89.248.172.85 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-14 22:16:15
116.202.111.55 attack
WordPress wp-login brute force :: 116.202.111.55 0.320 BYPASS [14/Aug/2019:23:11:00  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-14 23:11:56
91.222.195.26 attackbots
Aug 14 15:04:58 heissa sshd\[12461\]: Invalid user noob from 91.222.195.26 port 41668
Aug 14 15:04:58 heissa sshd\[12461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.222.195.26
Aug 14 15:05:01 heissa sshd\[12461\]: Failed password for invalid user noob from 91.222.195.26 port 41668 ssh2
Aug 14 15:11:35 heissa sshd\[13251\]: Invalid user resin from 91.222.195.26 port 62540
Aug 14 15:11:35 heissa sshd\[13251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.222.195.26
2019-08-14 22:05:12
162.247.74.202 attack
Aug 14 13:15:53 MK-Soft-VM6 sshd\[13090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.247.74.202  user=root
Aug 14 13:15:55 MK-Soft-VM6 sshd\[13090\]: Failed password for root from 162.247.74.202 port 47328 ssh2
Aug 14 13:15:58 MK-Soft-VM6 sshd\[13090\]: Failed password for root from 162.247.74.202 port 47328 ssh2
...
2019-08-14 22:27:25
106.12.80.87 attackbotsspam
Aug 14 15:10:29 bouncer sshd\[12019\]: Invalid user ftp from 106.12.80.87 port 38698
Aug 14 15:10:29 bouncer sshd\[12019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.80.87 
Aug 14 15:10:31 bouncer sshd\[12019\]: Failed password for invalid user ftp from 106.12.80.87 port 38698 ssh2
...
2019-08-15 00:13:05
13.111.113.103 attack
Spam
2019-08-15 00:13:50

最近上报的IP列表

91.157.171.163 135.207.54.26 186.32.14.238 107.253.254.219
198.33.143.204 32.155.17.174 127.101.92.199 56.8.19.46
123.36.177.158 23.236.219.114 146.224.161.72 99.4.77.246
239.157.28.17 83.215.192.222 157.88.183.219 229.173.22.61
117.10.183.217 208.20.118.49 92.113.124.198 75.137.204.106