必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Guangzhou

省份(region): Guangdong

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.133.16.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50046
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.133.16.125.			IN	A

;; AUTHORITY SECTION:
.			404	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031102 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 09:17:36 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 125.16.133.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.16.133.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.52.78 attack
Dec  9 07:02:16 v22018053744266470 sshd[3721]: Failed password for root from 222.186.52.78 port 18182 ssh2
Dec  9 07:04:07 v22018053744266470 sshd[3841]: Failed password for root from 222.186.52.78 port 32213 ssh2
...
2019-12-09 14:19:17
139.199.80.67 attackbotsspam
Dec  9 06:39:48 MK-Soft-VM6 sshd[20975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.80.67 
Dec  9 06:39:51 MK-Soft-VM6 sshd[20975]: Failed password for invalid user testftp from 139.199.80.67 port 41810 ssh2
...
2019-12-09 14:01:41
182.176.228.149 attack
Unauthorized connection attempt detected from IP address 182.176.228.149 to port 445
2019-12-09 14:07:29
128.199.207.45 attackspambots
Dec  9 07:00:11 cvbnet sshd[6705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.207.45 
Dec  9 07:00:13 cvbnet sshd[6705]: Failed password for invalid user redigh from 128.199.207.45 port 42014 ssh2
...
2019-12-09 14:24:01
222.186.175.182 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Failed password for root from 222.186.175.182 port 7644 ssh2
Failed password for root from 222.186.175.182 port 7644 ssh2
Failed password for root from 222.186.175.182 port 7644 ssh2
Failed password for root from 222.186.175.182 port 7644 ssh2
2019-12-09 14:13:46
81.214.222.3 attackspambots
Unauthorised access (Dec  9) SRC=81.214.222.3 LEN=52 TTL=116 ID=5321 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec  9) SRC=81.214.222.3 LEN=52 TTL=116 ID=13665 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-09 14:41:17
128.199.142.0 attackbots
Dec  9 11:45:11 gw1 sshd[26076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.0
Dec  9 11:45:13 gw1 sshd[26076]: Failed password for invalid user bradyhouse from 128.199.142.0 port 51184 ssh2
...
2019-12-09 14:46:12
92.118.38.38 attackspam
Dec  9 07:09:37 webserver postfix/smtpd\[2248\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  9 07:10:12 webserver postfix/smtpd\[2248\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  9 07:10:47 webserver postfix/smtpd\[2248\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  9 07:11:21 webserver postfix/smtpd\[2248\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  9 07:11:56 webserver postfix/smtpd\[2248\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-09 14:17:57
200.69.65.234 attackbotsspam
Dec  9 07:39:54 MK-Soft-VM6 sshd[21776]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.69.65.234 
Dec  9 07:39:56 MK-Soft-VM6 sshd[21776]: Failed password for invalid user jacq from 200.69.65.234 port 30304 ssh2
...
2019-12-09 14:42:12
41.57.65.76 attackbots
Dec  9 07:03:01 meumeu sshd[27093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.57.65.76 
Dec  9 07:03:03 meumeu sshd[27093]: Failed password for invalid user fataneh from 41.57.65.76 port 47542 ssh2
Dec  9 07:11:38 meumeu sshd[28409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.57.65.76 
...
2019-12-09 14:25:42
88.249.243.138 attackspambots
--- report ---
Dec  9 02:28:15 sshd: Connection from 88.249.243.138 port 45102
Dec  9 02:28:16 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.249.243.138  user=root
Dec  9 02:28:16 sshd: reverse mapping checking getaddrinfo for 88.249.243.138.static.ttnet.com.tr [88.249.243.138] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  9 02:28:19 sshd: Failed password for root from 88.249.243.138 port 45102 ssh2
Dec  9 02:28:19 sshd: Received disconnect from 88.249.243.138: 11: Bye Bye [preauth]
2019-12-09 14:12:48
218.104.199.131 attack
Dec  9 05:55:51 icinga sshd[5328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.199.131
Dec  9 05:55:53 icinga sshd[5328]: Failed password for invalid user houze from 218.104.199.131 port 52316 ssh2
...
2019-12-09 14:09:54
49.88.112.55 attack
Dec  9 07:14:21 root sshd[14531]: Failed password for root from 49.88.112.55 port 26722 ssh2
Dec  9 07:14:25 root sshd[14531]: Failed password for root from 49.88.112.55 port 26722 ssh2
Dec  9 07:14:28 root sshd[14531]: Failed password for root from 49.88.112.55 port 26722 ssh2
Dec  9 07:14:32 root sshd[14531]: Failed password for root from 49.88.112.55 port 26722 ssh2
...
2019-12-09 14:18:59
139.59.211.245 attack
Dec  9 01:32:48 linuxvps sshd\[3182\]: Invalid user Webmaster123 from 139.59.211.245
Dec  9 01:32:48 linuxvps sshd\[3182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.211.245
Dec  9 01:32:49 linuxvps sshd\[3182\]: Failed password for invalid user Webmaster123 from 139.59.211.245 port 50180 ssh2
Dec  9 01:39:21 linuxvps sshd\[7543\]: Invalid user guest666 from 139.59.211.245
Dec  9 01:39:21 linuxvps sshd\[7543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.211.245
2019-12-09 14:43:20
190.221.81.6 attackspam
2019-12-09T06:03:50.546890abusebot-7.cloudsearch.cf sshd\[23621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.221.81.6  user=root
2019-12-09 14:28:38

最近上报的IP列表

119.133.159.111 119.133.16.150 119.133.16.160 119.133.16.184
119.133.16.200 119.133.16.213 119.133.16.232 119.133.16.247
119.133.168.34 119.133.17.12 119.133.19.179 119.133.196.102
119.133.196.110 119.133.196.116 119.133.196.119 119.133.196.189
119.133.196.194 119.133.196.220 119.133.196.250 119.133.196.42