必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 58.4.12.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;58.4.12.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 01:20:44 CST 2025
;; MSG SIZE  rcvd: 103
HOST信息:
50.12.4.58.in-addr.arpa domain name pointer 58x4x12x50.ap58.ftth.ucom.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.12.4.58.in-addr.arpa	name = 58x4x12x50.ap58.ftth.ucom.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
95.110.201.243 attackspambots
20/4/11@01:50:15: FAIL: Alarm-SSH address from=95.110.201.243
...
2020-04-11 13:51:16
192.99.58.112 attack
CMS (WordPress or Joomla) login attempt.
2020-04-11 13:22:12
89.248.167.131 attack
firewall-block, port(s): 25105/tcp
2020-04-11 13:25:55
175.24.81.169 attackspam
Apr 11 06:54:38 server sshd[23789]: Failed password for invalid user cod4 from 175.24.81.169 port 53332 ssh2
Apr 11 06:57:43 server sshd[24359]: Failed password for invalid user rodd from 175.24.81.169 port 58624 ssh2
Apr 11 07:00:48 server sshd[24988]: Failed password for root from 175.24.81.169 port 35684 ssh2
2020-04-11 13:52:58
187.214.75.193 attackspambots
Unauthorised access (Apr 11) SRC=187.214.75.193 LEN=40 TTL=46 ID=64818 TCP DPT=8080 WINDOW=65401 SYN
2020-04-11 13:54:25
49.88.112.72 attackspam
Apr 11 07:50:00 eventyay sshd[2437]: Failed password for root from 49.88.112.72 port 34973 ssh2
Apr 11 07:50:51 eventyay sshd[2458]: Failed password for root from 49.88.112.72 port 58829 ssh2
...
2020-04-11 14:01:39
112.35.90.128 attackbotsspam
Apr 11 04:29:25 marvibiene sshd[62152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.90.128  user=root
Apr 11 04:29:27 marvibiene sshd[62152]: Failed password for root from 112.35.90.128 port 59848 ssh2
Apr 11 04:33:42 marvibiene sshd[62250]: Invalid user oladapo from 112.35.90.128 port 49700
...
2020-04-11 13:12:57
106.13.49.213 attackbots
2020-04-11T04:12:57.924601shield sshd\[11514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.213  user=root
2020-04-11T04:12:59.840031shield sshd\[11514\]: Failed password for root from 106.13.49.213 port 50002 ssh2
2020-04-11T04:17:15.636195shield sshd\[11986\]: Invalid user ben from 106.13.49.213 port 52898
2020-04-11T04:17:15.638828shield sshd\[11986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.49.213
2020-04-11T04:17:17.639484shield sshd\[11986\]: Failed password for invalid user ben from 106.13.49.213 port 52898 ssh2
2020-04-11 13:43:02
216.218.206.67 attackbots
Unauthorized connection attempt detected from IP address 216.218.206.67 to port 443
2020-04-11 13:07:39
58.120.138.38 attack
Apr 11 06:31:45 ns382633 sshd\[14660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.120.138.38  user=root
Apr 11 06:31:47 ns382633 sshd\[14660\]: Failed password for root from 58.120.138.38 port 54976 ssh2
Apr 11 06:43:37 ns382633 sshd\[16602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.120.138.38  user=root
Apr 11 06:43:39 ns382633 sshd\[16602\]: Failed password for root from 58.120.138.38 port 60880 ssh2
Apr 11 06:49:40 ns382633 sshd\[17605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.120.138.38  user=root
2020-04-11 13:20:14
114.5.177.198 attackspam
114.5.177.198 - - [11/Apr/2020:07:00:28 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
114.5.177.198 - - [11/Apr/2020:07:00:31 +0200] "POST /wp-login.php HTTP/1.1" 200 6601 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
114.5.177.198 - - [11/Apr/2020:07:00:34 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-11 13:20:33
218.92.0.211 attackspam
2020-04-11T07:37:37.240530cyberdyne sshd[1359484]: Failed password for root from 218.92.0.211 port 32663 ssh2
2020-04-11T07:37:41.450023cyberdyne sshd[1359484]: Failed password for root from 218.92.0.211 port 32663 ssh2
2020-04-11T07:41:06.019671cyberdyne sshd[1359614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.211  user=root
2020-04-11T07:41:08.220354cyberdyne sshd[1359614]: Failed password for root from 218.92.0.211 port 29638 ssh2
...
2020-04-11 13:47:15
157.230.114.229 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-04-11 13:27:22
222.186.175.216 attackbots
Apr 11 07:41:39 silence02 sshd[9916]: Failed password for root from 222.186.175.216 port 21644 ssh2
Apr 11 07:41:48 silence02 sshd[9916]: Failed password for root from 222.186.175.216 port 21644 ssh2
Apr 11 07:41:52 silence02 sshd[9916]: Failed password for root from 222.186.175.216 port 21644 ssh2
Apr 11 07:41:52 silence02 sshd[9916]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 21644 ssh2 [preauth]
2020-04-11 13:42:18
129.226.50.78 attackspambots
5x Failed Password
2020-04-11 13:27:37

最近上报的IP列表

143.31.7.199 96.11.5.196 55.91.12.19 87.134.191.185
205.105.141.224 55.226.153.80 29.21.51.127 125.154.133.141
168.163.214.249 56.67.95.225 98.195.135.193 47.205.205.71
31.55.222.166 88.163.182.69 70.2.131.57 19.252.52.100
171.49.169.45 97.195.129.3 247.169.100.169 204.18.15.253