必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.125.30.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11082
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.125.30.21.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 14:51:18 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.30.125.114.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.30.125.114.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
68.183.2.210 attack
\[2019-10-07 19:11:22\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-07T19:11:22.136-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011970599704264",SessionID="0x7fc3acd80118",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/68.183.2.210/54421",ACLName="no_extension_match"
\[2019-10-07 19:13:10\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-07T19:13:10.953-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9970599704264",SessionID="0x7fc3ac00c388",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/68.183.2.210/51736",ACLName="no_extension_match"
\[2019-10-07 19:15:04\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-07T19:15:04.497-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011970599704264",SessionID="0x7fc3ac2ed548",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/68.183.2.210/53622",ACLName="no_extensi
2019-10-08 07:17:30
192.42.116.24 attack
Oct  7 21:47:51 km20725 sshd\[28762\]: Invalid user abass from 192.42.116.24Oct  7 21:47:53 km20725 sshd\[28762\]: Failed password for invalid user abass from 192.42.116.24 port 43168 ssh2Oct  7 21:47:56 km20725 sshd\[28762\]: Failed password for invalid user abass from 192.42.116.24 port 43168 ssh2Oct  7 21:47:58 km20725 sshd\[28762\]: Failed password for invalid user abass from 192.42.116.24 port 43168 ssh2
...
2019-10-08 07:29:30
178.128.76.6 attack
Oct  7 17:16:06 plusreed sshd[22423]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.76.6  user=root
Oct  7 17:16:08 plusreed sshd[22423]: Failed password for root from 178.128.76.6 port 52864 ssh2
...
2019-10-08 07:15:18
58.52.132.203 attack
07.10.2019 21:50:04 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-10-08 07:10:09
106.13.6.113 attackspam
Oct  7 22:50:14 localhost sshd\[4486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.113  user=root
Oct  7 22:50:16 localhost sshd\[4486\]: Failed password for root from 106.13.6.113 port 46906 ssh2
Oct  7 22:54:15 localhost sshd\[4649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.113  user=root
Oct  7 22:54:17 localhost sshd\[4649\]: Failed password for root from 106.13.6.113 port 52128 ssh2
Oct  7 22:58:16 localhost sshd\[4853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.113  user=root
...
2019-10-08 07:10:57
201.210.161.204 attackbotsspam
firewall-block, port(s): 8080/tcp
2019-10-08 06:50:32
159.203.74.227 attackspam
Oct  8 03:48:20 gw1 sshd[10103]: Failed password for root from 159.203.74.227 port 41214 ssh2
...
2019-10-08 07:09:52
76.67.31.237 attackspam
Trying ports that it shouldn't be.
2019-10-08 07:30:40
182.61.109.92 attackbotsspam
Oct  7 15:44:45 xb0 sshd[20928]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.92  user=r.r
Oct  7 15:44:47 xb0 sshd[20928]: Failed password for r.r from 182.61.109.92 port 52664 ssh2
Oct  7 15:44:47 xb0 sshd[20928]: Received disconnect from 182.61.109.92: 11: Bye Bye [preauth]
Oct  7 15:46:09 xb0 sshd[12755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.92  user=r.r
Oct  7 15:46:10 xb0 sshd[12755]: Failed password for r.r from 182.61.109.92 port 44110 ssh2
Oct  7 15:46:11 xb0 sshd[12755]: Received disconnect from 182.61.109.92: 11: Bye Bye [preauth]
Oct  7 15:53:19 xb0 sshd[20320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.92  user=r.r
Oct  7 15:53:21 xb0 sshd[20320]: Failed password for r.r from 182.61.109.92 port 41216 ssh2
Oct  7 15:53:21 xb0 sshd[20320]: Received disconnect from 182.61.109.92: 11: Bye By........
-------------------------------
2019-10-08 07:10:28
36.67.155.171 attackspam
Oct  7 21:49:28 andromeda sshd\[54412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.155.171  user=root
Oct  7 21:49:31 andromeda sshd\[54412\]: Failed password for root from 36.67.155.171 port 35270 ssh2
Oct  7 21:49:37 andromeda sshd\[54494\]: Invalid user uno85 from 36.67.155.171 port 37272
2019-10-08 07:23:58
142.4.1.222 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-08 07:28:06
37.187.54.67 attack
Oct  7 12:35:13 php1 sshd\[13585\]: Invalid user p@\$\$w0rd@2018 from 37.187.54.67
Oct  7 12:35:13 php1 sshd\[13585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.ip-37-187-54.eu
Oct  7 12:35:15 php1 sshd\[13585\]: Failed password for invalid user p@\$\$w0rd@2018 from 37.187.54.67 port 52805 ssh2
Oct  7 12:39:12 php1 sshd\[14063\]: Invalid user p@\$\$w0rd@2018 from 37.187.54.67
Oct  7 12:39:12 php1 sshd\[14063\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.ip-37-187-54.eu
2019-10-08 06:52:19
80.210.74.142 attackbotsspam
Multiple failed RDP login attempts
2019-10-08 07:00:43
142.93.238.162 attackspambots
2019-10-07T18:38:09.9966141495-001 sshd\[10197\]: Invalid user Emanuel2017 from 142.93.238.162 port 55868
2019-10-07T18:38:10.0001971495-001 sshd\[10197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.238.162
2019-10-07T18:38:12.1563241495-001 sshd\[10197\]: Failed password for invalid user Emanuel2017 from 142.93.238.162 port 55868 ssh2
2019-10-07T18:42:09.7556991495-001 sshd\[10514\]: Invalid user debian@2018 from 142.93.238.162 port 57214
2019-10-07T18:42:09.7588161495-001 sshd\[10514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.238.162
2019-10-07T18:42:11.5287241495-001 sshd\[10514\]: Failed password for invalid user debian@2018 from 142.93.238.162 port 57214 ssh2
...
2019-10-08 07:02:55
118.193.80.106 attack
Oct  7 22:40:04 game-panel sshd[31844]: Failed password for root from 118.193.80.106 port 46825 ssh2
Oct  7 22:44:37 game-panel sshd[32062]: Failed password for root from 118.193.80.106 port 38520 ssh2
2019-10-08 06:57:59

最近上报的IP列表

114.125.29.37 114.125.29.254 114.125.31.134 114.125.30.76
114.125.31.17 114.125.28.52 114.125.31.170 113.53.105.179
114.125.31.178 114.125.31.71 114.125.35.34 114.125.37.227
114.125.35.57 114.125.4.110 114.125.4.162 114.125.37.93
114.125.4.171 114.125.39.204 113.53.105.189 114.125.40.104