必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.165.50.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.165.50.34.			IN	A

;; AUTHORITY SECTION:
.			59	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 03:00:53 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 34.50.165.125.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 34.50.165.125.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
198.108.67.104 attackspam
01/15/2020-23:55:03.082555 198.108.67.104 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-16 13:40:07
194.8.131.47 attackbotsspam
Jan 16 07:21:40 pkdns2 sshd\[19933\]: Invalid user nd from 194.8.131.47Jan 16 07:21:42 pkdns2 sshd\[19933\]: Failed password for invalid user nd from 194.8.131.47 port 56936 ssh2Jan 16 07:24:52 pkdns2 sshd\[20021\]: Invalid user miura from 194.8.131.47Jan 16 07:24:53 pkdns2 sshd\[20021\]: Failed password for invalid user miura from 194.8.131.47 port 35137 ssh2Jan 16 07:27:59 pkdns2 sshd\[20151\]: Invalid user jenny from 194.8.131.47Jan 16 07:28:02 pkdns2 sshd\[20151\]: Failed password for invalid user jenny from 194.8.131.47 port 40254 ssh2
...
2020-01-16 13:44:36
217.61.5.122 attack
Unauthorized connection attempt detected from IP address 217.61.5.122 to port 2220 [J]
2020-01-16 13:41:51
146.88.240.4 attack
2 Attack(s) Detected
[DoS Attack: TCP/UDP Chargen] from source: 146.88.240.4, port 46566, Tuesday, January 14, 2020 18:35:49

[DoS Attack: TCP/UDP Chargen] from source: 146.88.240.4, port 59563, Tuesday, January 14, 2020 18:32:00
2020-01-16 14:04:06
51.91.120.67 attack
Jan 16 06:44:06 vps691689 sshd[26200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.120.67
Jan 16 06:44:08 vps691689 sshd[26200]: Failed password for invalid user sso from 51.91.120.67 port 34414 ssh2
...
2020-01-16 13:48:42
194.116.236.173 attackspambots
Jan 16 05:54:16 h2421860 postfix/postscreen[23725]: CONNECT from [194.116.236.173]:3903 to [85.214.119.52]:25
Jan 16 05:54:16 h2421860 postfix/dnsblog[23770]: addr 194.116.236.173 listed by domain zen.spamhaus.org as 127.0.0.3
Jan 16 05:54:16 h2421860 postfix/dnsblog[23774]: addr 194.116.236.173 listed by domain Unknown.trblspam.com as 185.53.179.7
Jan 16 05:54:22 h2421860 postfix/postscreen[23725]: DNSBL rank 4 for [194.116.236.173]:3903
Jan x@x
Jan 16 05:54:23 h2421860 postfix/postscreen[23725]: DISCONNECT [194.116.236.173]:3903


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=194.116.236.173
2020-01-16 14:07:41
148.0.35.0 attackbotsspam
Jan 15 20:49:58 mail sshd[17894]: reveeclipse mapping checking getaddrinfo for 0.35.0.148.d.dyn.claro.net.do [148.0.35.0] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 15 20:50:00 mail sshd[17894]: Failed password for invalid user ftpuser from 148.0.35.0 port 38485 ssh2
Jan 15 20:50:00 mail sshd[17894]: Received disconnect from 148.0.35.0: 11: Bye Bye [preauth]
Jan 15 20:54:11 mail sshd[18676]: reveeclipse mapping checking getaddrinfo for 0.35.0.148.d.dyn.claro.net.do [148.0.35.0] failed - POSSIBLE BREAK-IN ATTEMPT!


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=148.0.35.0
2020-01-16 14:02:39
181.48.116.50 attack
$f2bV_matches
2020-01-16 13:54:38
35.199.104.164 attack
Unauthorized connection attempt detected from IP address 35.199.104.164 to port 2220 [J]
2020-01-16 13:45:07
185.176.27.18 attackspambots
01/16/2020-07:00:27.782844 185.176.27.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-16 14:03:35
64.111.127.81 attackbotsspam
Automatic report - XMLRPC Attack
2020-01-16 13:53:43
218.92.0.148 attack
v+ssh-bruteforce
2020-01-16 14:05:25
218.92.0.164 attackspambots
Jan 16 06:54:13 herz-der-gamer sshd[3250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.164  user=root
Jan 16 06:54:14 herz-der-gamer sshd[3250]: Failed password for root from 218.92.0.164 port 43314 ssh2
...
2020-01-16 13:58:01
2001:41d0:203:4b94:: attack
WordPress wp-login brute force :: 2001:41d0:203:4b94:: 0.132 BYPASS [16/Jan/2020:04:54:22  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-01-16 14:04:51
124.204.51.162 attack
Jan 16 00:18:10 ny01 sshd[9218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.51.162
Jan 16 00:18:13 ny01 sshd[9218]: Failed password for invalid user antonio from 124.204.51.162 port 43132 ssh2
Jan 16 00:20:56 ny01 sshd[9519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.51.162
2020-01-16 13:42:06

最近上报的IP列表

125.165.50.206 125.165.51.192 125.165.51.215 125.165.51.33
117.91.251.49 125.165.51.233 125.165.51.67 125.165.51.28
125.165.52.131 125.165.51.99 125.165.51.41 125.165.52.137
125.165.52.113 125.165.52.155 189.218.232.46 125.165.52.156
117.91.251.53 125.165.53.159 125.165.52.217 125.165.52.192