必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.53.42.63 attack
Error 404. The requested page (/dev/) was not found
2020-05-20 05:09:38
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.53.42.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.53.42.125.			IN	A

;; AUTHORITY SECTION:
.			237	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052300 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 24 01:15:57 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 125.42.53.103.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.42.53.103.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
66.249.64.72 attackspambots
Automatic report - Banned IP Access
2019-07-25 09:51:53
76.186.81.229 attackbotsspam
Jul 24 18:23:40 OPSO sshd\[12047\]: Invalid user louis from 76.186.81.229 port 52263
Jul 24 18:23:40 OPSO sshd\[12047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.186.81.229
Jul 24 18:23:42 OPSO sshd\[12047\]: Failed password for invalid user louis from 76.186.81.229 port 52263 ssh2
Jul 24 18:29:53 OPSO sshd\[12526\]: Invalid user ip from 76.186.81.229 port 50684
Jul 24 18:29:53 OPSO sshd\[12526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.186.81.229
2019-07-25 09:50:55
201.1.117.71 attackspam
Automatic report - Port Scan Attack
2019-07-25 09:43:30
218.92.0.173 attackbotsspam
Jul 25 04:11:00 s64-1 sshd[28319]: Failed password for root from 218.92.0.173 port 53790 ssh2
Jul 25 04:11:12 s64-1 sshd[28319]: error: maximum authentication attempts exceeded for root from 218.92.0.173 port 53790 ssh2 [preauth]
Jul 25 04:11:17 s64-1 sshd[28321]: Failed password for root from 218.92.0.173 port 64871 ssh2
...
2019-07-25 10:21:24
45.55.190.106 attack
2019-07-25T02:44:07.615669abusebot-5.cloudsearch.cf sshd\[7067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.190.106  user=root
2019-07-25 10:57:17
92.119.160.180 attack
Port scan on 17 port(s): 8573 8973 9061 9088 9351 9450 9673 10191 10544 11117 11185 11224 11242 11528 11665 11759 11871
2019-07-25 10:08:05
218.92.0.145 attack
Jul 25 04:10:59 [munged] sshd[20593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Jul 25 04:11:01 [munged] sshd[20593]: Failed password for root from 218.92.0.145 port 33358 ssh2
2019-07-25 10:41:54
139.59.191.22 attackbots
Jul 25 03:43:53 roadrisk sshd[32305]: Failed password for invalid user homer from 139.59.191.22 port 60622 ssh2
Jul 25 03:43:53 roadrisk sshd[32305]: Received disconnect from 139.59.191.22: 11: Bye Bye [preauth]
Jul 25 03:53:26 roadrisk sshd[32490]: Failed password for invalid user michelle from 139.59.191.22 port 35652 ssh2
Jul 25 03:53:26 roadrisk sshd[32490]: Received disconnect from 139.59.191.22: 11: Bye Bye [preauth]
Jul 25 03:57:41 roadrisk sshd[32574]: Failed password for invalid user jing from 139.59.191.22 port 60136 ssh2
Jul 25 03:57:41 roadrisk sshd[32574]: Received disconnect from 139.59.191.22: 11: Bye Bye [preauth]
Jul 25 04:01:39 roadrisk sshd[32680]: Failed password for invalid user cron from 139.59.191.22 port 56396 ssh2
Jul 25 04:01:39 roadrisk sshd[32680]: Received disconnect from 139.59.191.22: 11: Bye Bye [preauth]
Jul 25 04:05:39 roadrisk sshd[32738]: Failed password for invalid user justin from 139.59.191.22 port 52648 ssh2
Jul 25 04:05:39 roadri........
-------------------------------
2019-07-25 10:24:56
213.166.71.110 attackspam
Port scan on 27 port(s): 44801 44809 45472 46379 47937 48537 48942 49018 49309 49599 50003 50260 50410 51128 51735 51962 52131 53027 53787 54430 56431 56450 56612 57220 59236 59709 59827
2019-07-25 10:22:32
73.60.223.38 attack
Jul 24 23:26:11 microserver sshd[64641]: Invalid user samba from 73.60.223.38 port 41286
Jul 24 23:26:11 microserver sshd[64641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.60.223.38
Jul 24 23:26:13 microserver sshd[64641]: Failed password for invalid user samba from 73.60.223.38 port 41286 ssh2
Jul 24 23:35:15 microserver sshd[2610]: Invalid user test2 from 73.60.223.38 port 35570
Jul 24 23:35:15 microserver sshd[2610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.60.223.38
Jul 24 23:52:17 microserver sshd[8053]: Invalid user iris from 73.60.223.38 port 52384
Jul 24 23:52:17 microserver sshd[8053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.60.223.38
Jul 24 23:52:19 microserver sshd[8053]: Failed password for invalid user iris from 73.60.223.38 port 52384 ssh2
Jul 25 00:01:36 microserver sshd[11218]: Invalid user svnroot from 73.60.223.38 port 46684
Jul 25 00:01:36 mic
2019-07-25 10:15:37
18.202.127.103 attackspambots
Automatic report - SSH Brute-Force Attack
2019-07-25 10:04:50
222.84.169.68 attackspambots
2019-07-25T04:10:48.097710 X postfix/smtpd[44346]: warning: unknown[222.84.169.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-25T04:11:05.426307 X postfix/smtpd[44346]: warning: unknown[222.84.169.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-25T04:11:21.176349 X postfix/smtpd[44346]: warning: unknown[222.84.169.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-25 10:16:37
74.63.232.2 attack
Jul 25 01:27:25 sshgateway sshd\[8570\]: Invalid user zabbix from 74.63.232.2
Jul 25 01:27:25 sshgateway sshd\[8570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.232.2
Jul 25 01:27:27 sshgateway sshd\[8570\]: Failed password for invalid user zabbix from 74.63.232.2 port 58384 ssh2
2019-07-25 09:51:22
130.61.94.211 attackspambots
Wordpress attack
2019-07-25 10:44:47
45.161.80.178 attackbots
NAME : 22.723.409/0001-79 CIDR : 45.161.80.0/22 SYN Flood DDoS Attack Brazil - block certain countries :) IP: 45.161.80.178  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-07-25 10:25:29

最近上报的IP列表

103.53.40.85 103.53.42.33 103.53.42.78 103.53.43.18
103.53.43.51 103.53.52.254 103.53.76.21 103.53.79.98
103.54.133.152 103.54.251.181 103.54.251.184 103.54.39.106
103.54.39.162 103.54.39.228 103.54.39.230 103.54.39.253
103.54.45.172 103.54.57.238 103.55.124.101 103.55.190.201