必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.11.132.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64235
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.11.132.4.			IN	A

;; AUTHORITY SECTION:
.			134	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022600 1800 900 604800 86400

;; Query time: 111 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 26 11:37:03 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
4.132.11.125.in-addr.arpa domain name pointer 125-11-132-4.rev.home.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.132.11.125.in-addr.arpa	name = 125-11-132-4.rev.home.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.248.121 attackspambots
Jun  1 00:17:01 sip sshd[484176]: Failed password for root from 178.128.248.121 port 53264 ssh2
Jun  1 00:20:06 sip sshd[484199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.248.121  user=root
Jun  1 00:20:08 sip sshd[484199]: Failed password for root from 178.128.248.121 port 57754 ssh2
...
2020-06-01 07:23:28
43.226.69.71 attack
May 31 18:50:09 vps34202 sshd[10532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.71  user=r.r
May 31 18:50:10 vps34202 sshd[10532]: Failed password for r.r from 43.226.69.71 port 38398 ssh2
May 31 18:50:11 vps34202 sshd[10532]: Received disconnect from 43.226.69.71: 11: Bye Bye [preauth]
May 31 18:59:04 vps34202 sshd[10607]: Connection closed by 43.226.69.71 [preauth]
May 31 19:00:37 vps34202 sshd[10653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.71  user=r.r
May 31 19:00:39 vps34202 sshd[10653]: Failed password for r.r from 43.226.69.71 port 49778 ssh2
May 31 19:00:40 vps34202 sshd[10653]: Received disconnect from 43.226.69.71: 11: Bye Bye [preauth]
May 31 19:03:00 vps34202 sshd[10672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.69.71  user=r.r
May 31 19:03:02 vps34202 sshd[10672]: Failed password for r.r fro........
-------------------------------
2020-06-01 07:48:08
43.225.181.48 attack
May 31 13:41:46 : SSH login attempts with invalid user
2020-06-01 07:35:05
154.204.26.94 attack
2020-06-01T00:17:35.132811vps751288.ovh.net sshd\[31511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.204.26.94  user=root
2020-06-01T00:17:37.549854vps751288.ovh.net sshd\[31511\]: Failed password for root from 154.204.26.94 port 42924 ssh2
2020-06-01T00:19:34.807720vps751288.ovh.net sshd\[31515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.204.26.94  user=root
2020-06-01T00:19:36.562324vps751288.ovh.net sshd\[31515\]: Failed password for root from 154.204.26.94 port 60695 ssh2
2020-06-01T00:21:38.042197vps751288.ovh.net sshd\[31539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.204.26.94  user=root
2020-06-01 07:58:20
120.92.139.2 attack
fail2ban -- 120.92.139.2
...
2020-06-01 07:45:21
62.173.147.225 attack
[2020-05-31 19:46:53] NOTICE[1157][C-0000ad3b] chan_sip.c: Call from '' (62.173.147.225:51119) to extension '801148748379001' rejected because extension not found in context 'public'.
[2020-05-31 19:46:53] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-31T19:46:53.102-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="801148748379001",SessionID="0x7f5f1027fe28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/62.173.147.225/51119",ACLName="no_extension_match"
[2020-05-31 19:46:57] NOTICE[1157][C-0000ad3c] chan_sip.c: Call from '' (62.173.147.225:54867) to extension '01048748379001' rejected because extension not found in context 'public'.
[2020-05-31 19:46:57] SECURITY[1173] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-05-31T19:46:57.599-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01048748379001",SessionID="0x7f5f10678288",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP
...
2020-06-01 08:01:04
104.192.82.99 attackbots
Failed password for root from 104.192.82.99 port 36802 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.192.82.99  user=root
Failed password for root from 104.192.82.99 port 58640 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.192.82.99  user=root
Failed password for root from 104.192.82.99 port 52238 ssh2
2020-06-01 07:41:16
123.16.193.41 attackbotsspam
2020-05-3122:21:151jfUSG-0005m0-5T\<=info@whatsup2013.chH=\(localhost\)[123.21.250.86]:1341P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3010id=8d0fecbfb49f4a46612492c135f278744716e7e0@whatsup2013.chT="tokraiglumley420"forkraiglumley420@gmail.comarthurusstock2001@yahoo.comkc413906@gmail.com2020-05-3122:21:361jfUSd-0005pA-1V\<=info@whatsup2013.chH=\(localhost\)[123.20.185.185]:59805P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3037id=821ea8fbf0dbf1f96560d67a9de9c3df7703b4@whatsup2013.chT="toheronemus19"forheronemus19@gmail.comddixonpres@outlook.comgodwinagaba33@gmail.com2020-05-3122:20:281jfURU-0005gY-Fv\<=info@whatsup2013.chH=\(localhost\)[123.16.193.41]:50307P=esmtpsaX=TLS1.2:ECDHE-RSA-AES256-GCM-SHA384:256CV=noA=dovecot_login:info@whatsup2013.chS=3016id=05ac44171c37e2eec98c3a699d5ad0dcefddb3fc@whatsup2013.chT="tosiaslina422"forsiaslina422@gmail.commatthewjones.15@gmail.commoncef38annaba@gmail.com2020-05-3122:22:4
2020-06-01 07:58:48
120.53.20.111 attack
May 31 23:56:04 ncomp sshd[1802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.20.111  user=root
May 31 23:56:06 ncomp sshd[1802]: Failed password for root from 120.53.20.111 port 42302 ssh2
Jun  1 00:04:29 ncomp sshd[2186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.53.20.111  user=root
Jun  1 00:04:31 ncomp sshd[2186]: Failed password for root from 120.53.20.111 port 44682 ssh2
2020-06-01 07:23:47
111.229.72.226 attackspam
Jun  1 01:16:11 abendstille sshd\[7475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.72.226  user=root
Jun  1 01:16:12 abendstille sshd\[7475\]: Failed password for root from 111.229.72.226 port 34954 ssh2
Jun  1 01:21:01 abendstille sshd\[12560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.72.226  user=root
Jun  1 01:21:03 abendstille sshd\[12560\]: Failed password for root from 111.229.72.226 port 60158 ssh2
Jun  1 01:25:47 abendstille sshd\[17839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.72.226  user=root
...
2020-06-01 07:31:35
83.137.53.192 attackspam
Port probing on unauthorized port 23461
2020-06-01 07:50:11
129.204.105.130 attack
May 31 23:20:40 lukav-desktop sshd\[26493\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.105.130  user=root
May 31 23:20:42 lukav-desktop sshd\[26493\]: Failed password for root from 129.204.105.130 port 35956 ssh2
May 31 23:21:46 lukav-desktop sshd\[26505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.105.130  user=root
May 31 23:21:48 lukav-desktop sshd\[26505\]: Failed password for root from 129.204.105.130 port 52448 ssh2
May 31 23:22:56 lukav-desktop sshd\[26524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.105.130  user=root
2020-06-01 07:51:29
209.216.90.210 attackspambots
Jun  1 00:00:31 web sshd[17864]: Failed password for root from 209.216.90.210 port 53692 ssh2
Jun  1 00:03:48 web sshd[17905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.216.90.210  user=root
Jun  1 00:03:50 web sshd[17905]: Failed password for root from 209.216.90.210 port 58614 ssh2
...
2020-06-01 07:41:46
222.186.15.115 attackbots
Jun  1 04:24:19 gw1 sshd[9745]: Failed password for root from 222.186.15.115 port 23606 ssh2
...
2020-06-01 07:27:14
163.43.116.204 attack
May 31 17:10:48 dax sshd[2012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.43.116.204  user=r.r
May 31 17:10:50 dax sshd[2012]: Failed password for r.r from 163.43.116.204 port 60340 ssh2
May 31 17:10:51 dax sshd[2012]: Received disconnect from 163.43.116.204: 11: Bye Bye [preauth]
May 31 17:21:12 dax sshd[3454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.43.116.204  user=r.r
May 31 17:21:14 dax sshd[3454]: Failed password for r.r from 163.43.116.204 port 56728 ssh2
May 31 17:21:14 dax sshd[3454]: Received disconnect from 163.43.116.204: 11: Bye Bye [preauth]
May 31 17:25:04 dax sshd[3894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.43.116.204  user=r.r
May 31 17:25:07 dax sshd[3894]: Failed password for r.r from 163.43.116.204 port 36032 ssh2
May 31 17:25:07 dax sshd[3894]: Received disconnect from 163.43.116.204: 11: Bye By........
-------------------------------
2020-06-01 07:35:28

最近上报的IP列表

228.76.162.50 170.82.160.59 54.213.210.154 125.162.18.52
121.199.3.223 172.105.82.196 109.1.27.113 128.231.76.45
128.22.95.243 147.187.4.184 219.188.185.8 14.181.189.100
94.50.11.111 214.241.23.2 61.117.238.183 216.2.73.67
111.119.241.65 179.157.167.231 160.255.95.169 177.254.246.192