必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.72.54.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1325
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.72.54.125.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 23:52:33 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 125.54.72.120.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.54.72.120.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
120.85.147.238 attackbotsspam
Aug 17 14:37:57 abendstille sshd\[30660\]: Invalid user write from 120.85.147.238
Aug 17 14:37:57 abendstille sshd\[30660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.85.147.238
Aug 17 14:37:59 abendstille sshd\[30660\]: Failed password for invalid user write from 120.85.147.238 port 57731 ssh2
Aug 17 14:39:31 abendstille sshd\[32526\]: Invalid user sysadmin from 120.85.147.238
Aug 17 14:39:31 abendstille sshd\[32526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.85.147.238
...
2020-08-17 20:49:56
81.169.185.29 attackspam
#6985 - [81.169.185.29] Error: 550 5.7.1 Forged HELO hostname detected
#6985 - [81.169.185.29] Error: 550 5.7.1 Forged HELO hostname detected
#6985 - [81.169.185.29] Error: 550 5.7.1 Forged HELO hostname detected
#6985 - [81.169.185.29] Error: 550 5.7.1 Forged HELO hostname detected

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.169.185.29
2020-08-17 20:21:46
222.186.15.62 attackbots
Aug 17 14:06:34 ovpn sshd\[20773\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Aug 17 14:06:36 ovpn sshd\[20773\]: Failed password for root from 222.186.15.62 port 56320 ssh2
Aug 17 14:06:38 ovpn sshd\[20797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Aug 17 14:06:41 ovpn sshd\[20797\]: Failed password for root from 222.186.15.62 port 35657 ssh2
Aug 17 14:06:47 ovpn sshd\[20829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
2020-08-17 20:23:18
175.100.20.14 attackspambots
Unauthorised access (Aug 17) SRC=175.100.20.14 LEN=44 TTL=52 ID=50965 TCP DPT=8080 WINDOW=42037 SYN
2020-08-17 20:18:46
111.229.194.38 attackspambots
Aug 17 14:06:25 host sshd[32476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.194.38  user=root
Aug 17 14:06:27 host sshd[32476]: Failed password for root from 111.229.194.38 port 45160 ssh2
...
2020-08-17 20:43:07
187.32.7.108 attack
Aug 17 13:52:53 havingfunrightnow sshd[24454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.7.108 
Aug 17 13:52:55 havingfunrightnow sshd[24454]: Failed password for invalid user ubuntu from 187.32.7.108 port 57430 ssh2
Aug 17 14:06:20 havingfunrightnow sshd[25099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.32.7.108 
...
2020-08-17 20:47:16
51.68.44.13 attackspam
Aug 17 14:12:23 abendstille sshd\[5052\]: Invalid user edencraft from 51.68.44.13
Aug 17 14:12:23 abendstille sshd\[5052\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.13
Aug 17 14:12:25 abendstille sshd\[5052\]: Failed password for invalid user edencraft from 51.68.44.13 port 49398 ssh2
Aug 17 14:16:09 abendstille sshd\[8724\]: Invalid user inspur from 51.68.44.13
Aug 17 14:16:09 abendstille sshd\[8724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.13
...
2020-08-17 20:19:53
143.208.69.121 attack
Automatic report - Banned IP Access
2020-08-17 20:53:17
222.186.3.249 attackbots
Aug 17 14:29:26 rotator sshd\[23136\]: Failed password for root from 222.186.3.249 port 11938 ssh2Aug 17 14:29:28 rotator sshd\[23136\]: Failed password for root from 222.186.3.249 port 11938 ssh2Aug 17 14:29:31 rotator sshd\[23136\]: Failed password for root from 222.186.3.249 port 11938 ssh2Aug 17 14:30:48 rotator sshd\[23885\]: Failed password for root from 222.186.3.249 port 41395 ssh2Aug 17 14:30:50 rotator sshd\[23885\]: Failed password for root from 222.186.3.249 port 41395 ssh2Aug 17 14:30:53 rotator sshd\[23885\]: Failed password for root from 222.186.3.249 port 41395 ssh2
...
2020-08-17 20:42:30
192.35.168.202 attackspam
[Mon Aug 17 09:06:20.039751 2020] [:error] [pid 170002] [client 192.35.168.202:36012] [client 192.35.168.202] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "91"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 8)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "200.132.59.214"] [uri "/"] [unique_id "XzpyvM08x1Ye5DlrBWpNhAAAAAA"]
...
2020-08-17 20:48:33
178.62.49.137 attack
Aug 17 13:53:49 ns392434 sshd[11257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.49.137  user=root
Aug 17 13:53:51 ns392434 sshd[11257]: Failed password for root from 178.62.49.137 port 55886 ssh2
Aug 17 14:05:10 ns392434 sshd[11614]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.49.137  user=root
Aug 17 14:05:12 ns392434 sshd[11614]: Failed password for root from 178.62.49.137 port 48130 ssh2
Aug 17 14:11:16 ns392434 sshd[11882]: Invalid user hxz from 178.62.49.137 port 56986
Aug 17 14:11:16 ns392434 sshd[11882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.49.137
Aug 17 14:11:16 ns392434 sshd[11882]: Invalid user hxz from 178.62.49.137 port 56986
Aug 17 14:11:19 ns392434 sshd[11882]: Failed password for invalid user hxz from 178.62.49.137 port 56986 ssh2
Aug 17 14:17:08 ns392434 sshd[12132]: Invalid user mininet from 178.62.49.137 port 37616
2020-08-17 20:22:06
95.213.236.57 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-17 20:37:14
161.35.99.173 attackspambots
Aug 17 17:58:22 dhoomketu sshd[2427016]: Invalid user fangzhe from 161.35.99.173 port 50862
Aug 17 17:58:22 dhoomketu sshd[2427016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.99.173 
Aug 17 17:58:22 dhoomketu sshd[2427016]: Invalid user fangzhe from 161.35.99.173 port 50862
Aug 17 17:58:24 dhoomketu sshd[2427016]: Failed password for invalid user fangzhe from 161.35.99.173 port 50862 ssh2
Aug 17 18:02:06 dhoomketu sshd[2427085]: Invalid user temp1 from 161.35.99.173 port 59622
...
2020-08-17 20:53:31
45.129.183.70 attack
Fail2Ban Ban Triggered (2)
2020-08-17 20:29:25
103.27.22.34 attackbotsspam
Port Scan
...
2020-08-17 20:31:43

最近上报的IP列表

253.153.251.107 25.121.27.147 95.165.10.58 82.224.220.39
153.13.166.179 80.228.77.98 163.124.59.90 253.206.127.134
7.158.160.73 52.207.13.191 54.182.205.232 67.28.4.216
142.102.108.45 187.189.222.213 241.143.162.41 162.32.59.68
198.94.196.149 14.239.148.184 65.243.200.33 206.15.247.19