必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.123.140.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.123.140.142.		IN	A

;; AUTHORITY SECTION:
.			119	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 02:17:59 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 142.140.123.125.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.140.123.125.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
183.91.7.96 attackspambots
20/5/3@23:51:16: FAIL: Alarm-Network address from=183.91.7.96
...
2020-05-04 18:18:22
101.128.74.157 attackbotsspam
Automatic report - Port Scan Attack
2020-05-04 18:29:48
185.151.242.184 attack
firewall-block, port(s): 3397/tcp
2020-05-04 17:58:20
121.22.19.213 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-05-04 18:03:43
91.134.248.230 attack
91.134.248.230 - - \[04/May/2020:09:21:02 +0200\] "POST /wp-login.php HTTP/1.0" 200 6949 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
91.134.248.230 - - \[04/May/2020:09:21:05 +0200\] "POST /wp-login.php HTTP/1.0" 200 6768 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
91.134.248.230 - - \[04/May/2020:09:21:07 +0200\] "POST /wp-login.php HTTP/1.0" 200 6772 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-05-04 18:27:01
191.234.176.158 attackbots
191.234.176.158 - - [04/May/2020:07:13:06 +0200] "GET /wp-login.php HTTP/1.1" 200 5702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
191.234.176.158 - - [04/May/2020:07:13:09 +0200] "POST /wp-login.php HTTP/1.1" 200 5953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
191.234.176.158 - - [04/May/2020:07:13:11 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-04 18:25:59
42.233.71.204 attackspam
Unauthorized connection attempt detected from IP address 42.233.71.204 to port 23 [T]
2020-05-04 18:06:13
93.174.95.73 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 85 - port: 5050 proto: TCP cat: Misc Attack
2020-05-04 18:02:03
106.12.138.72 attackspambots
May  4 06:26:28 ns392434 sshd[30610]: Invalid user pj from 106.12.138.72 port 49368
May  4 06:26:28 ns392434 sshd[30610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.138.72
May  4 06:26:28 ns392434 sshd[30610]: Invalid user pj from 106.12.138.72 port 49368
May  4 06:26:30 ns392434 sshd[30610]: Failed password for invalid user pj from 106.12.138.72 port 49368 ssh2
May  4 06:33:15 ns392434 sshd[30990]: Invalid user rachid from 106.12.138.72 port 57740
May  4 06:33:15 ns392434 sshd[30990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.138.72
May  4 06:33:15 ns392434 sshd[30990]: Invalid user rachid from 106.12.138.72 port 57740
May  4 06:33:17 ns392434 sshd[30990]: Failed password for invalid user rachid from 106.12.138.72 port 57740 ssh2
May  4 06:39:00 ns392434 sshd[31335]: Invalid user odoo from 106.12.138.72 port 60028
2020-05-04 18:11:03
49.233.136.245 attackbotsspam
May  4 11:18:56 host5 sshd[32416]: Invalid user backupuser from 49.233.136.245 port 34338
...
2020-05-04 18:22:12
180.101.248.148 attackspam
May  4 10:38:31 vmd17057 sshd[32698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.248.148 
May  4 10:38:33 vmd17057 sshd[32698]: Failed password for invalid user atualiza from 180.101.248.148 port 37970 ssh2
...
2020-05-04 18:25:22
171.103.53.22 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-05-04 18:13:49
121.229.2.136 attackbotsspam
2020-05-04T06:57:09.585844vps751288.ovh.net sshd\[6686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.2.136  user=root
2020-05-04T06:57:11.523597vps751288.ovh.net sshd\[6686\]: Failed password for root from 121.229.2.136 port 54996 ssh2
2020-05-04T07:00:23.974144vps751288.ovh.net sshd\[6701\]: Invalid user oks from 121.229.2.136 port 37562
2020-05-04T07:00:23.987592vps751288.ovh.net sshd\[6701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.229.2.136
2020-05-04T07:00:26.226131vps751288.ovh.net sshd\[6701\]: Failed password for invalid user oks from 121.229.2.136 port 37562 ssh2
2020-05-04 17:52:05
134.209.100.26 attackbotsspam
May  4 07:48:19 piServer sshd[7434]: Failed password for mysql from 134.209.100.26 port 43912 ssh2
May  4 07:52:46 piServer sshd[7926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.100.26 
May  4 07:52:48 piServer sshd[7926]: Failed password for invalid user user2 from 134.209.100.26 port 52974 ssh2
...
2020-05-04 18:17:00
185.207.31.49 attack
Phishing host and invalid abuse contact:  : host aspmx.l.google.com[64.233.160.26] said:
    550-5.7.1 [99.87.255.76      12] Our system has detected that this message
    is 550-5.7.1 likely unsolicited mail. To reduce the amount of spam sent to
    Gmail, 550-5.7.1 this message has been blocked. Please visit 550-5.7.1
    https://support.google.com/mail/?p=UnsolicitedMessageError 550 5.7.1  for
    more information. q132si3345645oig.255 - gsmtp (in reply to end of DATA
    command)
2020-05-04 18:20:10

最近上报的IP列表

125.123.140.140 125.123.140.145 125.123.140.136 125.123.140.122
125.123.140.125 125.123.140.146 125.123.140.148 125.123.140.12
125.123.140.130 117.70.40.50 125.123.140.150 125.123.140.132
125.123.140.154 125.123.140.152 125.123.140.157 125.123.140.161
125.123.140.162 125.123.140.165 117.70.40.52 125.123.140.172