必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Sweden

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.130.50.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.130.50.158.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:02:25 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
158.50.130.91.in-addr.arpa domain name pointer c91-130-50-158.bredband.tele2.se.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
158.50.130.91.in-addr.arpa	name = c91-130-50-158.bredband.tele2.se.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.216.231 attackbotsspam
Mar  5 10:15:06 silence02 sshd[27525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.216.231
Mar  5 10:15:08 silence02 sshd[27525]: Failed password for invalid user zhanglei from 106.13.216.231 port 60012 ssh2
Mar  5 10:22:57 silence02 sshd[27921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.216.231
2020-03-05 17:36:34
185.4.153.108 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 17:46:23
121.241.244.92 attack
Mar  5 09:38:05 hcbbdb sshd\[24316\]: Invalid user laravel from 121.241.244.92
Mar  5 09:38:05 hcbbdb sshd\[24316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
Mar  5 09:38:08 hcbbdb sshd\[24316\]: Failed password for invalid user laravel from 121.241.244.92 port 39381 ssh2
Mar  5 09:46:36 hcbbdb sshd\[25169\]: Invalid user kiban01 from 121.241.244.92
Mar  5 09:46:36 hcbbdb sshd\[25169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.241.244.92
2020-03-05 17:51:41
118.99.118.140 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 17:40:52
222.186.180.8 attack
Mar  4 23:24:29 sachi sshd\[25805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
Mar  4 23:24:31 sachi sshd\[25805\]: Failed password for root from 222.186.180.8 port 2276 ssh2
Mar  4 23:24:34 sachi sshd\[25805\]: Failed password for root from 222.186.180.8 port 2276 ssh2
Mar  4 23:24:38 sachi sshd\[25805\]: Failed password for root from 222.186.180.8 port 2276 ssh2
Mar  4 23:24:41 sachi sshd\[25805\]: Failed password for root from 222.186.180.8 port 2276 ssh2
2020-03-05 17:27:32
157.245.109.223 attack
leo_www
2020-03-05 17:59:52
195.72.230.190 attackspam
Honeypot attack, port: 445, PTR: c327-h2.ys.dsl.sakhalin.ru.
2020-03-05 17:44:06
156.236.119.23 attackspambots
Mar  5 09:13:37 v22018076622670303 sshd\[17814\]: Invalid user gitlab from 156.236.119.23 port 55804
Mar  5 09:13:37 v22018076622670303 sshd\[17814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.119.23
Mar  5 09:13:39 v22018076622670303 sshd\[17814\]: Failed password for invalid user gitlab from 156.236.119.23 port 55804 ssh2
...
2020-03-05 17:48:12
106.124.137.103 attackbots
Mar  5 09:51:07 ns381471 sshd[26120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.137.103
Mar  5 09:51:09 ns381471 sshd[26120]: Failed password for invalid user oracle from 106.124.137.103 port 40644 ssh2
2020-03-05 17:37:25
185.243.11.41 attackspam
[Thu Mar 05 07:48:48.798032 2020] [php7:error] [pid 17445] [client 185.243.11.41:44658] script '/var/www/html/wp-login.php' not found or unable to stat
...
2020-03-05 17:42:27
213.34.208.90 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 17:20:39
114.69.249.194 attack
SSH Bruteforce attempt
2020-03-05 17:45:09
201.248.66.238 attackbotsspam
Mar  5 08:51:57 DAAP sshd[19859]: Invalid user down from 201.248.66.238 port 52564
...
2020-03-05 17:56:28
110.39.160.114 attack
Honeypot attack, port: 445, PTR: WGPON-39160-114.wateen.net.
2020-03-05 17:53:30
103.72.8.7 attackspam
Mar  5 10:17:55 debian-2gb-nbg1-2 kernel: \[5659046.245429\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.72.8.7 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=239 ID=17746 PROTO=TCP SPT=43335 DPT=8686 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-05 17:24:37

最近上报的IP列表

231.153.96.80 160.170.247.216 175.71.30.43 25.165.231.139
24.162.77.224 136.151.8.114 71.164.164.200 43.138.126.42
70.119.10.50 75.124.24.52 173.112.197.163 76.215.185.42
87.163.165.215 76.241.90.68 106.200.162.24 232.183.211.215
59.86.95.111 58.4.209.127 95.151.223.33 240.40.80.163