必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.20.84.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.20.84.142.			IN	A

;; AUTHORITY SECTION:
.			583	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:03:44 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 142.84.20.125.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.84.20.125.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.175.23 attackbotsspam
13.03.2020 21:51:32 SSH access blocked by firewall
2020-03-14 05:48:12
182.110.18.204 attackspam
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2020-03-14 05:14:22
140.143.230.72 attackspam
$f2bV_matches
2020-03-14 05:51:21
117.69.150.169 attackbots
Forbidden directory scan :: 2020/03/13 21:16:48 [error] 36085#36085: *1921063 access forbidden by rule, client: 117.69.150.169, server: [censored_1], request: "GET /knowledge-base/... HTTP/1.1", host: "www.[censored_1]"
2020-03-14 05:46:33
222.186.180.142 attackspambots
Mar 13 18:21:49 firewall sshd[21818]: Failed password for root from 222.186.180.142 port 40235 ssh2
Mar 13 18:21:51 firewall sshd[21818]: Failed password for root from 222.186.180.142 port 40235 ssh2
Mar 13 18:21:53 firewall sshd[21818]: Failed password for root from 222.186.180.142 port 40235 ssh2
...
2020-03-14 05:24:25
64.202.185.147 attackspambots
WordPress wp-login brute force :: 64.202.185.147 0.120 - [13/Mar/2020:20:47:24  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-03-14 05:17:26
182.61.26.50 attackbotsspam
Jan 10 18:03:55 pi sshd[23355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.26.50 
Jan 10 18:03:56 pi sshd[23355]: Failed password for invalid user ryan from 182.61.26.50 port 42328 ssh2
2020-03-14 05:16:09
116.108.242.191 attackspam
2020-03-13 22:16:03 H=\(\[116.108.242.191\]\) \[116.108.242.191\]:32168 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2020-03-13 22:16:30 H=\(\[116.108.242.191\]\) \[116.108.242.191\]:32291 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
2020-03-13 22:16:55 H=\(\[116.108.242.191\]\) \[116.108.242.191\]:32386 I=\[193.107.88.166\]:25 F=\ rejected RCPT \: Sender verify failed
...
2020-03-14 05:40:27
122.14.219.197 attackbotsspam
Mar 13 22:11:27 rotator sshd\[27005\]: Invalid user infowarelab from 122.14.219.197Mar 13 22:11:29 rotator sshd\[27005\]: Failed password for invalid user infowarelab from 122.14.219.197 port 53538 ssh2Mar 13 22:13:13 rotator sshd\[27013\]: Failed password for root from 122.14.219.197 port 59851 ssh2Mar 13 22:14:58 rotator sshd\[27029\]: Invalid user docker from 122.14.219.197Mar 13 22:15:01 rotator sshd\[27029\]: Failed password for invalid user docker from 122.14.219.197 port 37931 ssh2Mar 13 22:16:50 rotator sshd\[27795\]: Failed password for root from 122.14.219.197 port 44244 ssh2
...
2020-03-14 05:42:18
222.186.169.192 attackspam
2020-03-13T21:37:20.769399dmca.cloudsearch.cf sshd[19375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2020-03-13T21:37:22.316893dmca.cloudsearch.cf sshd[19375]: Failed password for root from 222.186.169.192 port 45656 ssh2
2020-03-13T21:37:25.501394dmca.cloudsearch.cf sshd[19375]: Failed password for root from 222.186.169.192 port 45656 ssh2
2020-03-13T21:37:20.769399dmca.cloudsearch.cf sshd[19375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user=root
2020-03-13T21:37:22.316893dmca.cloudsearch.cf sshd[19375]: Failed password for root from 222.186.169.192 port 45656 ssh2
2020-03-13T21:37:25.501394dmca.cloudsearch.cf sshd[19375]: Failed password for root from 222.186.169.192 port 45656 ssh2
2020-03-13T21:37:20.769399dmca.cloudsearch.cf sshd[19375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.192  user
...
2020-03-14 05:41:40
222.186.175.220 attackspam
2020-03-13T21:39:04.902360abusebot-7.cloudsearch.cf sshd[5885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
2020-03-13T21:39:06.725180abusebot-7.cloudsearch.cf sshd[5885]: Failed password for root from 222.186.175.220 port 5780 ssh2
2020-03-13T21:39:10.192005abusebot-7.cloudsearch.cf sshd[5885]: Failed password for root from 222.186.175.220 port 5780 ssh2
2020-03-13T21:39:04.902360abusebot-7.cloudsearch.cf sshd[5885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
2020-03-13T21:39:06.725180abusebot-7.cloudsearch.cf sshd[5885]: Failed password for root from 222.186.175.220 port 5780 ssh2
2020-03-13T21:39:10.192005abusebot-7.cloudsearch.cf sshd[5885]: Failed password for root from 222.186.175.220 port 5780 ssh2
2020-03-13T21:39:04.902360abusebot-7.cloudsearch.cf sshd[5885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh rus
...
2020-03-14 05:47:40
110.49.26.106 attackbots
Automatic report - XMLRPC Attack
2020-03-14 05:54:13
203.99.62.158 attackbots
Mar 13 22:28:50 eventyay sshd[24955]: Failed password for root from 203.99.62.158 port 10325 ssh2
Mar 13 22:32:56 eventyay sshd[25010]: Failed password for root from 203.99.62.158 port 42063 ssh2
Mar 13 22:37:03 eventyay sshd[25063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158
...
2020-03-14 05:49:24
107.170.233.150 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-03-14 05:16:42
77.54.17.174 attack
Automatic report - Port Scan Attack
2020-03-14 05:21:16

最近上报的IP列表

125.197.218.192 125.209.80.6 125.211.151.79 125.212.159.16
125.212.157.162 125.212.158.178 125.212.159.230 125.212.169.30
125.212.224.208 125.212.207.49 125.212.241.179 125.22.1.154
125.224.148.186 125.224.149.239 125.228.193.28 125.228.176.244
125.228.215.177 125.227.109.240 125.228.61.38 125.228.73.134