必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.231.122.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29778
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.231.122.125.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 01:40:55 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 125.122.231.12.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.122.231.12.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.165.167.10 attackbots
IP blocked
2019-11-04 14:56:29
192.42.116.17 attack
Automatic report - Banned IP Access
2019-11-04 15:09:00
106.253.177.150 attackspam
Nov  4 07:52:55 srv01 sshd[10225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.253.177.150  user=root
Nov  4 07:52:57 srv01 sshd[10225]: Failed password for root from 106.253.177.150 port 33252 ssh2
Nov  4 07:57:19 srv01 sshd[10426]: Invalid user ftp from 106.253.177.150
Nov  4 07:57:19 srv01 sshd[10426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.253.177.150
Nov  4 07:57:19 srv01 sshd[10426]: Invalid user ftp from 106.253.177.150
Nov  4 07:57:21 srv01 sshd[10426]: Failed password for invalid user ftp from 106.253.177.150 port 51550 ssh2
...
2019-11-04 15:06:40
151.80.75.127 attackbots
Nov  4 07:19:36 mail postfix/smtpd[19434]: warning: unknown[151.80.75.127]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  4 07:28:13 mail postfix/smtpd[20526]: warning: unknown[151.80.75.127]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  4 07:29:06 mail postfix/smtpd[21732]: warning: unknown[151.80.75.127]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-04 15:19:58
213.47.38.104 attackspambots
2019-11-04T06:39:35.644980abusebot-5.cloudsearch.cf sshd\[12367\]: Invalid user cforziati from 213.47.38.104 port 37968
2019-11-04 14:56:16
145.239.83.89 attack
$f2bV_matches
2019-11-04 15:11:56
148.70.4.242 attackbotsspam
Nov  4 03:37:43 firewall sshd[32062]: Invalid user bz from 148.70.4.242
Nov  4 03:37:46 firewall sshd[32062]: Failed password for invalid user bz from 148.70.4.242 port 55324 ssh2
Nov  4 03:42:51 firewall sshd[32146]: Invalid user zzz from 148.70.4.242
...
2019-11-04 15:11:24
80.211.79.117 attack
2019-11-04T06:51:19.216775shield sshd\[18153\]: Invalid user P@\$\$w0rt!qaz from 80.211.79.117 port 55560
2019-11-04T06:51:19.222245shield sshd\[18153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.79.117
2019-11-04T06:51:21.048468shield sshd\[18153\]: Failed password for invalid user P@\$\$w0rt!qaz from 80.211.79.117 port 55560 ssh2
2019-11-04T06:54:58.647362shield sshd\[19191\]: Invalid user magaeye from 80.211.79.117 port 35690
2019-11-04T06:54:58.653200shield sshd\[19191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.79.117
2019-11-04 15:02:12
94.191.93.34 attack
Nov  4 07:34:37 minden010 sshd[18174]: Failed password for root from 94.191.93.34 port 47374 ssh2
Nov  4 07:39:50 minden010 sshd[21356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.93.34
Nov  4 07:39:52 minden010 sshd[21356]: Failed password for invalid user guest from 94.191.93.34 port 56850 ssh2
...
2019-11-04 15:07:09
37.187.54.67 attack
2019-11-04T07:03:32.143145abusebot-6.cloudsearch.cf sshd\[16911\]: Invalid user omu from 37.187.54.67 port 52083
2019-11-04 15:15:21
181.49.117.166 attack
Nov  4 08:00:07 sd-53420 sshd\[17356\]: Invalid user lanto from 181.49.117.166
Nov  4 08:00:07 sd-53420 sshd\[17356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.117.166
Nov  4 08:00:09 sd-53420 sshd\[17356\]: Failed password for invalid user lanto from 181.49.117.166 port 59904 ssh2
Nov  4 08:04:38 sd-53420 sshd\[17655\]: Invalid user dexter from 181.49.117.166
Nov  4 08:04:38 sd-53420 sshd\[17655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.117.166
...
2019-11-04 15:09:54
132.232.228.86 attackspambots
Nov  4 09:51:47 hosting sshd[4030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.228.86  user=root
Nov  4 09:51:50 hosting sshd[4030]: Failed password for root from 132.232.228.86 port 49854 ssh2
Nov  4 09:57:11 hosting sshd[4523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.228.86  user=root
Nov  4 09:57:13 hosting sshd[4523]: Failed password for root from 132.232.228.86 port 60462 ssh2
...
2019-11-04 14:58:54
197.251.69.4 attackbotsspam
(sshd) Failed SSH login from 197.251.69.4 (-): 5 in the last 3600 secs
2019-11-04 14:52:09
54.37.136.189 attackspambots
Nov  4 07:54:53 SilenceServices sshd[18359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.189
Nov  4 07:54:56 SilenceServices sshd[18359]: Failed password for invalid user admin from 54.37.136.189 port 39228 ssh2
Nov  4 07:55:33 SilenceServices sshd[18576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.136.189
2019-11-04 15:04:47
89.103.88.187 attack
Nov  4 07:14:10 thevastnessof sshd[30995]: Failed password for root from 89.103.88.187 port 53764 ssh2
...
2019-11-04 15:14:32

最近上报的IP列表

163.182.47.215 52.85.144.251 181.122.226.129 238.221.241.204
144.198.231.64 8.211.99.165 84.140.79.138 130.101.238.33
175.188.253.229 208.222.102.96 59.60.216.230 129.147.122.237
217.229.207.99 36.116.140.211 8.122.250.112 253.61.4.138
140.162.13.35 8.36.208.211 38.128.114.132 164.167.143.167