必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Surabaya

省份(region): East Java

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): PT. Telekomunikasi Selular

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.125.109.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21340
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.125.109.53.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042302 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 24 02:21:32 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
Host 53.109.125.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 53.109.125.114.in-addr.arpa: NXDOMAIN

相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.108.67.141 attack
UTC: 2019-10-21 port: 623/tcp
2019-10-22 14:51:31
111.242.10.112 attackbotsspam
UTC: 2019-10-21 port: 23/tcp
2019-10-22 14:48:07
187.0.211.99 attackspambots
2019-10-22T04:29:50.071643abusebot-2.cloudsearch.cf sshd\[3596\]: Invalid user admin1 from 187.0.211.99 port 57155
2019-10-22 14:14:27
112.243.222.31 attack
UTC: 2019-10-21 port: 23/tcp
2019-10-22 14:32:36
103.37.82.118 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-10-22 14:52:15
134.175.141.166 attack
2019-10-22T04:30:51.364355abusebot-5.cloudsearch.cf sshd\[14410\]: Invalid user mailer from 134.175.141.166 port 41271
2019-10-22 14:27:23
94.191.36.171 attack
Oct 22 08:06:09 MK-Soft-VM3 sshd[8899]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.36.171 
Oct 22 08:06:10 MK-Soft-VM3 sshd[8899]: Failed password for invalid user oo from 94.191.36.171 port 43858 ssh2
...
2019-10-22 14:16:34
195.154.191.151 attackbots
\[2019-10-22 00:16:21\] NOTICE\[2038\] chan_sip.c: Registration from '\' failed for '195.154.191.151:55095' - Wrong password
\[2019-10-22 00:16:21\] SECURITY\[2046\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-22T00:16:21.946-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="309",SessionID="0x7f6130804e48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.154.191.151/55095",Challenge="4c7de8aa",ReceivedChallenge="4c7de8aa",ReceivedHash="2a54a76cf5959fd8691a065aeaa9e285"
\[2019-10-22 00:17:27\] NOTICE\[2038\] chan_sip.c: Registration from '\' failed for '195.154.191.151:54451' - Wrong password
\[2019-10-22 00:17:27\] SECURITY\[2046\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-22T00:17:27.536-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="109",SessionID="0x7f6130477218",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/195.154
2019-10-22 14:50:43
106.38.108.28 attackbots
port scan and connect, tcp 23 (telnet)
2019-10-22 14:30:17
68.183.86.76 attackbots
$f2bV_matches
2019-10-22 14:28:13
144.217.84.164 attackspam
Oct 22 04:24:37 XXXXXX sshd[32464]: Invalid user jenkins from 144.217.84.164 port 39744
2019-10-22 14:44:12
210.121.13.62 attackbotsspam
UTC: 2019-10-21 port: 80/tcp
2019-10-22 14:22:12
185.176.27.118 attackbots
10/22/2019-02:41:36.210604 185.176.27.118 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-22 14:44:42
185.216.140.180 attackbots
(Oct 22)  LEN=40 TTL=249 ID=11750 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 22)  LEN=40 TTL=249 ID=16906 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 22)  LEN=40 TTL=249 ID=25206 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 22)  LEN=40 TTL=249 ID=25359 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=14395 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=52047 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=55981 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=64865 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=7885 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=60795 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=14960 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=16042 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=43932 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=62829 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 ID=8374 TCP DPT=3306 WINDOW=1024 SYN 
 (Oct 21)  LEN=40 TTL=249 I...
2019-10-22 14:25:43
184.105.247.247 attack
UTC: 2019-10-21 port: 80/tcp
2019-10-22 14:43:47

最近上报的IP列表

106.173.249.104 46.181.102.236 95.11.185.6 183.81.93.234
161.116.114.208 174.73.155.7 46.72.154.201 109.111.111.244
55.14.62.16 92.33.120.103 20.46.250.213 122.225.48.252
216.66.194.48 216.243.51.166 58.187.125.205 203.52.108.245
204.196.236.83 172.157.178.21 198.103.99.9 113.23.48.62