必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.113.242.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.113.242.163.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:28:15 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 163.242.113.125.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 163.242.113.125.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
206.189.18.205 attackspam
2019-11-24T07:36:15.619899abusebot-5.cloudsearch.cf sshd\[15495\]: Invalid user webmaster from 206.189.18.205 port 53260
2019-11-24 15:44:47
79.166.71.26 attackspam
Telnet Server BruteForce Attack
2019-11-24 15:59:24
54.39.145.123 attack
Nov 24 09:18:42 www4 sshd\[44170\]: Invalid user nginx from 54.39.145.123
Nov 24 09:18:42 www4 sshd\[44170\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.145.123
Nov 24 09:18:44 www4 sshd\[44170\]: Failed password for invalid user nginx from 54.39.145.123 port 54480 ssh2
...
2019-11-24 16:17:54
188.247.65.179 attack
Fail2Ban Ban Triggered
2019-11-24 16:14:18
125.227.13.141 attackspambots
2019-11-24T07:31:20.634261shield sshd\[14518\]: Invalid user 999999 from 125.227.13.141 port 39296
2019-11-24T07:31:20.638534shield sshd\[14518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125-227-13-141.hinet-ip.hinet.net
2019-11-24T07:31:22.722766shield sshd\[14518\]: Failed password for invalid user 999999 from 125.227.13.141 port 39296 ssh2
2019-11-24T07:35:33.978670shield sshd\[15729\]: Invalid user developerdeveloper from 125.227.13.141 port 47310
2019-11-24T07:35:33.982974shield sshd\[15729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125-227-13-141.hinet-ip.hinet.net
2019-11-24 16:01:35
51.77.194.241 attack
Nov 24 08:36:24 legacy sshd[3838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.194.241
Nov 24 08:36:26 legacy sshd[3838]: Failed password for invalid user oms from 51.77.194.241 port 55938 ssh2
Nov 24 08:42:47 legacy sshd[3952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.194.241
...
2019-11-24 15:56:01
80.185.214.123 attack
Nov 23 00:07:42 sshd[1544]: Invalid user prueba from 80.185.214.123 port 34098
2019-11-24 16:13:50
212.47.246.150 attackbots
Nov 24 13:59:21 webhost01 sshd[11860]: Failed password for root from 212.47.246.150 port 41048 ssh2
Nov 24 14:05:35 webhost01 sshd[11889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.246.150
...
2019-11-24 16:07:38
160.153.147.143 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-24 15:46:23
121.46.4.222 attackbots
Nov 22 05:11:25 pl3server sshd[32127]: Invalid user www from 121.46.4.222
Nov 22 05:11:25 pl3server sshd[32127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.4.222
Nov 22 05:11:27 pl3server sshd[32127]: Failed password for invalid user www from 121.46.4.222 port 54163 ssh2
Nov 22 05:11:28 pl3server sshd[32127]: Received disconnect from 121.46.4.222: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=121.46.4.222
2019-11-24 15:58:48
128.199.210.98 attackspam
Nov 24 07:27:50 srv206 sshd[813]: Invalid user mqm from 128.199.210.98
Nov 24 07:27:50 srv206 sshd[813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.210.98
Nov 24 07:27:50 srv206 sshd[813]: Invalid user mqm from 128.199.210.98
Nov 24 07:27:52 srv206 sshd[813]: Failed password for invalid user mqm from 128.199.210.98 port 43734 ssh2
...
2019-11-24 16:01:06
104.236.228.46 attack
Nov 24 02:11:30 TORMINT sshd\[20735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.228.46  user=root
Nov 24 02:11:33 TORMINT sshd\[20735\]: Failed password for root from 104.236.228.46 port 49888 ssh2
Nov 24 02:17:53 TORMINT sshd\[21034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.228.46  user=root
...
2019-11-24 16:29:31
91.217.194.85 attackbots
Nov 24 08:36:52 localhost sshd\[779\]: Invalid user games777 from 91.217.194.85 port 53346
Nov 24 08:36:52 localhost sshd\[779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.217.194.85
Nov 24 08:36:54 localhost sshd\[779\]: Failed password for invalid user games777 from 91.217.194.85 port 53346 ssh2
2019-11-24 15:48:23
139.59.247.114 attackbots
Nov 24 07:59:02 srv01 sshd[19198]: Invalid user lidtveit from 139.59.247.114 port 54288
Nov 24 07:59:02 srv01 sshd[19198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.247.114
Nov 24 07:59:02 srv01 sshd[19198]: Invalid user lidtveit from 139.59.247.114 port 54288
Nov 24 07:59:05 srv01 sshd[19198]: Failed password for invalid user lidtveit from 139.59.247.114 port 54288 ssh2
Nov 24 08:07:26 srv01 sshd[19765]: Invalid user server from 139.59.247.114 port 23963
...
2019-11-24 16:19:32
51.75.32.132 attackspambots
2019-11-24T08:51:04.762582  sshd[6273]: Invalid user admin from 51.75.32.132 port 50770
2019-11-24T08:51:04.776681  sshd[6273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.32.132
2019-11-24T08:51:04.762582  sshd[6273]: Invalid user admin from 51.75.32.132 port 50770
2019-11-24T08:51:07.063625  sshd[6273]: Failed password for invalid user admin from 51.75.32.132 port 50770 ssh2
2019-11-24T08:52:16.006328  sshd[6295]: Invalid user admin from 51.75.32.132 port 46658
...
2019-11-24 16:09:56

最近上报的IP列表

137.153.175.254 209.70.5.78 164.110.125.173 51.84.101.219
21.175.122.234 160.149.99.68 127.183.79.185 122.135.129.45
162.150.103.57 44.224.119.74 240.192.190.170 3.124.203.3
158.202.235.5 165.113.110.16 39.191.176.240 79.54.246.159
150.237.179.212 209.20.105.123 84.161.93.66 121.153.158.196