必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Indonesia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.166.139.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21935
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.166.139.197.		IN	A

;; AUTHORITY SECTION:
.			112	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 03:02:42 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
Host 197.139.166.125.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 197.139.166.125.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.126.50.42 attackspambots
Lines containing failures of 180.126.50.42
Sep 11 07:37:31 shared07 sshd[2773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.126.50.42  user=r.r
Sep 11 07:37:33 shared07 sshd[2773]: Failed password for r.r from 180.126.50.42 port 13564 ssh2
Sep 11 07:37:36 shared07 sshd[2773]: Failed password for r.r from 180.126.50.42 port 13564 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=180.126.50.42
2019-09-11 20:42:27
37.187.248.10 attackbotsspam
Sep 10 23:49:37 web9 sshd\[30471\]: Invalid user hduser from 37.187.248.10
Sep 10 23:49:37 web9 sshd\[30471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.248.10
Sep 10 23:49:39 web9 sshd\[30471\]: Failed password for invalid user hduser from 37.187.248.10 port 30496 ssh2
Sep 10 23:55:23 web9 sshd\[31696\]: Invalid user wwwadmin from 37.187.248.10
Sep 10 23:55:23 web9 sshd\[31696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.248.10
2019-09-11 20:29:43
219.240.49.50 attackbots
22/tcp 22/tcp 22/tcp...
[2019-08-16/09-11]4pkt,1pt.(tcp)
2019-09-11 21:18:14
218.98.26.186 attackbotsspam
Sep 11 08:01:01 zimbra sshd[29454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.186  user=r.r
Sep 11 08:01:04 zimbra sshd[29454]: Failed password for r.r from 218.98.26.186 port 54383 ssh2
Sep 11 08:01:06 zimbra sshd[29454]: Failed password for r.r from 218.98.26.186 port 54383 ssh2
Sep 11 08:01:09 zimbra sshd[29454]: Failed password for r.r from 218.98.26.186 port 54383 ssh2
Sep 11 08:01:09 zimbra sshd[29454]: Received disconnect from 218.98.26.186 port 54383:11:  [preauth]
Sep 11 08:01:09 zimbra sshd[29454]: Disconnected from 218.98.26.186 port 54383 [preauth]
Sep 11 08:01:09 zimbra sshd[29454]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.186  user=r.r
Sep 11 08:01:14 zimbra sshd[29690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.186  user=r.r
Sep 11 08:01:16 zimbra sshd[29690]: Failed password for r.r from 218.98.26........
-------------------------------
2019-09-11 21:01:25
134.175.119.37 attackbots
Sep 11 14:22:22 h2177944 sshd\[7684\]: Invalid user test2 from 134.175.119.37 port 34546
Sep 11 14:22:22 h2177944 sshd\[7684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.119.37
Sep 11 14:22:23 h2177944 sshd\[7684\]: Failed password for invalid user test2 from 134.175.119.37 port 34546 ssh2
Sep 11 14:30:30 h2177944 sshd\[7982\]: Invalid user vnc from 134.175.119.37 port 34858
Sep 11 14:30:30 h2177944 sshd\[7982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.119.37
...
2019-09-11 20:49:36
117.50.17.253 attack
Sep 11 09:53:14 mout sshd[23916]: Invalid user jenkins from 117.50.17.253 port 55014
2019-09-11 20:28:21
43.227.66.159 attackspam
Sep 11 12:23:20 MK-Soft-VM4 sshd\[9841\]: Invalid user developer from 43.227.66.159 port 49630
Sep 11 12:23:20 MK-Soft-VM4 sshd\[9841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.227.66.159
Sep 11 12:23:22 MK-Soft-VM4 sshd\[9841\]: Failed password for invalid user developer from 43.227.66.159 port 49630 ssh2
...
2019-09-11 21:01:53
183.103.35.202 attack
Sep 11 09:48:49 xeon sshd[2596]: Failed password for invalid user police from 183.103.35.202 port 55808 ssh2
2019-09-11 21:21:04
183.54.205.59 attack
2019-09-11T12:27:45.925069abusebot.cloudsearch.cf sshd\[3886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.54.205.59  user=root
2019-09-11 21:21:35
51.83.78.56 attack
Sep 11 12:38:45 marvibiene sshd[21531]: Invalid user scan from 51.83.78.56 port 41490
Sep 11 12:38:45 marvibiene sshd[21531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.56
Sep 11 12:38:45 marvibiene sshd[21531]: Invalid user scan from 51.83.78.56 port 41490
Sep 11 12:38:47 marvibiene sshd[21531]: Failed password for invalid user scan from 51.83.78.56 port 41490 ssh2
...
2019-09-11 20:59:57
104.128.69.146 attackspam
Sep 11 15:35:43 lukav-desktop sshd\[29972\]: Invalid user test from 104.128.69.146
Sep 11 15:35:43 lukav-desktop sshd\[29972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.69.146
Sep 11 15:35:46 lukav-desktop sshd\[29972\]: Failed password for invalid user test from 104.128.69.146 port 57325 ssh2
Sep 11 15:41:57 lukav-desktop sshd\[30093\]: Invalid user postgres from 104.128.69.146
Sep 11 15:41:57 lukav-desktop sshd\[30093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.128.69.146
2019-09-11 20:53:40
116.21.72.189 attackbotsspam
Unauthorised access (Sep 11) SRC=116.21.72.189 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=17554 TCP DPT=8080 WINDOW=43369 SYN
2019-09-11 20:57:01
95.173.179.151 attack
xmlrpc attack
2019-09-11 20:59:19
51.75.17.228 attack
Sep 10 23:36:05 lcprod sshd\[11353\]: Invalid user git from 51.75.17.228
Sep 10 23:36:05 lcprod sshd\[11353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=228.ip-51-75-17.eu
Sep 10 23:36:07 lcprod sshd\[11353\]: Failed password for invalid user git from 51.75.17.228 port 55278 ssh2
Sep 10 23:42:18 lcprod sshd\[11948\]: Invalid user svnuser from 51.75.17.228
Sep 10 23:42:18 lcprod sshd\[11948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=228.ip-51-75-17.eu
2019-09-11 21:07:55
159.89.94.198 attackspambots
Sep 11 00:20:12 web9 sshd\[4480\]: Invalid user sammy from 159.89.94.198
Sep 11 00:20:12 web9 sshd\[4480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.94.198
Sep 11 00:20:14 web9 sshd\[4480\]: Failed password for invalid user sammy from 159.89.94.198 port 35436 ssh2
Sep 11 00:25:37 web9 sshd\[5481\]: Invalid user dev from 159.89.94.198
Sep 11 00:25:37 web9 sshd\[5481\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.94.198
2019-09-11 20:40:35

最近上报的IP列表

125.166.139.187 125.166.139.66 125.166.14.17 117.91.254.95
125.166.14.185 125.166.14.229 125.166.140.137 125.166.139.37
125.166.14.223 125.166.140.167 125.166.140.165 125.166.140.244
44.90.35.125 125.166.141.104 125.166.140.9 125.166.141.88
125.166.141.29 125.166.141.169 117.91.254.97 125.166.142.125