必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.108.81.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11362
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.108.81.42.			IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031000 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 10 14:21:06 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.81.108.125.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.81.108.125.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.10.99.200 attackbots
Unauthorized access detected from banned ip
2019-11-29 22:57:35
61.12.38.162 attackspam
Nov 29 15:25:51 ns381471 sshd[8475]: Failed password for root from 61.12.38.162 port 35464 ssh2
2019-11-29 22:49:33
103.129.47.30 attackspambots
Nov 29 16:03:14 sd-53420 sshd\[24306\]: Invalid user camille from 103.129.47.30
Nov 29 16:03:14 sd-53420 sshd\[24306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.47.30
Nov 29 16:03:16 sd-53420 sshd\[24306\]: Failed password for invalid user camille from 103.129.47.30 port 52072 ssh2
Nov 29 16:07:19 sd-53420 sshd\[24909\]: Invalid user cordemans from 103.129.47.30
Nov 29 16:07:19 sd-53420 sshd\[24909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.129.47.30
...
2019-11-29 23:10:13
187.181.25.134 attackbots
187.181.25.134 - - \[29/Nov/2019:16:14:11 +0100\] "POST /wp-login.php HTTP/1.0" 200 2406 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
187.181.25.134 - - \[29/Nov/2019:16:14:14 +0100\] "POST /wp-login.php HTTP/1.0" 200 2364 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
187.181.25.134 - - \[29/Nov/2019:16:14:17 +0100\] "POST /wp-login.php HTTP/1.0" 200 2374 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-29 23:22:09
189.159.3.113 attackbotsspam
port scan and connect, tcp 80 (http)
2019-11-29 23:15:14
119.29.170.120 attackspambots
Nov 29 15:57:35 dedicated sshd[13298]: Invalid user lykkenborg from 119.29.170.120 port 46280
2019-11-29 23:01:15
80.211.67.90 attackbotsspam
Nov 29 04:42:39 php1 sshd\[3973\]: Invalid user hoem from 80.211.67.90
Nov 29 04:42:39 php1 sshd\[3973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.90
Nov 29 04:42:40 php1 sshd\[3973\]: Failed password for invalid user hoem from 80.211.67.90 port 50896 ssh2
Nov 29 04:46:03 php1 sshd\[4366\]: Invalid user tiou from 80.211.67.90
Nov 29 04:46:03 php1 sshd\[4366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.67.90
2019-11-29 22:52:29
46.38.144.179 attackspam
Nov 29 16:02:46 vmanager6029 postfix/smtpd\[19917\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 29 16:03:57 vmanager6029 postfix/smtpd\[19917\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-29 23:06:34
193.32.163.44 attackbotsspam
2019-11-29T15:29:08.295407+01:00 lumpi kernel: [327711.704788] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=193.32.163.44 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=23592 PROTO=TCP SPT=57310 DPT=33891 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-29 22:56:48
51.140.60.221 attackspam
\[2019-11-29 10:12:21\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-29T10:12:21.464-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441603976936",SessionID="0x7f26c48e9848",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.140.60.221/57260",ACLName="no_extension_match"
\[2019-11-29 10:13:54\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-29T10:13:54.215-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442038075093",SessionID="0x7f26c4b0adc8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.140.60.221/53547",ACLName="no_extension_match"
\[2019-11-29 10:14:28\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-29T10:14:28.640-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442922550332",SessionID="0x7f26c4a9e0e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/51.140.60.221/60735",ACLName="no_ex
2019-11-29 23:17:30
62.110.66.66 attackspam
5x Failed Password
2019-11-29 23:12:11
111.231.63.14 attack
Nov 29 05:09:58 web9 sshd\[29699\]: Invalid user raade from 111.231.63.14
Nov 29 05:09:58 web9 sshd\[29699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.63.14
Nov 29 05:10:00 web9 sshd\[29699\]: Failed password for invalid user raade from 111.231.63.14 port 43706 ssh2
Nov 29 05:14:22 web9 sshd\[30324\]: Invalid user ludmila from 111.231.63.14
Nov 29 05:14:22 web9 sshd\[30324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.63.14
2019-11-29 23:19:51
1.23.185.98 attackspam
Nov 29 17:07:41 microserver sshd[50409]: Invalid user luo from 1.23.185.98 port 47090
Nov 29 17:07:41 microserver sshd[50409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.23.185.98
Nov 29 17:07:44 microserver sshd[50409]: Failed password for invalid user luo from 1.23.185.98 port 47090 ssh2
Nov 29 17:07:51 microserver sshd[50417]: Invalid user shao from 1.23.185.98 port 47584
Nov 29 17:07:51 microserver sshd[50417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.23.185.98
Nov 29 17:24:57 microserver sshd[52994]: Invalid user jacob from 1.23.185.98 port 60566
Nov 29 17:24:57 microserver sshd[52994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.23.185.98
Nov 29 17:24:59 microserver sshd[52994]: Failed password for invalid user jacob from 1.23.185.98 port 60566 ssh2
Nov 29 17:25:13 microserver sshd[53370]: Invalid user user from 1.23.185.98 port 60924
Nov 29 17:25:13 microserver s
2019-11-29 23:05:59
49.235.216.174 attackbots
Nov 29 15:43:59 meumeu sshd[31902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.216.174 
Nov 29 15:44:02 meumeu sshd[31902]: Failed password for invalid user smmsp from 49.235.216.174 port 45332 ssh2
Nov 29 15:49:23 meumeu sshd[32627]: Failed password for backup from 49.235.216.174 port 50008 ssh2
...
2019-11-29 22:55:30
198.98.53.79 attack
Unauthorized access detected from banned ip
2019-11-29 22:46:55

最近上报的IP列表

125.108.81.40 125.108.81.56 125.108.81.63 125.108.81.67
125.108.85.132 125.108.85.138 125.108.85.139 125.108.85.14
125.108.85.140 125.108.85.144 125.108.85.151 125.108.85.153
125.108.85.170 125.108.85.173 125.108.85.180 125.108.85.186
125.108.85.189 125.108.85.190 125.108.85.193 125.108.85.195