必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.12.221.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18400
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;77.12.221.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 17:55:08 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
50.221.12.77.in-addr.arpa domain name pointer dynamic-077-012-221-050.77.12.pool.telefonica.de.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.221.12.77.in-addr.arpa	name = dynamic-077-012-221-050.77.12.pool.telefonica.de.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.248.167.102 attack
Apr 14 07:27:36 meumeu sshd[3083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.167.102 
Apr 14 07:27:38 meumeu sshd[3083]: Failed password for invalid user demo from 49.248.167.102 port 36982 ssh2
Apr 14 07:31:37 meumeu sshd[3798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.167.102 
...
2019-12-01 08:54:31
45.76.96.106 attackspambots
Nov 28 05:01:49 sip sshd[16762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.96.106
Nov 28 05:01:51 sip sshd[16762]: Failed password for invalid user squash from 45.76.96.106 port 48466 ssh2
Nov 28 05:21:32 sip sshd[20352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.96.106
2019-12-01 08:50:58
49.50.64.221 attack
Nov 29 20:31:46 sip sshd[29982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.50.64.221
Nov 29 20:31:49 sip sshd[29982]: Failed password for invalid user eric from 49.50.64.221 port 55746 ssh2
Nov 29 22:11:47 sip sshd[15955]: Failed password for root from 49.50.64.221 port 33424 ssh2
2019-12-01 08:49:20
117.50.1.12 attack
Nov 30 17:46:47 dallas01 sshd[24258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.1.12
Nov 30 17:46:49 dallas01 sshd[24258]: Failed password for invalid user de from 117.50.1.12 port 60656 ssh2
Nov 30 17:50:41 dallas01 sshd[24928]: Failed password for root from 117.50.1.12 port 35844 ssh2
2019-12-01 08:47:43
172.81.248.249 attackbotsspam
Repeated failed SSH attempt
2019-12-01 09:07:14
152.32.187.177 attackbotsspam
Dec  1 00:29:40 localhost sshd[46262]: Failed password for root from 152.32.187.177 port 45816 ssh2
Dec  1 00:49:31 localhost sshd[47485]: Failed password for invalid user vyan from 152.32.187.177 port 41550 ssh2
Dec  1 00:52:35 localhost sshd[47637]: Failed password for invalid user irina from 152.32.187.177 port 50076 ssh2
2019-12-01 08:31:46
222.242.223.75 attackspambots
no
2019-12-01 09:03:54
51.83.73.160 attackspambots
Nov 30 14:31:18 eddieflores sshd\[2475\]: Invalid user rpm from 51.83.73.160
Nov 30 14:31:18 eddieflores sshd\[2475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.ip-51-83-73.eu
Nov 30 14:31:20 eddieflores sshd\[2475\]: Failed password for invalid user rpm from 51.83.73.160 port 36660 ssh2
Nov 30 14:34:31 eddieflores sshd\[2701\]: Invalid user beulah from 51.83.73.160
Nov 30 14:34:31 eddieflores sshd\[2701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.ip-51-83-73.eu
2019-12-01 08:39:23
23.122.4.188 attack
Nov 27 18:03:42 sip sshd[26299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.122.4.188
Nov 27 18:03:42 sip sshd[26300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.122.4.188
Nov 27 18:03:45 sip sshd[26299]: Failed password for invalid user pi from 23.122.4.188 port 60892 ssh2
Nov 27 18:03:45 sip sshd[26300]: Failed password for invalid user pi from 23.122.4.188 port 60902 ssh2
2019-12-01 09:03:22
51.15.127.185 attackspam
Nov 27 12:54:53 sip sshd[2174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.127.185
Nov 27 12:54:55 sip sshd[2174]: Failed password for invalid user bouncer from 51.15.127.185 port 42414 ssh2
Nov 27 13:36:31 sip sshd[9813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.127.185
2019-12-01 08:42:53
36.74.75.31 attackspam
Nov 29 16:47:55 sip sshd[21293]: Failed password for root from 36.74.75.31 port 56035 ssh2
Nov 29 17:03:23 sip sshd[24097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.74.75.31
Nov 29 17:03:25 sip sshd[24097]: Failed password for invalid user mingione from 36.74.75.31 port 43781 ssh2
2019-12-01 08:57:35
35.185.239.108 attackbots
Dec  1 00:40:46 localhost sshd\[119436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.185.239.108  user=root
Dec  1 00:40:48 localhost sshd\[119436\]: Failed password for root from 35.185.239.108 port 37466 ssh2
Dec  1 00:46:37 localhost sshd\[119567\]: Invalid user belva from 35.185.239.108 port 35160
Dec  1 00:46:37 localhost sshd\[119567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.185.239.108
Dec  1 00:46:39 localhost sshd\[119567\]: Failed password for invalid user belva from 35.185.239.108 port 35160 ssh2
...
2019-12-01 09:00:43
81.28.100.137 attackspambots
2019-11-30T23:39:44.693403stark.klein-stark.info postfix/smtpd\[23777\]: NOQUEUE: reject: RCPT from twig.shrewdmhealth.com\[81.28.100.137\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\
...
2019-12-01 09:02:46
94.198.110.205 attackbots
Dec  1 01:55:40 markkoudstaal sshd[2577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.198.110.205
Dec  1 01:55:42 markkoudstaal sshd[2577]: Failed password for invalid user erc from 94.198.110.205 port 43118 ssh2
Dec  1 02:01:58 markkoudstaal sshd[3230]: Failed password for root from 94.198.110.205 port 60635 ssh2
2019-12-01 09:02:34
49.235.73.221 attackspambots
Invalid user florey from 49.235.73.221 port 41028
2019-12-01 08:48:38

最近上报的IP列表

209.157.233.212 2.231.148.63 230.219.201.235 252.6.64.237
52.224.54.10 173.212.131.212 189.125.185.253 104.42.199.181
191.192.108.216 141.196.85.94 227.25.100.47 138.23.36.214
50.79.199.16 4.197.75.216 8.95.149.72 29.87.59.176
116.95.221.184 191.29.231.20 50.16.32.135 86.7.138.77