必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
125.161.105.129 attack
trying to access non-authorized port
2020-05-12 21:49:23
125.161.105.102 attackbots
Unauthorized connection attempt from IP address 125.161.105.102 on Port 445(SMB)
2020-04-14 21:01:15
125.161.105.249 attackspam
Automatic report - Port Scan Attack
2020-04-12 21:09:41
125.161.105.64 attackspambots
Unauthorized connection attempt from IP address 125.161.105.64 on Port 445(SMB)
2020-03-24 03:23:08
125.161.105.226 attackspam
Unauthorized connection attempt from IP address 125.161.105.226 on Port 445(SMB)
2020-02-28 23:15:25
125.161.105.70 attackspam
unauthorized connection attempt
2020-02-26 14:43:27
125.161.105.8 attackbots
Unauthorized connection attempt from IP address 125.161.105.8 on Port 445(SMB)
2020-02-22 18:09:06
125.161.105.236 attackbotsspam
Honeypot attack, port: 445, PTR: 236.subnet125-161-105.speedy.telkom.net.id.
2020-02-11 16:00:55
125.161.105.115 attackspambots
Unauthorized connection attempt from IP address 125.161.105.115 on Port 445(SMB)
2020-01-26 18:03:49
125.161.105.252 attack
Unauthorized connection attempt detected from IP address 125.161.105.252 to port 8080 [J]
2020-01-06 15:38:35
125.161.105.247 attackspam
Jan  1 03:05:07 pl3server sshd[27763]: reveeclipse mapping checking getaddrinfo for 247.subnet125-161-105.speedy.telkom.net.id [125.161.105.247] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan  1 03:05:07 pl3server sshd[27763]: Invalid user admin from 125.161.105.247
Jan  1 03:05:07 pl3server sshd[27763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.161.105.247
Jan  1 03:05:09 pl3server sshd[27763]: Failed password for invalid user admin from 125.161.105.247 port 15462 ssh2
Jan  1 03:05:09 pl3server sshd[27763]: Connection closed by 125.161.105.247 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=125.161.105.247
2020-01-02 19:51:07
125.161.105.215 attackbotsspam
1577889640 - 01/01/2020 15:40:40 Host: 125.161.105.215/125.161.105.215 Port: 445 TCP Blocked
2020-01-02 06:31:57
125.161.105.47 attackbotsspam
Unauthorised access (Dec 18) SRC=125.161.105.47 LEN=52 TTL=248 ID=11414 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec 18) SRC=125.161.105.47 LEN=52 TTL=248 ID=7716 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-18 17:59:49
125.161.105.135 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 25-11-2019 06:20:29.
2019-11-25 21:30:24
125.161.105.116 attackbots
Unauthorized IMAP connection attempt
2019-10-23 03:15:16
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.161.105.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56802
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.161.105.148.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011602 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 06:45:38 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 148.105.161.125.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 148.105.161.125.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.110.111.51 attack
sshd
2020-05-04 03:21:36
173.208.130.202 attackbots
20 attempts against mh-misbehave-ban on milky
2020-05-04 03:25:21
138.186.148.209 attackspambots
Unauthorized connection attempt detected from IP address 138.186.148.209 to port 23
2020-05-04 03:17:57
185.176.27.34 attackspam
05/03/2020-15:15:59.282688 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-04 03:39:07
220.163.107.130 attackbotsspam
May  3 17:51:44 ns392434 sshd[4954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.163.107.130  user=root
May  3 17:51:46 ns392434 sshd[4954]: Failed password for root from 220.163.107.130 port 8106 ssh2
May  3 18:06:21 ns392434 sshd[5608]: Invalid user shuo from 220.163.107.130 port 36699
May  3 18:06:21 ns392434 sshd[5608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.163.107.130
May  3 18:06:21 ns392434 sshd[5608]: Invalid user shuo from 220.163.107.130 port 36699
May  3 18:06:23 ns392434 sshd[5608]: Failed password for invalid user shuo from 220.163.107.130 port 36699 ssh2
May  3 18:07:43 ns392434 sshd[5671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.163.107.130  user=root
May  3 18:07:45 ns392434 sshd[5671]: Failed password for root from 220.163.107.130 port 43589 ssh2
May  3 18:09:05 ns392434 sshd[5740]: Invalid user server from 220.163.107.130 port 50483
2020-05-04 03:28:58
134.122.120.74 attackspam
www noscript
...
2020-05-04 03:22:55
79.182.92.183 attackspam
Fail2Ban - HTTP Auth Bruteforce Attempt
2020-05-04 03:28:03
89.165.2.239 attack
May  3 14:50:16 legacy sshd[26010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.165.2.239
May  3 14:50:19 legacy sshd[26010]: Failed password for invalid user guest from 89.165.2.239 port 43103 ssh2
May  3 14:54:18 legacy sshd[26120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.165.2.239
...
2020-05-04 03:13:14
183.47.14.74 attackspambots
Brute-force attempt banned
2020-05-04 03:30:25
109.168.66.27 attack
SSH/22 MH Probe, BF, Hack -
2020-05-04 03:37:07
64.94.210.138 attackspambots
(From eric@talkwithwebvisitor.com) Hello, my name’s Eric and I just ran across your website at mihlonchiropractic.com...

I found it after a quick search, so your SEO’s working out…

Content looks pretty good…

One thing’s missing though…

A QUICK, EASY way to connect with you NOW.

Because studies show that a web lead like me will only hang out a few seconds – 7 out of 10 disappear almost instantly, Surf Surf Surf… then gone forever.

I have the solution:

Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  You’ll know immediately they’re interested and you can call them directly to TALK with them - literally while they’re still on the web looking at your site.

CLICK HERE http://www.talkwithwebvisitor.com to try out a Live Demo with Talk With Web Visitor now to see exactly how it works and even give it a try… it could be huge for your business.

Plus, now that you’ve got that phone number, with our new
2020-05-04 03:03:06
68.183.153.161 attackbotsspam
SIP/5060 Probe, BF, Hack -
2020-05-04 03:22:36
140.246.245.144 attackspam
May  3 15:15:12 prox sshd[25306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.246.245.144 
May  3 15:15:15 prox sshd[25306]: Failed password for invalid user postgre from 140.246.245.144 port 53786 ssh2
2020-05-04 03:27:17
122.176.52.13 attackspambots
May  3 20:55:23 vpn01 sshd[3877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.52.13
May  3 20:55:25 vpn01 sshd[3877]: Failed password for invalid user zjz from 122.176.52.13 port 13652 ssh2
...
2020-05-04 03:21:07
198.100.158.173 attackbots
$f2bV_matches
2020-05-04 03:36:45

最近上报的IP列表

52.255.166.225 78.204.219.160 237.98.92.186 128.155.204.136
255.210.24.201 123.148.168.72 29.246.85.170 45.247.97.172
34.83.129.240 117.62.164.26 208.149.203.169 182.222.211.108
72.175.47.14 179.40.8.133 214.152.220.39 203.92.195.111
225.6.253.142 47.201.170.124 12.202.102.23 90.254.11.63