必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.164.61.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29871
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.164.61.21.			IN	A

;; AUTHORITY SECTION:
.			585	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 02:56:33 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 21.61.164.125.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 21.61.164.125.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
194.26.29.53 attackspam
May 30 06:10:04 debian-2gb-nbg1-2 kernel: \[13070587.200087\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.53 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=9296 PROTO=TCP SPT=58461 DPT=4488 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-30 12:17:33
187.141.100.98 attack
20/5/29@23:54:47: FAIL: Alarm-Network address from=187.141.100.98
...
2020-05-30 12:16:32
118.24.83.41 attackspambots
2020-05-30T05:52:01.783792vps773228.ovh.net sshd[9688]: Failed password for root from 118.24.83.41 port 37882 ssh2
2020-05-30T05:54:28.047032vps773228.ovh.net sshd[9704]: Invalid user guest from 118.24.83.41 port 37190
2020-05-30T05:54:28.061887vps773228.ovh.net sshd[9704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.83.41
2020-05-30T05:54:28.047032vps773228.ovh.net sshd[9704]: Invalid user guest from 118.24.83.41 port 37190
2020-05-30T05:54:29.940680vps773228.ovh.net sshd[9704]: Failed password for invalid user guest from 118.24.83.41 port 37190 ssh2
...
2020-05-30 12:32:43
159.65.216.161 attackspam
(sshd) Failed SSH login from 159.65.216.161 (US/United States/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 30 05:55:51 ubnt-55d23 sshd[31104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.216.161  user=root
May 30 05:55:53 ubnt-55d23 sshd[31104]: Failed password for root from 159.65.216.161 port 39036 ssh2
2020-05-30 12:07:59
146.164.51.52 attackspam
May 30 05:50:20 pve1 sshd[25943]: Failed password for root from 146.164.51.52 port 41272 ssh2
...
2020-05-30 12:31:02
59.126.235.232 attack
port scan and connect, tcp 23 (telnet)
2020-05-30 12:29:13
54.37.71.203 attackbotsspam
Invalid user patalano from 54.37.71.203 port 50418
2020-05-30 08:57:50
114.204.195.250 attack
May 30 05:54:24 OPSO sshd\[14355\]: Invalid user pi from 114.204.195.250 port 39784
May 30 05:54:24 OPSO sshd\[14357\]: Invalid user pi from 114.204.195.250 port 39786
May 30 05:54:24 OPSO sshd\[14355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.204.195.250
May 30 05:54:24 OPSO sshd\[14357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.204.195.250
May 30 05:54:26 OPSO sshd\[14355\]: Failed password for invalid user pi from 114.204.195.250 port 39784 ssh2
May 30 05:54:26 OPSO sshd\[14357\]: Failed password for invalid user pi from 114.204.195.250 port 39786 ssh2
2020-05-30 12:34:15
61.177.172.128 attack
May 30 06:05:51 vps sshd[407535]: Failed password for root from 61.177.172.128 port 57741 ssh2
May 30 06:05:54 vps sshd[407535]: Failed password for root from 61.177.172.128 port 57741 ssh2
May 30 06:05:57 vps sshd[407535]: Failed password for root from 61.177.172.128 port 57741 ssh2
May 30 06:06:00 vps sshd[407535]: Failed password for root from 61.177.172.128 port 57741 ssh2
May 30 06:06:03 vps sshd[407535]: Failed password for root from 61.177.172.128 port 57741 ssh2
...
2020-05-30 12:32:21
181.63.248.149 attackbots
May 29 20:51:04 dignus sshd[16595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.248.149  user=uucp
May 29 20:51:06 dignus sshd[16595]: Failed password for uucp from 181.63.248.149 port 50884 ssh2
May 29 20:55:09 dignus sshd[16811]: Invalid user dpetty from 181.63.248.149 port 52994
May 29 20:55:09 dignus sshd[16811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.248.149
May 29 20:55:11 dignus sshd[16811]: Failed password for invalid user dpetty from 181.63.248.149 port 52994 ssh2
...
2020-05-30 12:00:44
138.197.189.136 attack
May 30 05:49:52 vps687878 sshd\[20867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.136  user=root
May 30 05:49:54 vps687878 sshd\[20867\]: Failed password for root from 138.197.189.136 port 47176 ssh2
May 30 05:52:10 vps687878 sshd\[21186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.136  user=root
May 30 05:52:11 vps687878 sshd\[21186\]: Failed password for root from 138.197.189.136 port 59408 ssh2
May 30 05:54:18 vps687878 sshd\[21343\]: Invalid user onfroy from 138.197.189.136 port 43402
May 30 05:54:18 vps687878 sshd\[21343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.189.136
...
2020-05-30 12:11:42
177.20.167.140 attackbots
Unauthorized connection attempt from IP address 177.20.167.140 on Port 445(SMB)
2020-05-30 08:58:55
159.65.147.1 attack
May 30 06:16:50 localhost sshd\[11971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.147.1  user=root
May 30 06:16:52 localhost sshd\[11971\]: Failed password for root from 159.65.147.1 port 47206 ssh2
May 30 06:18:21 localhost sshd\[12021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.147.1  user=root
May 30 06:18:24 localhost sshd\[12021\]: Failed password for root from 159.65.147.1 port 41110 ssh2
May 30 06:19:54 localhost sshd\[12070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.147.1  user=root
...
2020-05-30 12:35:05
27.50.169.167 attackspambots
May 30 05:54:45 haigwepa sshd[1142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.50.169.167 
May 30 05:54:48 haigwepa sshd[1142]: Failed password for invalid user admin from 27.50.169.167 port 37000 ssh2
...
2020-05-30 12:17:05
106.13.126.174 attack
SSH brute-force: detected 10 distinct usernames within a 24-hour window.
2020-05-30 12:35:43

最近上报的IP列表

125.164.62.116 125.164.61.77 125.164.62.110 117.91.138.38
125.164.62.122 125.164.62.222 125.164.62.8 125.164.63.103
125.164.63.141 125.164.63.137 125.164.62.43 125.164.63.200
125.164.63.173 125.164.63.97 125.164.63.254 125.164.63.233
117.91.138.40 125.164.7.103 125.164.64.190 125.164.7.109