必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.203.154.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.203.154.214.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 00:36:13 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
214.154.203.125.in-addr.arpa domain name pointer i125-203-154-214.s99.a049.ap.plala.or.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.154.203.125.in-addr.arpa	name = i125-203-154-214.s99.a049.ap.plala.or.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
190.13.145.60 attack
Mar 19 15:21:23 Invalid user teamspeak from 190.13.145.60 port 52556
2020-03-20 01:19:54
185.58.226.235 attack
Invalid user Ronald from 185.58.226.235 port 54744
2020-03-20 01:22:36
61.79.50.231 attackbots
Mar 19 16:03:05 sso sshd[19965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.79.50.231
Mar 19 16:03:07 sso sshd[19965]: Failed password for invalid user michelle from 61.79.50.231 port 36144 ssh2
...
2020-03-20 01:50:30
170.83.209.169 attackspambots
Unauthorized connection attempt from IP address 170.83.209.169 on Port 445(SMB)
2020-03-20 01:31:34
176.128.229.173 attack
Mar 19 12:55:32 web8 sshd\[27002\]: Invalid user gzw from 176.128.229.173
Mar 19 12:55:32 web8 sshd\[27002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.128.229.173
Mar 19 12:55:34 web8 sshd\[27002\]: Failed password for invalid user gzw from 176.128.229.173 port 52996 ssh2
Mar 19 13:00:13 web8 sshd\[29364\]: Invalid user ubuntu from 176.128.229.173
Mar 19 13:00:13 web8 sshd\[29364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.128.229.173
2020-03-20 01:52:36
5.188.206.138 attackbotsspam
Mar 18 18:36:28 dev sshd\[4056\]: Bad protocol version identification '\003' from 5.188.206.138 port 1308
Mar 18 18:36:28 dev sshd\[4061\]: Bad protocol version identification '\003' from 5.188.206.138 port 1669
...
2020-03-20 01:54:35
45.115.62.130 attackbotsspam
Mar 19 20:38:56 hosting sshd[20802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.115.62.130  user=root
Mar 19 20:38:58 hosting sshd[20802]: Failed password for root from 45.115.62.130 port 37216 ssh2
...
2020-03-20 01:50:54
36.69.218.125 attackbots
Unauthorized connection attempt from IP address 36.69.218.125 on Port 445(SMB)
2020-03-20 01:21:15
122.202.48.251 attackspam
Mar 19 10:57:05 firewall sshd[30877]: Invalid user stserver from 122.202.48.251
Mar 19 10:57:07 firewall sshd[30877]: Failed password for invalid user stserver from 122.202.48.251 port 51326 ssh2
Mar 19 11:05:44 firewall sshd[31397]: Invalid user jiayuanyang from 122.202.48.251
...
2020-03-20 01:59:15
109.164.120.40 attack
Chat Spam
2020-03-20 01:28:41
168.228.188.22 attackspam
Mar 19 17:41:35 nextcloud sshd\[24569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.228.188.22  user=root
Mar 19 17:41:38 nextcloud sshd\[24569\]: Failed password for root from 168.228.188.22 port 36827 ssh2
Mar 19 17:45:41 nextcloud sshd\[27651\]: Invalid user oracle from 168.228.188.22
Mar 19 17:45:41 nextcloud sshd\[27651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.228.188.22
2020-03-20 01:40:36
175.123.253.220 attackspambots
frenzy
2020-03-20 01:34:08
1.4.221.131 attackspam
Unauthorized connection attempt from IP address 1.4.221.131 on Port 445(SMB)
2020-03-20 01:37:53
142.93.127.16 attack
Mar 19 17:35:03 l03 sshd[3443]: Invalid user ubuntu from 142.93.127.16 port 46744
...
2020-03-20 01:41:34
111.65.71.3 attackspam
Unauthorized connection attempt from IP address 111.65.71.3 on Port 445(SMB)
2020-03-20 01:55:06

最近上报的IP列表

204.230.209.121 15.84.143.160 138.32.38.196 106.244.103.234
166.215.143.149 237.172.96.97 6.210.221.8 32.20.224.81
75.48.231.54 55.3.27.142 166.47.193.198 210.14.254.82
89.118.61.214 148.87.243.121 109.235.234.53 144.21.16.57
49.241.204.240 201.36.253.124 121.173.86.186 23.165.137.16