必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tokyo

省份(region): Tokyo

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       50.7.0.0 - 50.7.255.255
CIDR:           50.7.0.0/16
NetName:        FDCSERVERS
NetHandle:      NET-50-7-0-0-1
Parent:         NET50 (NET-50-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   FDCservers.net (FDCSE)
RegDate:        2010-10-18
Updated:        2018-10-12
Ref:            https://rdap.arin.net/registry/ip/50.7.0.0


OrgName:        FDCservers.net
OrgId:          FDCSE
Address:        175 Main St. #1363
City:           Destin
StateProv:      FL
PostalCode:     32540
Country:        US
RegDate:        2003-05-20
Updated:        2025-08-08
Ref:            https://rdap.arin.net/registry/entity/FDCSE

ReferralServer:  rwhois://rwhois.fdcservers.net:4321

OrgNOCHandle: NETWO10401-ARIN
OrgNOCName:   Network Department
OrgNOCPhone:  +1-312-423-6675 
OrgNOCEmail:  network@fdcservers.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgRoutingHandle: NETWO10401-ARIN
OrgRoutingName:   Network Department
OrgRoutingPhone:  +1-312-423-6675 
OrgRoutingEmail:  network@fdcservers.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgAbuseHandle: ABUSE438-ARIN
OrgAbuseName:   ABUSE department
OrgAbusePhone:  +1-312-423-6675 
OrgAbuseEmail:  abuse@fdcservers.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE438-ARIN

OrgTechHandle: NETWO10401-ARIN
OrgTechName:   Network Department
OrgTechPhone:  +1-312-423-6675 
OrgTechEmail:  network@fdcservers.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

# end


# start

NetRange:       50.7.158.0 - 50.7.159.255
CIDR:           50.7.158.0/23
NetName:        FDCSERVERS-TOKYO
NetHandle:      NET-50-7-158-0-1
Parent:         FDCSERVERS (NET-50-7-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   FDCservers.net (FDCSE-30)
RegDate:        2019-10-14
Updated:        2021-11-19
Ref:            https://rdap.arin.net/registry/ip/50.7.158.0


OrgName:        FDCservers.net
OrgId:          FDCSE-30
Address:        2-1-7 Higashi-shinagawa
City:           Tokyo
StateProv:      SHINAGAWA-KU
PostalCode:     140-0002
Country:        JP
RegDate:        2019-10-14
Updated:        2025-08-08
Ref:            https://rdap.arin.net/registry/entity/FDCSE-30


OrgRoutingHandle: NETWO10401-ARIN
OrgRoutingName:   Network Department
OrgRoutingPhone:  +1-312-423-6675 
OrgRoutingEmail:  network@fdcservers.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgNOCHandle: NETWO10401-ARIN
OrgNOCName:   Network Department
OrgNOCPhone:  +1-312-423-6675 
OrgNOCEmail:  network@fdcservers.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgTechHandle: NETWO10401-ARIN
OrgTechName:   Network Department
OrgTechPhone:  +1-312-423-6675 
OrgTechEmail:  network@fdcservers.net
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO10401-ARIN

OrgAbuseHandle: ABUSE438-ARIN
OrgAbuseName:   ABUSE department
OrgAbusePhone:  +1-312-423-6675 
OrgAbuseEmail:  abuse@fdcservers.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE438-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.fdcservers.net:4321.

%rwhois V-1.5:003fff:00 rwhois.fdcservers.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:50.7.0.0/16
network:Class-Name:network
network:OrgName:yingsoo
network:OrgID;I:FDC-16476
network:Address:RUNIT 04, 7/F, BRIGHT WAY TOWER, NO. 33 MONG KOK ROAD, KOWLOON, HK.
network:City:HongKong
network:StateProv:HongKong
network:PostalCode:999077
network:Country:HK
network:NetRange:50.7.158.232-50.7.158.239
network:CIDR:50.7.158.232/29
network:NetName:FDC-16476-50.7.158.232
network:OrgAbuseHandle:ABUSE438-ARIN
network:OrgAbuseName:Abuse Department
network:OrgAbusePhone:+1-312-423-6675
network:OrgAbuseEmail:abuse@fdcservers.net
network:OrgNOCHandle:ABUSE438-ARIN
network:OrgNOCName:Tech Support
network:OrgNOCPhone:+1-312-423-6675
network:OrgNOCEmail:abuse@fdcservers.net
network:OrgTechHandle:ABUSE438-ARIN
network:OrgTechName:Tech Support
network:OrgTechPhone:+1-312-423-6675
network:OrgTechEmail:abuse@fdcservers.net

network:Auth-Area:50.7.0.0/16
network:Class-Name:network
network:OrgName:FDCservers.net
network:OrgID;I:FDCSE
network:Address:141 W Jackson Blvd. #1135
network:City:Chicago
network:StateProv:IL
network:PostalCode:60604
network:Country:US
network:NetRange:50.7.0.0 - 50.7.255.255
network:CIDR:50.7.0.0/16
network:NetName:FDCSERVERS
network:OrgAbuseHandle:ABUSE438-ARIN
network:OrgAbuseName:Abuse Department
network:OrgAbusePhone:+1-312-423-6675
network:OrgAbuseEmail:abuse@fdcservers.net
network:OrgNOCHandle:ABUSE438-ARIN
network:OrgNOCName:Tech Support
network:OrgNOCPhone:+1-312-423-6675
network:OrgNOCEmail:abuse@fdcservers.net
network:OrgTechHandle:ABUSE438-ARIN
network:OrgTechName:Tech Support
network:OrgTechPhone:+1-312-423-6675
network:OrgTechEmail:abuse@fdcservers.net

%ok
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.7.158.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.7.158.234.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042100 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 23:09:36 CST 2026
;; MSG SIZE  rcvd: 105
HOST信息:
Host 234.158.7.50.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.158.7.50.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
199.249.230.75 attack
2019-06-23T09:58:08.096146abusebot-4.cloudsearch.cf sshd\[4324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tor22.quintex.com  user=root
2019-06-23 21:40:54
106.12.30.59 attackspambots
Jun 23 11:56:52 web24hdcode sshd[105279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.30.59  user=nobody
Jun 23 11:56:53 web24hdcode sshd[105279]: Failed password for nobody from 106.12.30.59 port 47918 ssh2
Jun 23 11:57:38 web24hdcode sshd[105281]: Invalid user minecraft from 106.12.30.59 port 49005
Jun 23 11:57:38 web24hdcode sshd[105281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.30.59
Jun 23 11:57:38 web24hdcode sshd[105281]: Invalid user minecraft from 106.12.30.59 port 49005
Jun 23 11:57:39 web24hdcode sshd[105281]: Failed password for invalid user minecraft from 106.12.30.59 port 49005 ssh2
Jun 23 11:58:21 web24hdcode sshd[105283]: Invalid user nicolas from 106.12.30.59 port 50076
Jun 23 11:58:21 web24hdcode sshd[105283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.30.59
Jun 23 11:58:21 web24hdcode sshd[105283]: Invalid user nicolas from 106.12.30.59
2019-06-23 21:34:18
110.138.98.23 attackbotsspam
Jun 19 18:08:49 xxxxxxx sshd[22017]: Invalid user dian from 110.138.98.23 port 49484
Jun 19 18:08:49 xxxxxxx sshd[22017]: Failed password for invalid user dian from 110.138.98.23 port 49484 ssh2
Jun 19 18:08:49 xxxxxxx sshd[22017]: Received disconnect from 110.138.98.23 port 49484:11: Bye Bye [preauth]
Jun 19 18:08:49 xxxxxxx sshd[22017]: Disconnected from 110.138.98.23 port 49484 [preauth]
Jun 19 18:23:23 xxxxxxx sshd[25701]: Invalid user nian from 110.138.98.23 port 46512
Jun 19 18:23:23 xxxxxxx sshd[25701]: Failed password for invalid user nian from 110.138.98.23 port 46512 ssh2
Jun 19 18:23:23 xxxxxxx sshd[25701]: Received disconnect from 110.138.98.23 port 46512:11: Bye Bye [preauth]
Jun 19 18:23:23 xxxxxxx sshd[25701]: Disconnected from 110.138.98.23 port 46512 [preauth]
Jun 19 18:25:52 xxxxxxx sshd[26552]: Invalid user shao from 110.138.98.23 port 40554
Jun 19 18:25:52 xxxxxxx sshd[26552]: Failed password for invalid user shao from 110.138.98.23 port 40554 ssh2
J........
-------------------------------
2019-06-23 21:49:00
89.20.36.2 attackbots
445/tcp 445/tcp 445/tcp...
[2019-04-27/06-23]8pkt,1pt.(tcp)
2019-06-23 22:04:56
218.92.0.139 attack
Jun 23 11:57:45 dedicated sshd[11895]: Failed password for root from 218.92.0.139 port 46661 ssh2
Jun 23 11:57:48 dedicated sshd[11895]: Failed password for root from 218.92.0.139 port 46661 ssh2
Jun 23 11:57:51 dedicated sshd[11895]: Failed password for root from 218.92.0.139 port 46661 ssh2
Jun 23 11:57:55 dedicated sshd[11895]: Failed password for root from 218.92.0.139 port 46661 ssh2
Jun 23 11:57:59 dedicated sshd[11895]: Failed password for root from 218.92.0.139 port 46661 ssh2
2019-06-23 21:43:56
54.37.157.229 attackspambots
2019-06-23T09:57:33.765177abusebot-4.cloudsearch.cf sshd\[4314\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=229.ip-54-37-157.eu  user=root
2019-06-23 21:59:38
179.108.106.81 attackbotsspam
Jun 23 11:52:31 raspberrypi sshd\[7773\]: Invalid user ts3server from 179.108.106.81 port 48006
Jun 23 11:52:31 raspberrypi sshd\[7773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.108.106.81
Jun 23 11:52:33 raspberrypi sshd\[7773\]: Failed password for invalid user ts3server from 179.108.106.81 port 48006 ssh2
Jun 23 11:58:38 raspberrypi sshd\[7785\]: Invalid user postgres from 179.108.106.81 port 52756
Jun 23 11:58:39 raspberrypi sshd\[7785\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.108.106.81
...
2019-06-23 21:20:38
206.189.36.9 attackspam
206.189.36.9 - - \[23/Jun/2019:12:48:47 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.36.9 - - \[23/Jun/2019:12:48:48 +0200\] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.36.9 - - \[23/Jun/2019:12:48:49 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.36.9 - - \[23/Jun/2019:12:48:51 +0200\] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.36.9 - - \[23/Jun/2019:12:48:52 +0200\] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
206.189.36.9 - - \[23/Jun/2019:12:48:53 +0200\] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/
2019-06-23 21:51:10
144.217.6.149 attack
Jun 23 09:07:05 xb0 sshd[18716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.6.149  user=gnats
Jun 23 09:07:08 xb0 sshd[18716]: Failed password for gnats from 144.217.6.149 port 55730 ssh2
Jun 23 09:07:08 xb0 sshd[18716]: Received disconnect from 144.217.6.149: 11: Bye Bye [preauth]
Jun 23 09:08:28 xb0 sshd[22467]: Failed password for invalid user 888888 from 144.217.6.149 port 42428 ssh2
Jun 23 09:08:28 xb0 sshd[22467]: Received disconnect from 144.217.6.149: 11: Bye Bye [preauth]
Jun 23 09:09:43 xb0 sshd[23759]: Failed password for invalid user ace from 144.217.6.149 port 57218 ssh2
Jun 23 09:09:44 xb0 sshd[23759]: Received disconnect from 144.217.6.149: 11: Bye Bye [preauth]
Jun 23 09:10:57 xb0 sshd[14975]: Failed password for invalid user pgadmin from 144.217.6.149 port 43784 ssh2
Jun 23 09:10:58 xb0 sshd[14975]: Received disconnect from 144.217.6.149: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.
2019-06-23 21:41:39
206.189.166.172 attackbots
Jun 23 14:44:19 [munged] sshd[32586]: Invalid user xbmc from 206.189.166.172 port 45258
Jun 23 14:44:19 [munged] sshd[32586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.166.172
2019-06-23 22:10:47
139.59.74.143 attackspam
Jun 23 14:04:05 rpi sshd\[14001\]: Invalid user glassfish from 139.59.74.143 port 55186
Jun 23 14:04:05 rpi sshd\[14001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.74.143
Jun 23 14:04:06 rpi sshd\[14001\]: Failed password for invalid user glassfish from 139.59.74.143 port 55186 ssh2
2019-06-23 21:25:46
77.172.147.189 attackspambots
PHI,WP GET /wp-login.php
2019-06-23 21:36:44
118.25.128.19 attack
Jun 23 13:47:54 MK-Soft-VM3 sshd\[20472\]: Invalid user karol from 118.25.128.19 port 44274
Jun 23 13:47:54 MK-Soft-VM3 sshd\[20472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.128.19
Jun 23 13:47:56 MK-Soft-VM3 sshd\[20472\]: Failed password for invalid user karol from 118.25.128.19 port 44274 ssh2
...
2019-06-23 22:00:23
122.224.214.18 attack
SSH bruteforce (Triggered fail2ban)
2019-06-23 21:21:01
128.199.195.139 attackbotsspam
128.199.195.139 - - [23/Jun/2019:11:57:20 +0200] "POST [munged]wordpress/wp-login.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 0.000
2019-06-23 22:08:28

最近上报的IP列表

2606:4700:10::6814:9926 66.132.195.109 121.86.201.109 122.193.247.81
2606:4700:10::6816:1130 2606:4700:10::6816:1035 2606:4700:10::6814:5935 2606:4700:10::6814:5946
2606:4700:10::ac43:46e 2606:4700:10::6816:1548 2606:4700:10::6814:8331 43.130.105.246
84.32.41.143 67.205.161.4 114.32.23.23 47.92.251.10
45.63.97.69 2606:4700:10::6814:7911 2606:4700:10::6816:4353 2606:4700:10::ac43:2399