必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Mumbai

省份(region): Maharashtra

国家(country): India

运营商(isp): AirTel

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.16.25.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.16.25.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:35:43 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 201.25.16.125.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.25.16.125.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.82.153.5 attack
Jul  9 01:52:29 box kernel: [744573.506894] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=45.82.153.5 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=60881 PROTO=TCP SPT=47835 DPT=4752 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  9 02:10:19 box kernel: [745643.543673] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=45.82.153.5 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=3511 PROTO=TCP SPT=47835 DPT=4755 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  9 04:10:51 box kernel: [752875.178727] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=45.82.153.5 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=37075 PROTO=TCP SPT=47835 DPT=4754 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  9 05:17:37 box kernel: [756881.128585] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=45.82.153.5 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=57746 PROTO=TCP SPT=47835 DPT=4757 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul  9 05:33:21 box kernel: [757825.398355] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=45.82.153.5 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=29065 PROTO=
2019-07-09 12:17:25
157.230.163.6 attack
Brute force attempt
2019-07-09 11:29:36
186.179.100.7 attackbots
Jul  8 20:03:32 mxgate1 postfix/postscreen[11227]: CONNECT from [186.179.100.7]:14306 to [176.31.12.44]:25
Jul  8 20:03:32 mxgate1 postfix/dnsblog[11231]: addr 186.179.100.7 listed by domain zen.spamhaus.org as 127.0.0.11
Jul  8 20:03:32 mxgate1 postfix/dnsblog[11231]: addr 186.179.100.7 listed by domain zen.spamhaus.org as 127.0.0.3
Jul  8 20:03:32 mxgate1 postfix/dnsblog[11231]: addr 186.179.100.7 listed by domain zen.spamhaus.org as 127.0.0.4
Jul  8 20:03:32 mxgate1 postfix/dnsblog[11232]: addr 186.179.100.7 listed by domain cbl.abuseat.org as 127.0.0.2
Jul  8 20:03:32 mxgate1 postfix/dnsblog[11229]: addr 186.179.100.7 listed by domain b.barracudacentral.org as 127.0.0.2
Jul  8 20:03:32 mxgate1 postfix/dnsblog[11230]: addr 186.179.100.7 listed by domain bl.spamcop.net as 127.0.0.2
Jul  8 20:03:33 mxgate1 postfix/postscreen[11227]: PREGREET 29 after 0.51 from [186.179.100.7]:14306: EHLO disneychannelindia.com

Jul  8 20:03:33 mxgate1 postfix/postscreen[11227]: DNSBL r........
-------------------------------
2019-07-09 11:24:05
210.221.220.68 attackspam
$f2bV_matches
2019-07-09 11:53:09
146.88.240.4 attack
TCP/UDP Chargen] from source: 146.88.240.4, port 54462, Monday, July 08, 2019 22:33:35
2019-07-09 11:53:33
185.234.216.180 attackspambots
2019-07-08T21:14:06.232059mail01 postfix/smtpd[27848]: warning: unknown[185.234.216.180]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-08T21:18:38.194515mail01 postfix/smtpd[27848]: warning: unknown[185.234.216.180]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-08T21:23:05.192784mail01 postfix/smtpd[13249]: warning: unknown[185.234.216.180]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-07-09 11:34:50
104.140.188.46 attackspambots
21/tcp 3389/tcp 8444/tcp...
[2019-06-11/07-08]16pkt,8pt.(tcp),1pt.(udp)
2019-07-09 11:20:53
36.82.3.239 attackbotsspam
Unauthorized connection attempt from IP address 36.82.3.239 on Port 445(SMB)
2019-07-09 12:18:30
147.135.207.193 attackspam
[munged]::443 147.135.207.193 - - [09/Jul/2019:00:51:09 +0200] "POST /[munged]: HTTP/1.1" 200 6318 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 147.135.207.193 - - [09/Jul/2019:00:51:10 +0200] "POST /[munged]: HTTP/1.1" 200 6320 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 147.135.207.193 - - [09/Jul/2019:00:51:10 +0200] "POST /[munged]: HTTP/1.1" 200 6320 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-07-09 11:33:03
93.152.159.11 attackspam
Jul  8 18:08:47 Aberdeen-m4-Access auth.info sshd[18294]: Invalid user password from 93.152.159.11 port 38398
Jul  8 18:08:47 Aberdeen-m4-Access auth.info sshd[18294]: Failed password for invalid user password from 93.152.159.11 port 38398 ssh2
Jul  8 18:08:47 Aberdeen-m4-Access auth.info sshd[18294]: Received disconnect from 93.152.159.11 port 38398:11: Bye Bye [preauth]
Jul  8 18:08:47 Aberdeen-m4-Access auth.info sshd[18294]: Disconnected from 93.152.159.11 port 38398 [preauth]
Jul  8 18:08:47 Aberdeen-m4-Access auth.notice sshguard[2839]: Attack from "93.152.159.11" on service 100 whostnameh danger 10.
Jul  8 18:08:47 Aberdeen-m4-Access auth.notice sshguard[2839]: Attack from "93.152.159.11" on service 100 whostnameh danger 10.
Jul  8 18:08:47 Aberdeen-m4-Access auth.notice sshguard[2839]: Attack from "93.152.159.11" on service 100 whostnameh danger 10.
Jul  8 18:08:47 Aberdeen-m4-Access auth.warn sshguard[2839]: Blocking "93.152.159.11/32" for 240 secs (3 attacks in........
------------------------------
2019-07-09 12:14:58
38.132.108.175 attack
Postfix DNSBL listed. Trying to send SPAM.
2019-07-09 12:02:36
186.179.100.168 attack
Unauthorized connection attempt from IP address 186.179.100.168 on Port 445(SMB)
2019-07-09 12:16:56
117.156.165.5 attack
port scan and connect, tcp 22 (ssh)
2019-07-09 11:57:41
219.93.20.155 attackspambots
Tried sshing with brute force.
2019-07-09 11:45:53
190.57.139.250 attackbots
proto=tcp  .  spt=40809  .  dpt=25  .     (listed on Blocklist de  Jul 08)     (728)
2019-07-09 11:30:08

最近上报的IP列表

61.237.85.232 216.203.107.181 141.238.106.201 123.67.154.226
126.6.135.101 176.73.40.199 146.206.87.18 31.153.90.34
74.102.46.137 227.42.24.88 120.97.41.66 139.50.189.82
211.248.141.80 153.15.3.216 219.177.54.201 40.28.238.100
53.15.11.188 47.76.113.241 227.76.85.26 74.94.240.199