必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): France

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.130.124.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.130.124.50.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 04:53:12 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 50.124.130.57.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.124.130.57.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
5.188.87.19 attackbotsspam
firewall-block, port(s): 8070/tcp
2019-07-14 03:27:32
104.248.134.200 attack
Jul 13 20:59:47 mail sshd\[1549\]: Invalid user lundi from 104.248.134.200 port 60816
Jul 13 20:59:47 mail sshd\[1549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.200
Jul 13 20:59:49 mail sshd\[1549\]: Failed password for invalid user lundi from 104.248.134.200 port 60816 ssh2
Jul 13 21:05:14 mail sshd\[3179\]: Invalid user teamspeak2 from 104.248.134.200 port 34926
Jul 13 21:05:14 mail sshd\[3179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.200
2019-07-14 03:18:36
185.176.26.14 attack
13.07.2019 17:36:39 Connection to port 5000 blocked by firewall
2019-07-14 03:40:38
182.74.25.246 attackbots
Jul 13 19:42:45 debian sshd\[27102\]: Invalid user sonar from 182.74.25.246 port 40770
Jul 13 19:42:45 debian sshd\[27102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246
...
2019-07-14 03:23:42
190.109.43.28 attack
Jul 13 11:11:06 web1 postfix/smtpd[14724]: warning: unknown[190.109.43.28]: SASL PLAIN authentication failed: authentication failure
...
2019-07-14 03:45:28
14.157.56.102 attackspam
Triggered by Fail2Ban
2019-07-14 03:42:20
157.230.139.95 attack
Jul 13 19:49:57 localhost sshd\[15405\]: Invalid user paula from 157.230.139.95 port 36574
Jul 13 19:49:57 localhost sshd\[15405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.139.95
...
2019-07-14 03:08:11
112.169.9.149 attack
Jul 13 15:39:47 plusreed sshd[15574]: Invalid user test from 112.169.9.149
...
2019-07-14 03:43:12
118.163.178.146 attackbots
Jul 13 20:45:59 * sshd[25529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.178.146
Jul 13 20:46:01 * sshd[25529]: Failed password for invalid user wayne from 118.163.178.146 port 57933 ssh2
2019-07-14 03:06:02
82.159.138.57 attack
Jul 13 21:30:46 vps691689 sshd[22712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.159.138.57
Jul 13 21:30:48 vps691689 sshd[22712]: Failed password for invalid user like from 82.159.138.57 port 62102 ssh2
...
2019-07-14 03:39:01
201.216.217.17 attackbots
Telnet Server BruteForce Attack
2019-07-14 03:45:01
104.189.118.224 attack
Jul 14 00:28:07 vibhu-HP-Z238-Microtower-Workstation sshd\[32669\]: Invalid user ben from 104.189.118.224
Jul 14 00:28:07 vibhu-HP-Z238-Microtower-Workstation sshd\[32669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.189.118.224
Jul 14 00:28:09 vibhu-HP-Z238-Microtower-Workstation sshd\[32669\]: Failed password for invalid user ben from 104.189.118.224 port 54944 ssh2
Jul 14 00:33:07 vibhu-HP-Z238-Microtower-Workstation sshd\[442\]: Invalid user testtest from 104.189.118.224
Jul 14 00:33:07 vibhu-HP-Z238-Microtower-Workstation sshd\[442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.189.118.224
...
2019-07-14 03:09:03
68.183.83.82 attackbots
Jul 13 14:41:28 borg sshd[14876]: Failed unknown for invalid user fake from 68.183.83.82 port 52330 ssh2
Jul 13 14:41:30 borg sshd[17006]: Failed unknown for invalid user user from 68.183.83.82 port 54710 ssh2
Jul 13 14:41:32 borg sshd[20081]: Failed unknown for invalid user ubnt from 68.183.83.82 port 56854 ssh2
...
2019-07-14 03:42:02
179.36.255.11 attack
Lines containing failures of 179.36.255.11
Jul 13 16:52:24 mellenthin postfix/smtpd[7337]: connect from unknown[179.36.255.11]
Jul x@x
Jul 13 16:52:26 mellenthin postfix/smtpd[7337]: lost connection after DATA from unknown[179.36.255.11]
Jul 13 16:52:26 mellenthin postfix/smtpd[7337]: disconnect from unknown[179.36.255.11] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.36.255.11
2019-07-14 03:19:58
106.12.194.207 attackbotsspam
Jul 13 22:28:10 srv-4 sshd\[5489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.207  user=memcache
Jul 13 22:28:13 srv-4 sshd\[5489\]: Failed password for memcache from 106.12.194.207 port 54866 ssh2
Jul 13 22:33:57 srv-4 sshd\[6022\]: Invalid user temp from 106.12.194.207
...
2019-07-14 03:44:34

最近上报的IP列表

23.4.255.76 205.200.219.102 64.83.31.203 60.207.90.153
108.174.161.192 83.23.132.46 252.236.87.38 41.167.8.54
12.15.15.158 33.58.177.207 22.47.93.216 218.26.193.145
191.56.77.38 147.105.66.77 223.192.9.142 187.139.24.46
27.13.139.94 95.173.92.209 194.153.147.54 95.91.248.199