必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Wausau

省份(region): Wisconsin

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.55.11.116
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.55.11.116.			IN	A

;; AUTHORITY SECTION:
.			348	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030201 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 02:11:29 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
116.11.55.50.in-addr.arpa domain name pointer 50-55-11-116.waus.wi.frontiernet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
116.11.55.50.in-addr.arpa	name = 50-55-11-116.waus.wi.frontiernet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.184.201.146 attackbotsspam
SPF Fail sender not permitted to send mail for @floresfunza.com / Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-28 17:05:29
103.207.11.10 attackbots
Sep 28 11:11:17 markkoudstaal sshd[31203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.10
Sep 28 11:11:19 markkoudstaal sshd[31203]: Failed password for invalid user dir1 from 103.207.11.10 port 44044 ssh2
Sep 28 11:15:34 markkoudstaal sshd[31599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.10
2019-09-28 17:19:08
153.228.158.177 attackspam
Sep 28 10:15:24 microserver sshd[40993]: Invalid user testproxy from 153.228.158.177 port 54709
Sep 28 10:15:24 microserver sshd[40993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.228.158.177
Sep 28 10:15:26 microserver sshd[40993]: Failed password for invalid user testproxy from 153.228.158.177 port 54709 ssh2
Sep 28 10:20:44 microserver sshd[41716]: Invalid user luciana from 153.228.158.177 port 47091
Sep 28 10:20:44 microserver sshd[41716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.228.158.177
Sep 28 10:31:20 microserver sshd[43136]: Invalid user no-reply from 153.228.158.177 port 60082
Sep 28 10:31:20 microserver sshd[43136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.228.158.177
Sep 28 10:31:22 microserver sshd[43136]: Failed password for invalid user no-reply from 153.228.158.177 port 60082 ssh2
Sep 28 10:36:39 microserver sshd[43806]: Invalid user admin fro
2019-09-28 16:49:51
177.103.176.202 attackbots
Sep 28 08:37:00 web8 sshd\[5383\]: Invalid user administrador from 177.103.176.202
Sep 28 08:37:00 web8 sshd\[5383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.176.202
Sep 28 08:37:02 web8 sshd\[5383\]: Failed password for invalid user administrador from 177.103.176.202 port 48720 ssh2
Sep 28 08:45:13 web8 sshd\[9151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.103.176.202  user=root
Sep 28 08:45:15 web8 sshd\[9151\]: Failed password for root from 177.103.176.202 port 40978 ssh2
2019-09-28 17:08:22
121.58.244.228 attack
23/tcp 23/tcp 23/tcp...
[2019-07-29/09-28]10pkt,1pt.(tcp)
2019-09-28 16:58:33
179.33.139.66 attackspam
Sep 27 18:34:50 kapalua sshd\[16439\]: Invalid user radvd from 179.33.139.66
Sep 27 18:34:50 kapalua sshd\[16439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.139.66
Sep 27 18:34:51 kapalua sshd\[16439\]: Failed password for invalid user radvd from 179.33.139.66 port 53389 ssh2
Sep 27 18:42:49 kapalua sshd\[17305\]: Invalid user rd from 179.33.139.66
Sep 27 18:42:49 kapalua sshd\[17305\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.33.139.66
2019-09-28 16:56:55
106.12.125.27 attack
Sep 28 07:42:00 XXX sshd[2335]: Invalid user parker from 106.12.125.27 port 53206
2019-09-28 17:17:16
114.236.7.200 attackspam
2222/tcp 22/tcp...
[2019-09-08/27]13pkt,2pt.(tcp)
2019-09-28 17:15:44
173.248.242.25 attackbotsspam
Sep 28 05:35:26 Ubuntu-1404-trusty-64-minimal sshd\[6386\]: Invalid user batuhan from 173.248.242.25
Sep 28 05:35:26 Ubuntu-1404-trusty-64-minimal sshd\[6386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.248.242.25
Sep 28 05:35:28 Ubuntu-1404-trusty-64-minimal sshd\[6386\]: Failed password for invalid user batuhan from 173.248.242.25 port 35748 ssh2
Sep 28 05:50:21 Ubuntu-1404-trusty-64-minimal sshd\[19893\]: Invalid user br from 173.248.242.25
Sep 28 05:50:21 Ubuntu-1404-trusty-64-minimal sshd\[19893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.248.242.25
2019-09-28 17:10:25
114.67.72.229 attackbotsspam
Invalid user ec2 from 114.67.72.229 port 33932
2019-09-28 17:16:02
190.145.7.42 attack
Sep 28 06:50:13 bouncer sshd\[30100\]: Invalid user Debian from 190.145.7.42 port 55570
Sep 28 06:50:13 bouncer sshd\[30100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.7.42 
Sep 28 06:50:15 bouncer sshd\[30100\]: Failed password for invalid user Debian from 190.145.7.42 port 55570 ssh2
...
2019-09-28 17:05:56
112.85.42.186 attackspam
Sep 28 03:52:54 aat-srv002 sshd[6217]: Failed password for root from 112.85.42.186 port 43886 ssh2
Sep 28 04:08:20 aat-srv002 sshd[6655]: Failed password for root from 112.85.42.186 port 16270 ssh2
Sep 28 04:09:04 aat-srv002 sshd[6661]: Failed password for root from 112.85.42.186 port 57738 ssh2
...
2019-09-28 17:16:19
82.187.186.115 attackspam
2019-09-28T06:01:55.512973abusebot-3.cloudsearch.cf sshd\[10071\]: Invalid user 123 from 82.187.186.115 port 34512
2019-09-28 17:21:06
73.189.112.132 attackspambots
Sep 28 09:26:41 srv206 sshd[3752]: Invalid user jhall from 73.189.112.132
Sep 28 09:26:41 srv206 sshd[3752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-189-112-132.hsd1.ca.comcast.net
Sep 28 09:26:41 srv206 sshd[3752]: Invalid user jhall from 73.189.112.132
Sep 28 09:26:43 srv206 sshd[3752]: Failed password for invalid user jhall from 73.189.112.132 port 47394 ssh2
...
2019-09-28 16:43:55
128.199.219.181 attackspambots
Sep 28 09:30:41 vps01 sshd[25084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.219.181
Sep 28 09:30:42 vps01 sshd[25084]: Failed password for invalid user mihaela from 128.199.219.181 port 38127 ssh2
2019-09-28 17:14:57

最近上报的IP列表

196.1.211.235 13.72.45.52 126.159.155.229 221.35.241.188
194.204.221.1 86.146.214.6 161.241.6.182 192.241.204.128
155.62.14.149 129.121.70.164 133.178.214.1 190.94.148.244
12.187.156.237 209.65.56.129 190.94.135.138 165.145.222.70
181.29.219.217 168.121.176.66 189.41.137.89 133.215.69.30