必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.82.14.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52488
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.82.14.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 11:24:08 CST 2025
;; MSG SIZE  rcvd: 104
HOST信息:
19.14.82.50.in-addr.arpa domain name pointer 50-82-14-19.client.mchsi.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.14.82.50.in-addr.arpa	name = 50-82-14-19.client.mchsi.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.156.103.155 attack
Invalid user uup from 124.156.103.155 port 48374
2020-04-04 17:22:33
177.43.236.178 attack
Apr  3 00:00:26 www sshd[11314]: reveeclipse mapping checking getaddrinfo for gruposerver-namepal.static.gvt.net.br [177.43.236.178] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr  3 00:00:27 www sshd[11314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.236.178  user=r.r
Apr  3 00:00:29 www sshd[11314]: Failed password for r.r from 177.43.236.178 port 43454 ssh2
Apr  3 00:00:29 www sshd[11314]: Received disconnect from 177.43.236.178: 11: Bye Bye [preauth]
Apr  3 00:14:33 www sshd[11580]: reveeclipse mapping checking getaddrinfo for gruposerver-namepal.static.gvt.net.br [177.43.236.178] failed - POSSIBLE BREAK-IN ATTEMPT!
Apr  3 00:14:33 www sshd[11580]: Invalid user miaoxx from 177.43.236.178
Apr  3 00:14:33 www sshd[11580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.43.236.178 
Apr  3 00:14:35 www sshd[11580]: Failed password for invalid user miaoxx from 177.43.236.178 port 528........
-------------------------------
2020-04-04 17:26:28
150.223.27.110 attackspambots
Apr  4 01:29:43 server sshd\[7850\]: Invalid user pty from 150.223.27.110
Apr  4 01:29:43 server sshd\[7850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.27.110 
Apr  4 01:29:45 server sshd\[7850\]: Failed password for invalid user pty from 150.223.27.110 port 56933 ssh2
Apr  4 08:00:19 server sshd\[8975\]: Invalid user console from 150.223.27.110
Apr  4 08:00:19 server sshd\[8975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.27.110 
...
2020-04-04 17:48:27
80.251.145.171 attackbots
$f2bV_matches
2020-04-04 17:17:44
145.255.31.52 attackspam
Apr  4 10:13:58 ks10 sshd[2438376]: Failed password for root from 145.255.31.52 port 46372 ssh2
Apr  4 10:23:05 ks10 sshd[2439592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.255.31.52 
...
2020-04-04 17:35:33
189.203.164.188 attackbots
wp-admin/admin-ajax.php?nd_options_value_import_settings=users_can_register%5Bnd_op…  and also login attempts.
2020-04-04 17:45:54
79.120.118.82 attack
Apr  4 11:26:36 OPSO sshd\[12509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82  user=root
Apr  4 11:26:38 OPSO sshd\[12509\]: Failed password for root from 79.120.118.82 port 43856 ssh2
Apr  4 11:30:41 OPSO sshd\[13631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82  user=root
Apr  4 11:30:43 OPSO sshd\[13631\]: Failed password for root from 79.120.118.82 port 49371 ssh2
Apr  4 11:34:53 OPSO sshd\[14290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.120.118.82  user=root
2020-04-04 17:39:06
183.82.36.44 attack
Apr  4 03:52:11 server1 sshd\[17290\]: Invalid user www from 183.82.36.44
Apr  4 03:52:11 server1 sshd\[17290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.36.44 
Apr  4 03:52:13 server1 sshd\[17290\]: Failed password for invalid user www from 183.82.36.44 port 53022 ssh2
Apr  4 03:58:11 server1 sshd\[19844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.36.44  user=root
Apr  4 03:58:13 server1 sshd\[19844\]: Failed password for root from 183.82.36.44 port 35148 ssh2
...
2020-04-04 17:58:53
190.165.166.138 attackbots
SSH brute force attempt
2020-04-04 17:58:26
69.162.79.242 attackspam
69.162.79.242 - - \[04/Apr/2020:10:29:13 +0200\] "POST /wp-login.php HTTP/1.0" 200 6509 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
69.162.79.242 - - \[04/Apr/2020:10:29:15 +0200\] "POST /wp-login.php HTTP/1.0" 200 6322 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
69.162.79.242 - - \[04/Apr/2020:10:29:16 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-04-04 17:55:32
89.163.224.164 attack
[portscan] tcp/22 [SSH]
*(RWIN=65535)(04041152)
2020-04-04 17:50:24
114.5.215.100 attackspambots
20/4/3@23:54:38: FAIL: Alarm-Network address from=114.5.215.100
...
2020-04-04 17:18:51
123.18.120.129 attack
20/4/4@05:00:17: FAIL: Alarm-Network address from=123.18.120.129
...
2020-04-04 17:37:07
145.239.91.88 attackspambots
Apr  4 10:52:20 icinga sshd[37251]: Failed password for root from 145.239.91.88 port 35354 ssh2
Apr  4 11:05:25 icinga sshd[58257]: Failed password for root from 145.239.91.88 port 46578 ssh2
...
2020-04-04 17:41:48
107.172.197.4 attack
Apr  4 06:00:37 game-panel sshd[19622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.197.4
Apr  4 06:00:40 game-panel sshd[19622]: Failed password for invalid user pa$$w0rd from 107.172.197.4 port 56326 ssh2
Apr  4 06:05:22 game-panel sshd[19837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.197.4
2020-04-04 17:50:44

最近上报的IP列表

85.85.139.117 47.114.190.192 53.194.122.228 115.147.62.223
142.6.192.36 107.83.22.244 246.243.236.214 107.165.92.105
250.122.84.181 51.102.166.147 6.63.14.252 75.206.129.27
8.219.162.52 133.60.140.130 104.156.250.19 204.246.115.107
193.93.83.26 21.150.35.225 71.70.202.64 176.61.119.65