必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.126.214.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65004
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.126.214.56.			IN	A

;; AUTHORITY SECTION:
.			587	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 02:29:19 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 56.214.126.125.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.214.126.125.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
122.51.183.238 attackbots
Apr 27 09:47:40 mockhub sshd[22730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.183.238
Apr 27 09:47:42 mockhub sshd[22730]: Failed password for invalid user storage from 122.51.183.238 port 33712 ssh2
...
2020-04-28 02:01:45
189.180.216.31 attack
Unauthorized connection attempt detected from IP address 189.180.216.31 to port 8080
2020-04-28 01:43:36
49.88.112.115 attackbotsspam
2020-04-27T20:09:20.833124  sshd[2980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
2020-04-27T20:09:23.110275  sshd[2980]: Failed password for root from 49.88.112.115 port 13224 ssh2
2020-04-27T20:09:25.936140  sshd[2980]: Failed password for root from 49.88.112.115 port 13224 ssh2
2020-04-27T20:09:20.833124  sshd[2980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
2020-04-27T20:09:23.110275  sshd[2980]: Failed password for root from 49.88.112.115 port 13224 ssh2
2020-04-27T20:09:25.936140  sshd[2980]: Failed password for root from 49.88.112.115 port 13224 ssh2
...
2020-04-28 02:09:48
182.140.235.149 attackbots
Port probing on unauthorized port 1433
2020-04-28 02:17:17
80.211.13.167 attackbots
Apr 27 16:54:41 icinga sshd[48647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.13.167 
Apr 27 16:54:43 icinga sshd[48647]: Failed password for invalid user eye from 80.211.13.167 port 33816 ssh2
Apr 27 17:00:46 icinga sshd[59503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.13.167 
...
2020-04-28 01:44:08
76.120.7.86 attack
Apr 27 15:03:31 vps sshd[521744]: Failed password for invalid user jcm from 76.120.7.86 port 53628 ssh2
Apr 27 15:06:35 vps sshd[540482]: Invalid user ppp from 76.120.7.86 port 49798
Apr 27 15:06:35 vps sshd[540482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-76-120-7-86.hsd1.co.comcast.net
Apr 27 15:06:37 vps sshd[540482]: Failed password for invalid user ppp from 76.120.7.86 port 49798 ssh2
Apr 27 15:09:44 vps sshd[555137]: Invalid user artik from 76.120.7.86 port 49904
...
2020-04-28 01:35:47
142.93.222.215 attack
Apr 27 14:01:54 ns382633 sshd\[7540\]: Invalid user br from 142.93.222.215 port 45138
Apr 27 14:01:54 ns382633 sshd\[7540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.215
Apr 27 14:01:56 ns382633 sshd\[7540\]: Failed password for invalid user br from 142.93.222.215 port 45138 ssh2
Apr 27 14:13:21 ns382633 sshd\[9897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.222.215  user=root
Apr 27 14:13:23 ns382633 sshd\[9897\]: Failed password for root from 142.93.222.215 port 35452 ssh2
2020-04-28 01:45:59
42.200.244.178 attack
2020-04-27T16:01:14.871608abusebot-8.cloudsearch.cf sshd[30123]: Invalid user iac from 42.200.244.178 port 33786
2020-04-27T16:01:14.883242abusebot-8.cloudsearch.cf sshd[30123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-244-178.static.imsbiz.com
2020-04-27T16:01:14.871608abusebot-8.cloudsearch.cf sshd[30123]: Invalid user iac from 42.200.244.178 port 33786
2020-04-27T16:01:16.677425abusebot-8.cloudsearch.cf sshd[30123]: Failed password for invalid user iac from 42.200.244.178 port 33786 ssh2
2020-04-27T16:05:05.505228abusebot-8.cloudsearch.cf sshd[30359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42-200-244-178.static.imsbiz.com  user=root
2020-04-27T16:05:08.013153abusebot-8.cloudsearch.cf sshd[30359]: Failed password for root from 42.200.244.178 port 60647 ssh2
2020-04-27T16:08:51.141976abusebot-8.cloudsearch.cf sshd[30546]: Invalid user yin from 42.200.244.178 port 59276
...
2020-04-28 02:07:17
203.189.194.87 attackspam
Apr 27 15:57:45 DAAP sshd[26608]: Invalid user sk from 203.189.194.87 port 60685
Apr 27 15:57:45 DAAP sshd[26608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.189.194.87
Apr 27 15:57:45 DAAP sshd[26608]: Invalid user sk from 203.189.194.87 port 60685
Apr 27 15:57:47 DAAP sshd[26608]: Failed password for invalid user sk from 203.189.194.87 port 60685 ssh2
Apr 27 16:02:36 DAAP sshd[26680]: Invalid user xiong from 203.189.194.87 port 57972
...
2020-04-28 02:15:42
106.54.114.208 attack
Apr 27 18:11:33 ovpn sshd\[9965\]: Invalid user temp1 from 106.54.114.208
Apr 27 18:11:33 ovpn sshd\[9965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.114.208
Apr 27 18:11:35 ovpn sshd\[9965\]: Failed password for invalid user temp1 from 106.54.114.208 port 36182 ssh2
Apr 27 18:23:45 ovpn sshd\[13042\]: Invalid user saint from 106.54.114.208
Apr 27 18:23:45 ovpn sshd\[13042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.114.208
2020-04-28 01:53:46
193.252.189.177 attackbots
Apr 27 15:23:58 srv01 sshd[7960]: Invalid user test04 from 193.252.189.177 port 50306
Apr 27 15:23:58 srv01 sshd[7960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.252.189.177
Apr 27 15:23:58 srv01 sshd[7960]: Invalid user test04 from 193.252.189.177 port 50306
Apr 27 15:24:01 srv01 sshd[7960]: Failed password for invalid user test04 from 193.252.189.177 port 50306 ssh2
Apr 27 15:28:08 srv01 sshd[8107]: Invalid user god from 193.252.189.177 port 33904
...
2020-04-28 01:54:27
94.200.197.86 attackspam
(sshd) Failed SSH login from 94.200.197.86 (AE/United Arab Emirates/mail.prestigedubai.com): 5 in the last 3600 secs
2020-04-28 01:45:29
118.200.84.170 attack
nft/Honeypot/11443/38cdf
2020-04-28 01:56:27
222.186.180.6 attackspam
Apr 27 19:48:50 Ubuntu-1404-trusty-64-minimal sshd\[26940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
Apr 27 19:48:52 Ubuntu-1404-trusty-64-minimal sshd\[26940\]: Failed password for root from 222.186.180.6 port 54788 ssh2
Apr 27 19:49:09 Ubuntu-1404-trusty-64-minimal sshd\[27097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
Apr 27 19:49:11 Ubuntu-1404-trusty-64-minimal sshd\[27097\]: Failed password for root from 222.186.180.6 port 63374 ssh2
Apr 27 19:49:30 Ubuntu-1404-trusty-64-minimal sshd\[27339\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.6  user=root
2020-04-28 01:57:36
139.199.27.174 attackspam
Apr 27 19:55:48 ns3164893 sshd[15071]: Failed password for root from 139.199.27.174 port 41534 ssh2
Apr 27 20:14:37 ns3164893 sshd[15406]: Invalid user morty from 139.199.27.174 port 38934
...
2020-04-28 02:19:15

最近上报的IP列表

125.126.214.54 125.126.214.61 117.84.181.60 125.126.214.7
125.126.214.73 125.126.214.81 125.126.214.83 125.126.214.94
117.84.181.70 117.84.181.73 117.84.181.8 117.84.181.80
117.84.181.87 117.84.181.95 117.84.182.145 125.126.217.120
125.126.217.157 125.126.217.12 125.126.217.154 125.126.217.194