必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Calgary

省份(region): Alberta

国家(country): Canada

运营商(isp): Telus

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.99.141.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.99.141.70.			IN	A

;; AUTHORITY SECTION:
.			301	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062800 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 29 00:43:26 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
70.141.99.50.in-addr.arpa domain name pointer d50-99-141-70.abhsia.telus.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.141.99.50.in-addr.arpa	name = d50-99-141-70.abhsia.telus.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.72.135.102 attackspambots
1433/tcp 1433/tcp 1433/tcp...
[2019-10-26/12-23]24pkt,1pt.(tcp)
2019-12-24 04:58:34
222.73.85.7 attackbotsspam
1433/tcp 445/tcp...
[2019-11-27/12-22]11pkt,2pt.(tcp)
2019-12-24 04:40:31
49.234.12.123 attackspambots
2019-12-23T15:58:10.568660shield sshd\[9019\]: Invalid user endliss from 49.234.12.123 port 40886
2019-12-23T15:58:10.573039shield sshd\[9019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.12.123
2019-12-23T15:58:12.654444shield sshd\[9019\]: Failed password for invalid user endliss from 49.234.12.123 port 40886 ssh2
2019-12-23T16:04:12.588309shield sshd\[10773\]: Invalid user smmsp from 49.234.12.123 port 33522
2019-12-23T16:04:12.592785shield sshd\[10773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.12.123
2019-12-24 05:15:42
106.12.11.160 attackspambots
Dec 23 15:52:23 zeus sshd[28733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.11.160 
Dec 23 15:52:26 zeus sshd[28733]: Failed password for invalid user server from 106.12.11.160 port 44574 ssh2
Dec 23 16:00:05 zeus sshd[28904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.11.160 
Dec 23 16:00:07 zeus sshd[28904]: Failed password for invalid user wwwrun from 106.12.11.160 port 43902 ssh2
2019-12-24 04:59:31
139.59.43.104 attackspambots
Dec 23 05:54:06 auw2 sshd\[21220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=primesurvey.org  user=root
Dec 23 05:54:08 auw2 sshd\[21220\]: Failed password for root from 139.59.43.104 port 37605 ssh2
Dec 23 06:00:16 auw2 sshd\[21808\]: Invalid user fortunato from 139.59.43.104
Dec 23 06:00:16 auw2 sshd\[21808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=primesurvey.org
Dec 23 06:00:18 auw2 sshd\[21808\]: Failed password for invalid user fortunato from 139.59.43.104 port 39686 ssh2
2019-12-24 04:43:54
185.153.208.26 attackbots
Dec 23 16:57:23 MK-Soft-VM7 sshd[29479]: Failed password for nobody from 185.153.208.26 port 44858 ssh2
Dec 23 17:02:13 MK-Soft-VM7 sshd[29495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.153.208.26 
...
2019-12-24 04:50:24
129.204.102.84 attackspambots
Feb 24 12:52:00 dillonfme sshd\[28714\]: Invalid user ubuntu from 129.204.102.84 port 55256
Feb 24 12:52:00 dillonfme sshd\[28714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.102.84
Feb 24 12:52:03 dillonfme sshd\[28714\]: Failed password for invalid user ubuntu from 129.204.102.84 port 55256 ssh2
Feb 24 12:56:18 dillonfme sshd\[28781\]: Invalid user teamspeak from 129.204.102.84 port 50078
Feb 24 12:56:18 dillonfme sshd\[28781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.102.84
...
2019-12-24 05:04:13
173.45.164.2 attackspambots
Dec 23 05:51:30 auw2 sshd\[20994\]: Invalid user dibler from 173.45.164.2
Dec 23 05:51:30 auw2 sshd\[20994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=br1.atl5-vlan34.as22384.net
Dec 23 05:51:32 auw2 sshd\[20994\]: Failed password for invalid user dibler from 173.45.164.2 port 37586 ssh2
Dec 23 05:56:49 auw2 sshd\[21491\]: Invalid user minah from 173.45.164.2
Dec 23 05:56:49 auw2 sshd\[21491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=br1.atl5-vlan34.as22384.net
2019-12-24 04:50:40
157.119.29.20 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 04:48:09
190.64.68.180 attackbots
Dec 23 21:21:27 areeb-Workstation sshd[8805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.180 
Dec 23 21:21:30 areeb-Workstation sshd[8805]: Failed password for invalid user server from 190.64.68.180 port 12161 ssh2
...
2019-12-24 04:46:12
179.224.163.124 attack
Dec 23 15:54:43 odroid64 sshd\[2020\]: Invalid user admin from 179.224.163.124
Dec 23 15:54:43 odroid64 sshd\[2020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.224.163.124
...
2019-12-24 04:56:21
139.162.90.220 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-24 04:51:02
106.248.41.245 attackspam
Dec 23 05:42:33 sachi sshd\[1276\]: Invalid user lorber from 106.248.41.245
Dec 23 05:42:33 sachi sshd\[1276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.41.245
Dec 23 05:42:35 sachi sshd\[1276\]: Failed password for invalid user lorber from 106.248.41.245 port 48230 ssh2
Dec 23 05:48:31 sachi sshd\[1809\]: Invalid user gorri from 106.248.41.245
Dec 23 05:48:31 sachi sshd\[1809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.41.245
2019-12-24 04:42:29
49.231.166.197 attackspambots
Dec 23 16:43:32 markkoudstaal sshd[21802]: Failed password for mail from 49.231.166.197 port 39984 ssh2
Dec 23 16:50:27 markkoudstaal sshd[22336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.231.166.197
Dec 23 16:50:30 markkoudstaal sshd[22336]: Failed password for invalid user admin from 49.231.166.197 port 45628 ssh2
2019-12-24 05:11:31
51.83.104.120 attackbotsspam
Dec 23 15:48:52 web8 sshd\[27093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.104.120  user=uucp
Dec 23 15:48:55 web8 sshd\[27093\]: Failed password for uucp from 51.83.104.120 port 35358 ssh2
Dec 23 15:53:56 web8 sshd\[29352\]: Invalid user adjust from 51.83.104.120
Dec 23 15:53:56 web8 sshd\[29352\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.104.120
Dec 23 15:53:59 web8 sshd\[29352\]: Failed password for invalid user adjust from 51.83.104.120 port 39200 ssh2
2019-12-24 04:55:55

最近上报的IP列表

69.142.17.4 180.76.4.129 180.76.179.91 180.76.120.204
180.76.243.86 180.76.106.226 180.76.46.136 180.76.126.221
180.76.106.249 180.76.149.223 180.76.98.50 54.219.68.170
182.34.209.31 13.75.194.0 5.14.42.140 71.213.15.135
180.76.98.166 180.76.152.137 187.143.60.46 180.76.186.235