必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Calgary

省份(region): Alberta

国家(country): Canada

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.99.252.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.99.252.146.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121600 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 16 20:35:52 CST 2024
;; MSG SIZE  rcvd: 106
HOST信息:
146.252.99.50.in-addr.arpa domain name pointer d50-99-252-146.abhsia.telus.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
146.252.99.50.in-addr.arpa	name = d50-99-252-146.abhsia.telus.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.44.122.90 attackspambots
23/tcp 23/tcp
[2019-09-20/22]2pkt
2019-09-22 19:46:47
117.254.155.7 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-22 02:03:34,997 INFO [shellcode_manager] (117.254.155.7) no match, writing hexdump (d3e9f5c514215457da0d3976c84de944 :1965603) - SMB (Unknown)
2019-09-22 19:20:53
125.22.98.171 attack
Sep 22 01:06:52 web1 sshd\[28957\]: Invalid user automak from 125.22.98.171
Sep 22 01:06:52 web1 sshd\[28957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.98.171
Sep 22 01:06:53 web1 sshd\[28957\]: Failed password for invalid user automak from 125.22.98.171 port 40390 ssh2
Sep 22 01:12:08 web1 sshd\[29454\]: Invalid user it from 125.22.98.171
Sep 22 01:12:08 web1 sshd\[29454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.22.98.171
2019-09-22 19:24:54
129.28.148.242 attackbotsspam
Sep 21 23:50:41 auw2 sshd\[30549\]: Invalid user jboss from 129.28.148.242
Sep 21 23:50:41 auw2 sshd\[30549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.148.242
Sep 21 23:50:42 auw2 sshd\[30549\]: Failed password for invalid user jboss from 129.28.148.242 port 55090 ssh2
Sep 21 23:57:19 auw2 sshd\[31154\]: Invalid user cisco from 129.28.148.242
Sep 21 23:57:19 auw2 sshd\[31154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.148.242
2019-09-22 19:56:25
103.228.112.178 attack
Unauthorised access (Sep 22) SRC=103.228.112.178 LEN=48 TTL=118 ID=30537 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-22 19:34:33
144.217.4.14 attackspambots
Sep 20 17:04:23 ns341937 sshd[21960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.4.14
Sep 20 17:04:25 ns341937 sshd[21960]: Failed password for invalid user shubham from 144.217.4.14 port 33183 ssh2
Sep 20 17:17:16 ns341937 sshd[26164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.4.14
...
2019-09-22 19:22:53
113.118.41.184 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-09-22 19:50:39
125.161.104.197 attackspambots
port scan and connect, tcp 80 (http)
2019-09-22 19:28:43
129.204.115.214 attackspambots
Sep 21 23:37:11 hiderm sshd\[14331\]: Invalid user she from 129.204.115.214
Sep 21 23:37:11 hiderm sshd\[14331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.115.214
Sep 21 23:37:14 hiderm sshd\[14331\]: Failed password for invalid user she from 129.204.115.214 port 56026 ssh2
Sep 21 23:43:00 hiderm sshd\[14959\]: Invalid user sale from 129.204.115.214
Sep 21 23:43:00 hiderm sshd\[14959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.115.214
2019-09-22 19:14:16
178.48.6.77 attackspambots
Sep 22 07:41:56 ks10 sshd[4551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.48.6.77 
Sep 22 07:41:58 ks10 sshd[4551]: Failed password for invalid user deploy from 178.48.6.77 port 62708 ssh2
...
2019-09-22 19:35:44
202.51.74.189 attackbotsspam
Sep 22 00:59:37 hpm sshd\[13597\]: Invalid user ftp from 202.51.74.189
Sep 22 00:59:37 hpm sshd\[13597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
Sep 22 00:59:39 hpm sshd\[13597\]: Failed password for invalid user ftp from 202.51.74.189 port 54706 ssh2
Sep 22 01:04:42 hpm sshd\[14047\]: Invalid user teamspeak from 202.51.74.189
Sep 22 01:04:42 hpm sshd\[14047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
2019-09-22 19:39:40
144.217.83.201 attack
Sep 22 05:48:22 saschabauer sshd[28892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.83.201
Sep 22 05:48:24 saschabauer sshd[28892]: Failed password for invalid user accounts from 144.217.83.201 port 60460 ssh2
2019-09-22 19:58:12
2.67.88.158 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/2.67.88.158/ 
 SE - 1H : (18)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SE 
 NAME ASN : ASN44034 
 
 IP : 2.67.88.158 
 
 CIDR : 2.64.0.0/13 
 
 PREFIX COUNT : 10 
 
 UNIQUE IP COUNT : 1007616 
 
 
 WYKRYTE ATAKI Z ASN44034 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-22 19:37:02
220.133.137.119 attackspambots
Honeypot attack, port: 445, PTR: 220-133-137-119.HINET-IP.hinet.net.
2019-09-22 19:51:50
51.38.144.159 attackspambots
Sep 21 21:18:19 lcprod sshd\[28056\]: Invalid user ellie123 from 51.38.144.159
Sep 21 21:18:19 lcprod sshd\[28056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip159.ip-51-38-144.eu
Sep 21 21:18:21 lcprod sshd\[28056\]: Failed password for invalid user ellie123 from 51.38.144.159 port 46000 ssh2
Sep 21 21:23:01 lcprod sshd\[28497\]: Invalid user wwwuser from 51.38.144.159
Sep 21 21:23:01 lcprod sshd\[28497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip159.ip-51-38-144.eu
2019-09-22 19:26:57

最近上报的IP列表

163.141.30.214 135.150.3.246 249.50.111.153 166.240.85.10
225.27.241.231 202.67.140.183 163.161.176.146 136.191.250.144
184.167.44.14 213.116.18.134 223.36.66.220 225.63.172.108
74.63.0.189 163.245.182.30 220.118.139.155 196.125.164.84
57.0.37.210 28.42.177.174 52.14.80.21 5.71.1.79