必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.51.50.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44852
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.51.50.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 19:16:53 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 104.50.51.56.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 104.50.51.56.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
110.137.28.218 attack
445/tcp 445/tcp 445/tcp...
[2019-06-12/07-19]4pkt,1pt.(tcp)
2019-07-20 03:17:56
27.34.245.238 attackbots
Jul 19 20:59:08 h2177944 sshd\[21513\]: Invalid user elizabeth from 27.34.245.238 port 52752
Jul 19 20:59:08 h2177944 sshd\[21513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.34.245.238
Jul 19 20:59:10 h2177944 sshd\[21513\]: Failed password for invalid user elizabeth from 27.34.245.238 port 52752 ssh2
Jul 19 21:11:03 h2177944 sshd\[22213\]: Invalid user lance from 27.34.245.238 port 42556
...
2019-07-20 03:45:32
51.77.28.40 attackbotsspam
Jul 19 21:12:59 legacy sshd[19700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.28.40
Jul 19 21:13:01 legacy sshd[19700]: Failed password for invalid user csserver from 51.77.28.40 port 43590 ssh2
Jul 19 21:13:19 legacy sshd[19707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.28.40
...
2019-07-20 03:32:41
51.79.129.235 attack
Jul 19 20:13:50 localhost sshd\[42183\]: Invalid user mashby from 51.79.129.235 port 55536
Jul 19 20:13:50 localhost sshd\[42183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.129.235
...
2019-07-20 03:19:50
47.204.197.188 attack
2019-07-19T22:13:03.055883ns1.unifynetsol.net webmin\[3629\]: Invalid login as root from 47.204.197.188
2019-07-19T22:13:08.824218ns1.unifynetsol.net webmin\[3630\]: Invalid login as root from 47.204.197.188
2019-07-19T22:13:14.573858ns1.unifynetsol.net webmin\[3631\]: Invalid login as root from 47.204.197.188
2019-07-19T22:13:20.350050ns1.unifynetsol.net webmin\[3637\]: Invalid login as root from 47.204.197.188
2019-07-19T22:13:26.101630ns1.unifynetsol.net webmin\[3643\]: Invalid login as root from 47.204.197.188
2019-07-20 03:48:16
52.76.44.121 attackspambots
WordPress XMLRPC scan :: 52.76.44.121 0.116 BYPASS [20/Jul/2019:05:34:40  1000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 200 413 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-20 03:39:03
220.161.243.166 attackspam
Jul 19 18:27:55 mxgate1 postfix/postscreen[5008]: CONNECT from [220.161.243.166]:54995 to [176.31.12.44]:25
Jul 19 18:27:55 mxgate1 postfix/dnsblog[5155]: addr 220.161.243.166 listed by domain zen.spamhaus.org as 127.0.0.11
Jul 19 18:27:55 mxgate1 postfix/dnsblog[5155]: addr 220.161.243.166 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 19 18:27:55 mxgate1 postfix/dnsblog[5156]: addr 220.161.243.166 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 19 18:27:55 mxgate1 postfix/dnsblog[5157]: addr 220.161.243.166 listed by domain b.barracudacentral.org as 127.0.0.2
Jul 19 18:28:01 mxgate1 postfix/postscreen[5008]: DNSBL rank 4 for [220.161.243.166]:54995
Jul x@x
Jul 19 18:28:02 mxgate1 postfix/postscreen[5008]: HANGUP after 0.93 from [220.161.243.166]:54995 in tests after SMTP handshake
Jul 19 18:28:02 mxgate1 postfix/postscreen[5008]: DISCONNECT [220.161.243.166]:54995
Jul 19 18:28:02 mxgate1 postfix/postscreen[5008]: CONNECT from [220.161.243.166]:55069 to [176.31.1........
-------------------------------
2019-07-20 03:40:46
159.65.182.7 attackspambots
Jul 20 00:31:22 vibhu-HP-Z238-Microtower-Workstation sshd\[2373\]: Invalid user cmveng from 159.65.182.7
Jul 20 00:31:22 vibhu-HP-Z238-Microtower-Workstation sshd\[2373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.182.7
Jul 20 00:31:24 vibhu-HP-Z238-Microtower-Workstation sshd\[2373\]: Failed password for invalid user cmveng from 159.65.182.7 port 52250 ssh2
Jul 20 00:35:51 vibhu-HP-Z238-Microtower-Workstation sshd\[2516\]: Invalid user pt from 159.65.182.7
Jul 20 00:35:51 vibhu-HP-Z238-Microtower-Workstation sshd\[2516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.182.7
...
2019-07-20 03:05:55
144.217.194.18 attack
#1703 - [144.217.194.183] Error: 550 5.7.1 Forged HELO hostname detected
#1703 - [144.217.194.183] Error: 550 5.7.1 Forged HELO hostname detected
#1703 - [144.217.194.183] Error: 550 5.7.1 Forged HELO hostname detected
#1703 - [144.217.194.183] Error: 550 5.7.1 Forged HELO hostname detected

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=144.217.194.18
2019-07-20 03:44:52
188.39.26.178 attackbots
188.39.26.178 - - [19/Jul/2019:18:44:26 +0200] "GET /wp-login.php HTTP/1.1" 302 573
...
2019-07-20 03:03:33
52.143.153.32 attackspambots
Jul 19 21:00:03 OPSO sshd\[8973\]: Invalid user teamspeak from 52.143.153.32 port 40548
Jul 19 21:00:03 OPSO sshd\[8973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.143.153.32
Jul 19 21:00:05 OPSO sshd\[8973\]: Failed password for invalid user teamspeak from 52.143.153.32 port 40548 ssh2
Jul 19 21:05:06 OPSO sshd\[9441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.143.153.32  user=root
Jul 19 21:05:08 OPSO sshd\[9441\]: Failed password for root from 52.143.153.32 port 38922 ssh2
2019-07-20 03:15:38
31.192.108.111 attack
Brute forcing RDP port 3389
2019-07-20 03:25:20
115.90.219.20 attackbots
Jul 19 16:43:43 sshgateway sshd\[3163\]: Invalid user cf from 115.90.219.20
Jul 19 16:43:43 sshgateway sshd\[3163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.90.219.20
Jul 19 16:43:44 sshgateway sshd\[3163\]: Failed password for invalid user cf from 115.90.219.20 port 52740 ssh2
2019-07-20 03:31:05
183.103.61.243 attackbots
Jul 19 19:49:11 mail sshd\[17102\]: Failed password for invalid user stack from 183.103.61.243 port 42180 ssh2
Jul 19 20:04:44 mail sshd\[17217\]: Invalid user neo from 183.103.61.243 port 57876
Jul 19 20:04:44 mail sshd\[17217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.103.61.243
...
2019-07-20 03:09:36
167.71.201.25 attack
Jul 19 12:14:12 XXX sshd[30679]: User r.r from 167.71.201.25 not allowed because none of user's groups are listed in AllowGroups
Jul 19 12:14:12 XXX sshd[30679]: Received disconnect from 167.71.201.25: 11: Bye Bye [preauth]
Jul 19 12:14:13 XXX sshd[30681]: Invalid user admin from 167.71.201.25
Jul 19 12:14:14 XXX sshd[30681]: Received disconnect from 167.71.201.25: 11: Bye Bye [preauth]
Jul 19 12:14:15 XXX sshd[30683]: Invalid user admin from 167.71.201.25
Jul 19 12:14:15 XXX sshd[30683]: Received disconnect from 167.71.201.25: 11: Bye Bye [preauth]
Jul 19 12:14:17 XXX sshd[30685]: Invalid user user from 167.71.201.25
Jul 19 12:14:17 XXX sshd[30685]: Received disconnect from 167.71.201.25: 11: Bye Bye [preauth]
Jul 19 12:14:18 XXX sshd[30687]: Invalid user ubnt from 167.71.201.25
Jul 19 12:14:18 XXX sshd[30687]: Received disconnect from 167.71.201.25: 11: Bye Bye [preauth]
Jul 19 12:14:19 XXX sshd[30689]: Invalid user admin from 167.71.201.25
Jul 19 12:14:20 XXX sshd[30........
-------------------------------
2019-07-20 03:17:30

最近上报的IP列表

38.160.64.99 75.246.196.38 143.44.63.46 254.55.36.226
140.159.21.221 146.86.142.57 97.22.246.158 93.243.179.74
182.114.76.217 187.89.234.211 237.119.60.36 185.241.52.68
231.43.104.126 165.96.77.194 134.246.82.123 23.134.237.199
229.64.113.193 180.57.27.102 167.225.143.147 197.237.218.34