必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.49.44.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.49.44.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 143 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 20:44:54 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
Host 49.44.49.50.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.44.49.50.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.245.49.22 attackspam
198.245.49.22 - - [07/Aug/2020:04:58:46 +0100] "POST /wp-login.php HTTP/1.1" 200 2178 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.245.49.22 - - [07/Aug/2020:04:58:47 +0100] "POST /wp-login.php HTTP/1.1" 200 2154 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.245.49.22 - - [07/Aug/2020:04:58:48 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 12:22:26
114.35.197.206 attack
Port probing on unauthorized port 23
2020-08-07 12:24:46
122.116.40.84 attackbotsspam
Automatic report - Port Scan Attack
2020-08-07 12:30:18
90.202.133.121 attackspam
Automatic report - Port Scan Attack
2020-08-07 12:40:09
124.160.42.66 attackbotsspam
2020-08-07T05:51:46.529063amanda2.illicoweb.com sshd\[2738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.42.66  user=root
2020-08-07T05:51:48.685443amanda2.illicoweb.com sshd\[2738\]: Failed password for root from 124.160.42.66 port 64191 ssh2
2020-08-07T05:56:21.953477amanda2.illicoweb.com sshd\[3701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.42.66  user=root
2020-08-07T05:56:23.863784amanda2.illicoweb.com sshd\[3701\]: Failed password for root from 124.160.42.66 port 59094 ssh2
2020-08-07T05:58:17.241228amanda2.illicoweb.com sshd\[4054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.42.66  user=root
...
2020-08-07 12:42:39
143.208.28.193 attack
(smtpauth) Failed SMTP AUTH login from 143.208.28.193 (BR/Brazil/143-208-28-193.reverso.speednetpa.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-07 08:28:51 plain authenticator failed for 143-208-28-193.reverso.speednetpa.com.br [143.208.28.193]: 535 Incorrect authentication data (set_id=rd@toliddaru.ir)
2020-08-07 12:17:39
154.85.37.20 attack
2020-08-07T05:51:30.688816amanda2.illicoweb.com sshd\[2602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.85.37.20  user=root
2020-08-07T05:51:32.648977amanda2.illicoweb.com sshd\[2602\]: Failed password for root from 154.85.37.20 port 48878 ssh2
2020-08-07T05:54:59.189027amanda2.illicoweb.com sshd\[3509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.85.37.20  user=root
2020-08-07T05:55:00.507387amanda2.illicoweb.com sshd\[3509\]: Failed password for root from 154.85.37.20 port 36968 ssh2
2020-08-07T05:58:33.031863amanda2.illicoweb.com sshd\[4110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.85.37.20  user=root
...
2020-08-07 12:30:04
180.183.28.138 attackspam
20/8/6@23:58:21: FAIL: Alarm-Network address from=180.183.28.138
...
2020-08-07 12:39:37
117.50.107.175 attack
Aug  7 05:46:41 server sshd[28157]: Failed password for root from 117.50.107.175 port 54292 ssh2
Aug  7 05:52:49 server sshd[3790]: Failed password for root from 117.50.107.175 port 59606 ssh2
Aug  7 05:58:54 server sshd[11180]: Failed password for root from 117.50.107.175 port 36688 ssh2
2020-08-07 12:18:01
210.100.200.167 attackbots
2020-08-07T05:50:47.337542amanda2.illicoweb.com sshd\[2455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.100.200.167  user=root
2020-08-07T05:50:49.061974amanda2.illicoweb.com sshd\[2455\]: Failed password for root from 210.100.200.167 port 36716 ssh2
2020-08-07T05:56:23.104516amanda2.illicoweb.com sshd\[3709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.100.200.167  user=root
2020-08-07T05:56:24.287403amanda2.illicoweb.com sshd\[3709\]: Failed password for root from 210.100.200.167 port 34614 ssh2
2020-08-07T05:58:14.161762amanda2.illicoweb.com sshd\[4033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.100.200.167  user=root
...
2020-08-07 12:44:15
112.237.40.2 attackspambots
Unauthorised access (Aug  7) SRC=112.237.40.2 LEN=40 TTL=46 ID=39760 TCP DPT=8080 WINDOW=13194 SYN 
Unauthorised access (Aug  6) SRC=112.237.40.2 LEN=40 TTL=46 ID=47881 TCP DPT=8080 WINDOW=4010 SYN 
Unauthorised access (Aug  6) SRC=112.237.40.2 LEN=40 TTL=46 ID=45543 TCP DPT=8080 WINDOW=13194 SYN
2020-08-07 12:45:08
212.129.59.36 attackspam
212.129.59.36 - - [07/Aug/2020:05:57:40 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.59.36 - - [07/Aug/2020:05:58:10 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-07 12:51:21
51.178.51.152 attack
Aug  7 06:30:42 ip106 sshd[26161]: Failed password for root from 51.178.51.152 port 59302 ssh2
...
2020-08-07 12:38:19
192.99.200.69 attackspambots
Automatic report - XMLRPC Attack
2020-08-07 12:32:53
106.13.147.89 attackbots
Aug  7 05:53:52 ip106 sshd[24091]: Failed password for root from 106.13.147.89 port 53514 ssh2
...
2020-08-07 12:47:19

最近上报的IP列表

149.173.98.203 180.72.229.85 7.126.183.184 138.50.27.61
173.59.182.230 64.83.253.247 225.185.136.250 187.19.46.212
31.162.75.102 42.223.214.160 223.33.115.121 193.189.252.156
244.18.70.149 202.8.54.144 12.178.170.88 37.11.213.91
20.242.7.208 195.136.114.24 219.247.186.70 35.64.9.175