必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.50.150.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64624
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.50.150.213.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:50:16 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 213.150.50.57.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 213.150.50.57.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
193.111.155.177 attackbots
Spam
2020-04-16 03:45:58
134.209.71.245 attackspam
Apr 15 18:58:13 vmd17057 sshd[12393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.71.245 
Apr 15 18:58:15 vmd17057 sshd[12393]: Failed password for invalid user marco from 134.209.71.245 port 56860 ssh2
...
2020-04-16 03:23:47
111.93.71.219 attack
Apr 15 12:18:18 mockhub sshd[15098]: Failed password for root from 111.93.71.219 port 35023 ssh2
...
2020-04-16 03:40:22
138.197.162.28 attackspam
Apr 15 19:14:13 124388 sshd[1218]: Invalid user password123 from 138.197.162.28 port 41384
Apr 15 19:14:13 124388 sshd[1218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.162.28
Apr 15 19:14:13 124388 sshd[1218]: Invalid user password123 from 138.197.162.28 port 41384
Apr 15 19:14:16 124388 sshd[1218]: Failed password for invalid user password123 from 138.197.162.28 port 41384 ssh2
Apr 15 19:17:30 124388 sshd[1344]: Invalid user kriss from 138.197.162.28 port 48588
2020-04-16 03:20:24
134.122.19.102 attackbots
2020-04-15T20:11:40.735348rocketchat.forhosting.nl sshd[8551]: Invalid user nuxeo from 134.122.19.102 port 35670
2020-04-15T20:11:42.984514rocketchat.forhosting.nl sshd[8551]: Failed password for invalid user nuxeo from 134.122.19.102 port 35670 ssh2
2020-04-15T20:17:03.021534rocketchat.forhosting.nl sshd[8682]: Invalid user tidb from 134.122.19.102 port 50326
...
2020-04-16 03:24:14
60.186.172.150 attackbotsspam
Honeypot attack, port: 81, PTR: 150.172.186.60.broad.hz.zj.dynamic.163data.com.cn.
2020-04-16 03:29:48
121.229.51.1 attackbotsspam
Apr 15 03:28:36 debian sshd[31529]: Failed password for root from 121.229.51.1 port 45532 ssh2
Apr 15 03:36:09 debian sshd[31559]: Failed password for root from 121.229.51.1 port 40204 ssh2
2020-04-16 03:31:35
107.170.204.148 attackspambots
$f2bV_matches
2020-04-16 03:43:59
87.150.151.22 attack
Chat Spam
2020-04-16 03:38:19
213.113.115.65 attackspambots
Honeypot attack, port: 5555, PTR: c-417371d5.020-168-73746f22.bbcust.telenor.se.
2020-04-16 03:09:13
117.158.175.167 attack
Apr 15 14:37:50 debian sshd[971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.175.167 
Apr 15 14:37:52 debian sshd[971]: Failed password for invalid user zte from 117.158.175.167 port 60532 ssh2
Apr 15 14:45:15 debian sshd[975]: Failed password for root from 117.158.175.167 port 35282 ssh2
2020-04-16 03:35:45
113.88.165.66 attack
Apr 15 12:17:01 debian sshd[375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.88.165.66 
Apr 15 12:17:02 debian sshd[375]: Failed password for invalid user user from 113.88.165.66 port 40808 ssh2
Apr 15 12:24:08 debian sshd[393]: Failed password for root from 113.88.165.66 port 49162 ssh2
2020-04-16 03:39:37
103.23.102.3 attackbots
Apr 15 14:11:18 ws19vmsma01 sshd[101463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.23.102.3
Apr 15 14:11:20 ws19vmsma01 sshd[101463]: Failed password for invalid user website from 103.23.102.3 port 47234 ssh2
...
2020-04-16 03:25:20
103.224.36.226 attackbotsspam
Apr 15 19:10:46 game-panel sshd[3664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.36.226
Apr 15 19:10:48 game-panel sshd[3664]: Failed password for invalid user zabbix from 103.224.36.226 port 37264 ssh2
Apr 15 19:14:47 game-panel sshd[3848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.224.36.226
2020-04-16 03:34:06
183.221.88.142 attack
Apr 15 21:11:42 * sshd[10440]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.221.88.142
Apr 15 21:11:44 * sshd[10440]: Failed password for invalid user ec2-user from 183.221.88.142 port 38610 ssh2
2020-04-16 03:14:47

最近上报的IP列表

65.196.16.177 225.236.200.196 156.0.88.162 246.249.114.78
21.216.108.253 36.42.188.202 173.141.169.242 22.191.79.2
227.57.117.121 118.162.251.173 248.210.91.50 204.254.182.59
161.58.131.43 118.114.36.76 64.181.70.87 89.75.247.76
167.161.108.105 147.227.67.35 229.154.112.136 133.181.171.196