必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Italy

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.21.50.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.21.50.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 13:10:23 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
148.50.21.80.in-addr.arpa domain name pointer host-80-21-50-148.business.telecomitalia.it.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.50.21.80.in-addr.arpa	name = host-80-21-50-148.business.telecomitalia.it.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.114.79.98 attackspambots
Oct  6 23:19:06 MK-Soft-VM7 sshd[32174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.79.98 
Oct  6 23:19:08 MK-Soft-VM7 sshd[32174]: Failed password for invalid user usuario from 122.114.79.98 port 51072 ssh2
...
2019-10-07 06:29:47
116.255.149.226 attackspambots
Oct  6 12:21:39 auw2 sshd\[19069\]: Invalid user !@\#\$ASDF from 116.255.149.226
Oct  6 12:21:39 auw2 sshd\[19069\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.149.226
Oct  6 12:21:41 auw2 sshd\[19069\]: Failed password for invalid user !@\#\$ASDF from 116.255.149.226 port 52465 ssh2
Oct  6 12:26:00 auw2 sshd\[19488\]: Invalid user !@\#\$ASDF from 116.255.149.226
Oct  6 12:26:00 auw2 sshd\[19488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.255.149.226
2019-10-07 06:37:11
80.82.78.104 attackspam
firewall-block, port(s): 5800/tcp
2019-10-07 06:22:38
185.36.81.231 attackbots
Oct  6 20:17:35 heicom postfix/smtpd\[28769\]: warning: unknown\[185.36.81.231\]: SASL LOGIN authentication failed: authentication failure
Oct  6 20:44:57 heicom postfix/smtpd\[28769\]: warning: unknown\[185.36.81.231\]: SASL LOGIN authentication failed: authentication failure
Oct  6 21:12:03 heicom postfix/smtpd\[30416\]: warning: unknown\[185.36.81.231\]: SASL LOGIN authentication failed: authentication failure
Oct  6 21:39:41 heicom postfix/smtpd\[32127\]: warning: unknown\[185.36.81.231\]: SASL LOGIN authentication failed: authentication failure
Oct  6 22:07:01 heicom postfix/smtpd\[32127\]: warning: unknown\[185.36.81.231\]: SASL LOGIN authentication failed: authentication failure
...
2019-10-07 06:16:08
212.64.57.24 attackspambots
Oct  6 23:54:18 bouncer sshd\[17904\]: Invalid user Dot@2017 from 212.64.57.24 port 60611
Oct  6 23:54:18 bouncer sshd\[17904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.24 
Oct  6 23:54:20 bouncer sshd\[17904\]: Failed password for invalid user Dot@2017 from 212.64.57.24 port 60611 ssh2
...
2019-10-07 06:38:22
175.139.242.49 attack
2019-10-07T01:24:14.598397tmaserv sshd\[13613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.242.49  user=root
2019-10-07T01:24:16.572982tmaserv sshd\[13613\]: Failed password for root from 175.139.242.49 port 28833 ssh2
2019-10-07T01:28:25.709405tmaserv sshd\[13790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.242.49  user=root
2019-10-07T01:28:27.809978tmaserv sshd\[13790\]: Failed password for root from 175.139.242.49 port 18111 ssh2
2019-10-07T01:32:38.117887tmaserv sshd\[13983\]: Invalid user 123 from 175.139.242.49 port 23627
2019-10-07T01:32:38.122709tmaserv sshd\[13983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.139.242.49
...
2019-10-07 06:41:41
203.190.154.109 attack
Oct  7 00:01:31 vps01 sshd[4035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.190.154.109
Oct  7 00:01:34 vps01 sshd[4035]: Failed password for invalid user Nicolas@123 from 203.190.154.109 port 54256 ssh2
2019-10-07 06:21:40
130.61.72.90 attack
Oct  7 00:07:51 icinga sshd[54894]: Failed password for root from 130.61.72.90 port 50060 ssh2
Oct  7 00:14:01 icinga sshd[58400]: Failed password for root from 130.61.72.90 port 48062 ssh2
...
2019-10-07 06:28:35
165.227.9.145 attackspam
Oct  6 17:58:51 ny01 sshd[21774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.9.145
Oct  6 17:58:53 ny01 sshd[21774]: Failed password for invalid user Abcd12345 from 165.227.9.145 port 34712 ssh2
Oct  6 18:03:01 ny01 sshd[22428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.9.145
2019-10-07 06:16:32
174.138.222.110 attack
C1,WP GET /nelson/wp-login.php
2019-10-07 06:25:35
118.75.149.184 attackspam
Unauthorised access (Oct  6) SRC=118.75.149.184 LEN=40 TTL=49 ID=59073 TCP DPT=8080 WINDOW=9164 SYN
2019-10-07 06:13:41
115.159.147.239 attackbots
Oct  6 23:57:30 tux-35-217 sshd\[28716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.147.239  user=root
Oct  6 23:57:32 tux-35-217 sshd\[28716\]: Failed password for root from 115.159.147.239 port 55098 ssh2
Oct  7 00:01:13 tux-35-217 sshd\[28747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.147.239  user=root
Oct  7 00:01:15 tux-35-217 sshd\[28747\]: Failed password for root from 115.159.147.239 port 27379 ssh2
...
2019-10-07 06:26:50
81.22.45.152 attackbots
firewall-block, port(s): 789/tcp, 1337/tcp, 2089/tcp, 2889/tcp, 3321/tcp, 10793/tcp, 14000/tcp, 18875/tcp, 23813/tcp, 45000/tcp
2019-10-07 06:19:48
52.165.80.73 attackbots
2019-10-06T09:48:03.0738871495-001 sshd\[59656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.165.80.73  user=root
2019-10-06T09:48:04.9385261495-001 sshd\[59656\]: Failed password for root from 52.165.80.73 port 40122 ssh2
2019-10-06T09:52:14.7298521495-001 sshd\[59955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.165.80.73  user=root
2019-10-06T09:52:17.0516701495-001 sshd\[59955\]: Failed password for root from 52.165.80.73 port 52222 ssh2
2019-10-06T10:13:01.3792741495-001 sshd\[61361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.165.80.73  user=root
2019-10-06T10:13:03.2286211495-001 sshd\[61361\]: Failed password for root from 52.165.80.73 port 56178 ssh2
...
2019-10-07 06:49:04
201.228.121.230 attack
Oct  6 11:45:39 sachi sshd\[28616\]: Invalid user Jeanine_123 from 201.228.121.230
Oct  6 11:45:39 sachi sshd\[28616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.228.121.230
Oct  6 11:45:41 sachi sshd\[28616\]: Failed password for invalid user Jeanine_123 from 201.228.121.230 port 57214 ssh2
Oct  6 11:51:36 sachi sshd\[29101\]: Invalid user Eternite from 201.228.121.230
Oct  6 11:51:36 sachi sshd\[29101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.228.121.230
2019-10-07 06:20:14

最近上报的IP列表

65.211.176.18 135.98.126.108 73.214.242.122 41.131.232.209
201.68.85.72 252.160.33.206 63.233.48.139 173.222.60.228
76.31.126.90 152.46.94.164 66.225.137.199 215.45.162.209
85.184.120.205 178.34.209.69 8.8.56.133 36.126.55.99
179.125.149.216 199.123.75.164 47.237.199.86 134.1.7.220