必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Austria

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.82.50.230
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;93.82.50.230.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 17:24:10 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
230.50.82.93.in-addr.arpa domain name pointer 93-82-50-230.adsl.highway.telekom.at.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
230.50.82.93.in-addr.arpa	name = 93-82-50-230.adsl.highway.telekom.at.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
62.234.120.3 attackbots
(sshd) Failed SSH login from 62.234.120.3 (CN/China/-): 5 in the last 3600 secs
2020-10-12 07:21:46
36.155.115.72 attack
2020-10-11T17:56:36.708520abusebot-2.cloudsearch.cf sshd[26112]: Invalid user mri from 36.155.115.72 port 41064
2020-10-11T17:56:36.715918abusebot-2.cloudsearch.cf sshd[26112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.72
2020-10-11T17:56:36.708520abusebot-2.cloudsearch.cf sshd[26112]: Invalid user mri from 36.155.115.72 port 41064
2020-10-11T17:56:38.714754abusebot-2.cloudsearch.cf sshd[26112]: Failed password for invalid user mri from 36.155.115.72 port 41064 ssh2
2020-10-11T18:02:20.907108abusebot-2.cloudsearch.cf sshd[26200]: Invalid user gerry from 36.155.115.72 port 41477
2020-10-11T18:02:20.912884abusebot-2.cloudsearch.cf sshd[26200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.72
2020-10-11T18:02:20.907108abusebot-2.cloudsearch.cf sshd[26200]: Invalid user gerry from 36.155.115.72 port 41477
2020-10-11T18:02:22.801512abusebot-2.cloudsearch.cf sshd[26200]: Failed passw
...
2020-10-12 07:02:13
129.208.199.139 attack
20/10/10@16:46:53: FAIL: Alarm-Network address from=129.208.199.139
20/10/10@16:46:53: FAIL: Alarm-Network address from=129.208.199.139
...
2020-10-12 07:03:18
104.248.45.204 attackbotsspam
s2.hscode.pl - SSH Attack
2020-10-12 06:58:06
188.166.213.172 attack
Bruteforce detected by fail2ban
2020-10-12 07:17:31
142.44.218.192 attackbotsspam
Oct 12 00:59:46 jane sshd[24614]: Failed password for root from 142.44.218.192 port 52778 ssh2
...
2020-10-12 07:25:38
120.70.100.88 attackbotsspam
Oct 11 15:37:50 vps208890 sshd[10329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.100.88
2020-10-12 07:11:27
45.150.206.113 attackspambots
Oct 12 01:19:46 galaxy event: galaxy/lswi: smtp: christof.thim@wi.uni-potsdam.de [45.150.206.113] authentication failure using internet password
Oct 12 01:19:47 galaxy event: galaxy/lswi: smtp: christof.thim [45.150.206.113] authentication failure using internet password
Oct 12 01:20:06 galaxy event: galaxy/lswi: smtp: andrea.wollweber@wi.uni-potsdam.de [45.150.206.113] authentication failure using internet password
Oct 12 01:20:08 galaxy event: galaxy/lswi: smtp: andrea.wollweber [45.150.206.113] authentication failure using internet password
Oct 12 01:22:44 galaxy event: galaxy/lswi: smtp: jqbfegb@lupo-projekt.de [45.150.206.113] authentication failure using internet password
...
2020-10-12 07:25:03
222.186.31.166 attackspam
Oct 11 19:02:44 NPSTNNYC01T sshd[6557]: Failed password for root from 222.186.31.166 port 26158 ssh2
Oct 11 19:02:54 NPSTNNYC01T sshd[6571]: Failed password for root from 222.186.31.166 port 36467 ssh2
...
2020-10-12 07:11:59
190.85.163.46 attack
2020-10-11T23:46:40.260099lavrinenko.info sshd[27201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.163.46
2020-10-11T23:46:40.249209lavrinenko.info sshd[27201]: Invalid user radio from 190.85.163.46 port 49987
2020-10-11T23:46:42.092112lavrinenko.info sshd[27201]: Failed password for invalid user radio from 190.85.163.46 port 49987 ssh2
2020-10-11T23:49:06.698455lavrinenko.info sshd[27432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.163.46  user=root
2020-10-11T23:49:08.904617lavrinenko.info sshd[27432]: Failed password for root from 190.85.163.46 port 40444 ssh2
...
2020-10-12 07:05:41
195.123.246.16 attackbots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-12 07:25:20
5.62.143.204 attackspam
Oct 11 07:10:57 ns381471 sshd[11788]: Failed password for root from 5.62.143.204 port 41004 ssh2
2020-10-12 07:12:34
5.196.72.11 attackspambots
Oct 11 23:40:10 OPSO sshd\[30525\]: Invalid user barbara from 5.196.72.11 port 49176
Oct 11 23:40:10 OPSO sshd\[30525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.72.11
Oct 11 23:40:12 OPSO sshd\[30525\]: Failed password for invalid user barbara from 5.196.72.11 port 49176 ssh2
Oct 11 23:45:54 OPSO sshd\[32370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.72.11  user=root
Oct 11 23:45:56 OPSO sshd\[32370\]: Failed password for root from 5.196.72.11 port 53832 ssh2
2020-10-12 07:04:09
212.129.25.123 attack
212.129.25.123 - - [11/Oct/2020:23:35:10 +0100] "POST /wp-login.php HTTP/1.1" 200 2556 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.25.123 - - [11/Oct/2020:23:35:11 +0100] "POST /wp-login.php HTTP/1.1" 200 2539 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
212.129.25.123 - - [11/Oct/2020:23:35:11 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-12 06:58:39
118.24.208.24 attackspambots
Invalid user villa from 118.24.208.24 port 32886
2020-10-12 07:26:01

最近上报的IP列表

34.101.143.171 51.121.112.119 237.103.117.41 70.136.84.205
237.182.122.106 195.238.68.234 236.153.74.94 141.117.17.104
56.241.17.137 79.60.106.3 192.83.210.189 184.38.243.88
238.14.221.47 42.236.211.128 223.101.204.67 83.39.26.108
46.54.76.131 6.136.225.29 185.89.4.202 37.46.194.110