必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Tangerang

省份(region): Banten

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.125.104.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;103.125.104.2.			IN	A

;; AUTHORITY SECTION:
.			372	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090402 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 05 06:01:50 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
2.104.125.103.in-addr.arpa has no PTR record
NSLOOKUP信息:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 2.104.125.103.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
194.26.27.142 attack
 TCP (SYN) 194.26.27.142:55871 -> port 3389, len 44
2020-09-07 16:12:19
209.141.6.123 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 16:04:07
218.103.118.174 attack
Honeypot attack, port: 445, PTR: mail.jinstan.com.hk.
2020-09-07 15:57:27
111.229.48.141 attackbots
...
2020-09-07 15:56:31
164.77.117.10 attackspambots
Sep  7 07:54:31 root sshd[32698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.77.117.10 
...
2020-09-07 16:24:31
110.164.189.53 attackbots
Sep  7 11:05:43 pkdns2 sshd\[7278\]: Failed password for root from 110.164.189.53 port 60740 ssh2Sep  7 11:08:47 pkdns2 sshd\[7412\]: Invalid user ftpuser from 110.164.189.53Sep  7 11:08:49 pkdns2 sshd\[7412\]: Failed password for invalid user ftpuser from 110.164.189.53 port 40012 ssh2Sep  7 11:10:21 pkdns2 sshd\[7553\]: Failed password for root from 110.164.189.53 port 60354 ssh2Sep  7 11:11:51 pkdns2 sshd\[7611\]: Failed password for root from 110.164.189.53 port 52464 ssh2Sep  7 11:13:21 pkdns2 sshd\[7695\]: Failed password for root from 110.164.189.53 port 44578 ssh2
...
2020-09-07 16:26:04
144.217.60.239 attack
SSH login attempts.
2020-09-07 16:17:03
78.187.16.88 attackspambots
20/9/6@12:50:18: FAIL: Alarm-Network address from=78.187.16.88
...
2020-09-07 16:10:22
154.221.28.224 attackbots
$f2bV_matches
2020-09-07 16:19:49
167.99.66.74 attack
Tried sshing with brute force.
2020-09-07 16:30:25
158.69.163.156 attack
DIS,DEF GET /joomla/administrator
2020-09-07 15:56:13
154.237.65.36 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-07 16:27:18
171.224.203.164 attack
171.224.203.164 - - [07/Sep/2020:07:10:14 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
171.224.203.164 - - [07/Sep/2020:07:10:16 +0100] "POST /wp-login.php HTTP/1.1" 200 7820 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
171.224.203.164 - - [07/Sep/2020:07:12:10 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
...
2020-09-07 16:16:27
149.202.175.255 attackspambots
ssh brute force
2020-09-07 15:58:39
106.13.233.32 attackbots
(sshd) Failed SSH login from 106.13.233.32 (CN/China/-): 5 in the last 3600 secs
2020-09-07 16:28:52

最近上报的IP列表

171.220.89.229 112.39.192.238 117.205.25.25 18.234.147.50
180.183.140.145 216.57.151.60 165.17.32.221 119.29.149.51
93.85.116.6 42.157.10.166 195.133.220.107 163.137.26.17
81.137.228.170 85.37.151.73 160.194.214.204 84.22.38.145
61.147.42.72 68.132.38.18 112.28.98.61 103.91.85.99