必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.80.14.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.80.14.50.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110801 1800 900 604800 86400

;; Query time: 179 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Nov 09 03:09:18 CST 2022
;; MSG SIZE  rcvd: 104
HOST信息:
Host 50.14.80.85.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.14.80.85.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.88.112.62 attackbotsspam
2020-01-18 08:19:58 -> 2020-01-20 19:44:32 : 37 login attempts (49.88.112.62)
2020-01-21 06:06:05
111.231.32.127 attackspambots
Jan 20 22:52:47 vpn01 sshd[3921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.32.127
Jan 20 22:52:49 vpn01 sshd[3921]: Failed password for invalid user customer from 111.231.32.127 port 57964 ssh2
...
2020-01-21 05:58:00
188.166.5.84 attackspambots
2019-12-20T10:42:57.470415suse-nuc sshd[26708]: Invalid user maimond from 188.166.5.84 port 43850
...
2020-01-21 05:52:22
188.166.41.192 attack
2019-09-17T23:25:51.999365suse-nuc sshd[21203]: Invalid user kigwa from 188.166.41.192 port 35132
...
2020-01-21 05:53:18
222.186.175.161 attackspambots
Jan 20 22:49:14 vmanager6029 sshd\[32012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.161  user=root
Jan 20 22:49:15 vmanager6029 sshd\[32012\]: Failed password for root from 222.186.175.161 port 11262 ssh2
Jan 20 22:49:18 vmanager6029 sshd\[32012\]: Failed password for root from 222.186.175.161 port 11262 ssh2
2020-01-21 05:57:11
222.186.31.135 attackbotsspam
Jan 20 21:46:39 marvibiene sshd[19666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Jan 20 21:46:41 marvibiene sshd[19666]: Failed password for root from 222.186.31.135 port 64355 ssh2
Jan 20 21:46:44 marvibiene sshd[19666]: Failed password for root from 222.186.31.135 port 64355 ssh2
Jan 20 21:46:39 marvibiene sshd[19666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.135  user=root
Jan 20 21:46:41 marvibiene sshd[19666]: Failed password for root from 222.186.31.135 port 64355 ssh2
Jan 20 21:46:44 marvibiene sshd[19666]: Failed password for root from 222.186.31.135 port 64355 ssh2
...
2020-01-21 05:52:38
188.213.165.47 attackbots
Unauthorized connection attempt detected from IP address 188.213.165.47 to port 2220 [J]
2020-01-21 05:49:31
188.166.117.213 attackbots
2020-01-11T21:16:07.894437suse-nuc sshd[8241]: Invalid user webmaster from 188.166.117.213 port 40178
...
2020-01-21 06:09:43
188.165.242.200 attackspambots
2019-09-23T23:48:56.046837suse-nuc sshd[2584]: Invalid user dev from 188.165.242.200 port 54398
...
2020-01-21 06:13:53
188.166.232.14 attackspam
Unauthorized connection attempt detected from IP address 188.166.232.14 to port 2220 [J]
2020-01-21 05:58:40
218.76.171.129 attackbotsspam
Jan 20 18:27:46 firewall sshd[31604]: Invalid user gpadmin from 218.76.171.129
Jan 20 18:27:49 firewall sshd[31604]: Failed password for invalid user gpadmin from 218.76.171.129 port 55413 ssh2
Jan 20 18:32:47 firewall sshd[31731]: Invalid user gpadmin from 218.76.171.129
...
2020-01-21 05:46:28
52.170.222.11 attackbots
2020-01-20T21:08:08.530689shield sshd\[4269\]: Invalid user test from 52.170.222.11 port 52700
2020-01-20T21:08:08.537887shield sshd\[4269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.222.11
2020-01-20T21:08:10.827120shield sshd\[4269\]: Failed password for invalid user test from 52.170.222.11 port 52700 ssh2
2020-01-20T21:11:47.638462shield sshd\[5606\]: Invalid user teste from 52.170.222.11 port 56310
2020-01-20T21:11:47.642583shield sshd\[5606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.170.222.11
2020-01-21 05:43:44
200.118.65.187 attack
Email address rejected
2020-01-21 06:16:03
222.186.180.130 attackspam
20.01.2020 22:09:09 SSH access blocked by firewall
2020-01-21 06:12:01
188.166.44.186 attack
2019-12-15T17:22:28.477568suse-nuc sshd[16411]: Invalid user ident from 188.166.44.186 port 46844
...
2020-01-21 05:53:03

最近上报的IP列表

13.168.75.121 37.228.67.130 90.96.138.225 166.230.22.120
177.153.209.150 113.89.180.240 246.24.173.143 220.1.158.182
117.33.207.211 252.21.8.255 139.116.178.25 47.244.120.166
167.155.3.128 253.197.96.197 96.51.243.224 41.15.230.164
251.123.244.171 139.116.178.124 4.166.32.39 231.110.112.183