必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
125.164.224.174 attackbots
20/2/25@23:55:58: FAIL: Alarm-Network address from=125.164.224.174
20/2/25@23:55:58: FAIL: Alarm-Network address from=125.164.224.174
...
2020-02-26 17:35:47
125.164.229.126 attackbots
Unauthorized connection attempt from IP address 125.164.229.126 on Port 445(SMB)
2020-02-06 02:10:06
125.164.229.208 attackbotsspam
Unauthorized connection attempt detected from IP address 125.164.229.208 to port 8080 [J]
2020-01-18 18:40:04
125.164.227.71 attack
1578898831 - 01/13/2020 08:00:31 Host: 125.164.227.71/125.164.227.71 Port: 445 TCP Blocked
2020-01-13 19:55:41
125.164.224.245 attackspam
1578027028 - 01/03/2020 05:50:28 Host: 125.164.224.245/125.164.224.245 Port: 445 TCP Blocked
2020-01-03 15:48:07
125.164.226.217 attackspam
Unauthorised access (Sep 28) SRC=125.164.226.217 LEN=48 TTL=116 ID=14498 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-29 04:40:33
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.164.22.213
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29279
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.164.22.213.			IN	A

;; AUTHORITY SECTION:
.			593	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 02:53:55 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 213.22.164.125.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 213.22.164.125.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
81.30.182.215 attack
postfix (unknown user, SPF fail or relay access denied)
2019-11-01 12:04:06
103.15.62.69 attackbotsspam
Invalid user sftp from 103.15.62.69 port 41416
2019-11-01 08:07:41
179.107.111.106 attack
Invalid user dodi from 179.107.111.106 port 43030
2019-11-01 08:21:15
104.236.31.227 attackbotsspam
SSH Brute Force
2019-11-01 12:05:32
81.133.12.221 attackspambots
Invalid user support from 81.133.12.221 port 50294
2019-11-01 08:10:21
182.219.172.224 attackspam
Invalid user kuroiwa from 182.219.172.224 port 52098
2019-11-01 07:57:02
202.54.248.160 attack
SQL注入
202.54.248.160 - - [01/Nov/2019:11:46:45 +0800] "GET /check-ip/114.116.31.44SELECT%20%20%20Teachers.ID%20AS%20RecordID,%20%20%20Teachers.USERS_DCID%20AS%20IMPORTID,%20%20%20Teachers.SCHOOLID,%20%20%20Teachers.FIRST_NAME,%20%20%20Teachers.MIDDLE_NAME,%20%20%20Teachers.LAST_NAME,%20%20%20Teachers.TITLE,%20%20%20Teachers.HOMEROOM,%20%20%20Teachers.HOME_PHONE,%20%20%20Teachers.SCHOOL_PHONE,%20%20%20Teachers.EMAIL_ADDR,%20%20%20Teachers.TEACHERLOGINID,%20%20%20Teachers.LOGINID,%20%20%20Teachers.STAFFSTATUS,%20%20%20Teachers.PREFERREDNAME,%20%20%20Teachers.STATUS%20%20%20FROM%20%20%20%20%20Teachers%20%20%20WHERE%20Teachers.STATUS%20=%20'1'%20%20%20AND%20Teachers.Users_DCID%20IS%20NOT%20NULL%20%20%20AND%20(Teachers.TEACHERLOGINID%20IS%20NOT%20NULL%20OR%20Teachers.LOGINID%20IS%20NOT%20NULL)%20%20%20ORDER%20BY%20%20%20%20%20Teachers.ID HTTP/2.0" 200 3866 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/13.0.3 Safari/605.1.15"
2019-11-01 11:50:50
104.248.181.156 attackspam
SSH Brute Force
2019-11-01 12:01:01
103.69.193.76 attackspam
Invalid user cscz from 103.69.193.76 port 47932
2019-11-01 08:27:45
129.213.63.120 attackspambots
Invalid user zw from 129.213.63.120 port 45758
2019-11-01 08:26:24
118.98.96.184 attackspam
Invalid user test from 118.98.96.184 port 35397
2019-11-01 08:03:37
104.210.59.145 attack
SSH Brute Force
2019-11-01 12:06:23
175.139.201.205 attack
Invalid user admin from 175.139.201.205 port 38175
2019-11-01 08:22:21
140.114.91.94 attackspam
Invalid user suporte from 140.114.91.94 port 47882
2019-11-01 08:01:00
104.215.78.27 attack
SSH Brute Force
2019-11-01 12:06:08

最近上报的IP列表

125.164.22.185 117.90.5.140 125.164.22.25 125.164.22.60
125.164.22.254 125.164.22.36 125.164.22.68 117.90.5.142
125.164.22.84 125.164.22.88 125.164.220.245 125.164.224.196
125.164.220.47 125.164.22.93 125.164.220.39 125.164.224.198
125.164.225.106 117.90.5.144 125.164.225.105 125.164.224.246