必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.42.134.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.42.134.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 02:15:42 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
50.134.42.81.in-addr.arpa domain name pointer 50.red-81-42-134.staticip.rima-tde.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.134.42.81.in-addr.arpa	name = 50.red-81-42-134.staticip.rima-tde.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
185.230.127.228 attackspambots
1,13-12/04 [bc01/m03] concatform PostRequest-Spammer scoring: Durban02
2019-08-21 16:27:17
217.115.10.132 attackspam
Aug 21 09:40:52 SilenceServices sshd[20184]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.115.10.132
Aug 21 09:40:55 SilenceServices sshd[20184]: Failed password for invalid user admins from 217.115.10.132 port 35312 ssh2
Aug 21 09:40:59 SilenceServices sshd[20224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.115.10.132
2019-08-21 16:01:57
94.23.41.222 attackspam
Aug 21 09:38:30 SilenceServices sshd[18167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.41.222
Aug 21 09:38:32 SilenceServices sshd[18167]: Failed password for invalid user 1q2w3e4r from 94.23.41.222 port 50548 ssh2
Aug 21 09:42:30 SilenceServices sshd[21371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.41.222
2019-08-21 16:11:57
145.239.89.243 attack
2019-08-21T08:02:16.948205abusebot-6.cloudsearch.cf sshd\[14315\]: Invalid user kristin from 145.239.89.243 port 53642
2019-08-21 16:06:26
181.49.164.253 attackbots
Aug 21 03:24:57 MK-Soft-Root1 sshd\[8425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.164.253  user=root
Aug 21 03:25:00 MK-Soft-Root1 sshd\[8425\]: Failed password for root from 181.49.164.253 port 46225 ssh2
Aug 21 03:29:23 MK-Soft-Root1 sshd\[9125\]: Invalid user anders from 181.49.164.253 port 40094
Aug 21 03:29:23 MK-Soft-Root1 sshd\[9125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.164.253
...
2019-08-21 15:54:39
222.186.42.163 attackbots
$f2bV_matches
2019-08-21 16:07:37
1.214.81.155 attackbots
Unauthorised access (Aug 21) SRC=1.214.81.155 LEN=52 TTL=105 ID=29180 DF TCP DPT=1433 WINDOW=8192 SYN
2019-08-21 16:15:04
52.82.57.166 attackbots
Aug 21 05:10:29 plex sshd[6329]: Invalid user internatsschule from 52.82.57.166 port 57268
2019-08-21 16:01:01
190.3.84.151 attack
Aug 20 16:36:05 php2 sshd\[7200\]: Invalid user git from 190.3.84.151
Aug 20 16:36:05 php2 sshd\[7200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.3.84.151
Aug 20 16:36:07 php2 sshd\[7200\]: Failed password for invalid user git from 190.3.84.151 port 40102 ssh2
Aug 20 16:44:11 php2 sshd\[8168\]: Invalid user git from 190.3.84.151
Aug 20 16:44:11 php2 sshd\[8168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.3.84.151
2019-08-21 15:52:53
154.66.224.203 attack
2019-08-21T01:29:13.779675abusebot-5.cloudsearch.cf sshd\[30289\]: Invalid user admin1 from 154.66.224.203 port 60521
2019-08-21 16:03:32
51.75.23.242 attackbots
Invalid user alex from 51.75.23.242 port 54968
2019-08-21 15:47:00
103.207.11.10 attackspambots
Automatic report - Banned IP Access
2019-08-21 16:17:13
194.219.126.110 attackspam
Aug 15 06:00:53 server sshd\[34651\]: Invalid user brollins from 194.219.126.110
Aug 15 06:00:53 server sshd\[34651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.219.126.110
Aug 15 06:00:54 server sshd\[34651\]: Failed password for invalid user brollins from 194.219.126.110 port 59936 ssh2
...
2019-08-21 15:48:00
188.166.236.211 attackbots
Aug 21 03:28:40 vps200512 sshd\[6319\]: Invalid user fourjs from 188.166.236.211
Aug 21 03:28:40 vps200512 sshd\[6319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.211
Aug 21 03:28:41 vps200512 sshd\[6319\]: Failed password for invalid user fourjs from 188.166.236.211 port 51978 ssh2
Aug 21 03:34:21 vps200512 sshd\[6501\]: Invalid user 1234 from 188.166.236.211
Aug 21 03:34:21 vps200512 sshd\[6501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.236.211
2019-08-21 15:39:12
196.52.43.90 attackspam
44818/udp 6001/tcp 5000/tcp...
[2019-06-20/08-20]38pkt,25pt.(tcp),5pt.(udp)
2019-08-21 16:15:42

最近上报的IP列表

84.181.145.70 108.19.66.32 227.237.76.91 98.28.78.111
82.61.185.207 244.82.99.104 153.199.83.86 230.20.60.99
122.244.103.155 253.187.108.175 20.118.218.104 60.255.96.218
232.77.1.172 71.127.162.138 204.150.210.182 202.85.237.200
99.207.20.248 194.153.139.247 72.108.141.74 66.234.199.100