必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.21.131.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58772
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.21.131.242.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 04:06:41 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 242.131.21.125.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.131.21.125.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
36.75.195.66 attackbots
19/10/23@23:46:24: FAIL: Alarm-Intrusion address from=36.75.195.66
...
2019-10-24 18:19:50
209.126.103.35 attackspam
Oct 24 07:50:21 MK-Soft-VM4 sshd[663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.126.103.35 
Oct 24 07:50:23 MK-Soft-VM4 sshd[663]: Failed password for invalid user test123 from 209.126.103.35 port 58230 ssh2
...
2019-10-24 18:06:47
145.239.116.170 attackbotsspam
Oct 24 05:13:14 rb06 sshd[1596]: Failed password for invalid user train from 145.239.116.170 port 60848 ssh2
Oct 24 05:13:14 rb06 sshd[1596]: Received disconnect from 145.239.116.170: 11: Bye Bye [preauth]
Oct 24 05:24:13 rb06 sshd[11453]: Failed password for r.r from 145.239.116.170 port 37788 ssh2
Oct 24 05:24:13 rb06 sshd[11453]: Received disconnect from 145.239.116.170: 11: Bye Bye [preauth]
Oct 24 05:27:44 rb06 sshd[8322]: Failed password for r.r from 145.239.116.170 port 49304 ssh2
Oct 24 05:27:44 rb06 sshd[8322]: Received disconnect from 145.239.116.170: 11: Bye Bye [preauth]
Oct 24 05:31:08 rb06 sshd[8651]: Failed password for invalid user 123 from 145.239.116.170 port 60834 ssh2
Oct 24 05:31:08 rb06 sshd[8651]: Received disconnect from 145.239.116.170: 11: Bye Bye [preauth]
Oct 24 05:34:34 rb06 sshd[17609]: Failed password for invalid user password from 145.239.116.170 port 44102 ssh2
Oct 24 05:34:34 rb06 sshd[17609]: Received disconnect from 145.239.116.170: 1........
-------------------------------
2019-10-24 18:29:25
106.54.213.7 attackbots
Oct 24 12:59:19 www sshd\[43609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.213.7  user=root
Oct 24 12:59:21 www sshd\[43609\]: Failed password for root from 106.54.213.7 port 56580 ssh2
Oct 24 13:04:05 www sshd\[43633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.213.7  user=root
...
2019-10-24 18:23:29
94.176.77.55 attackspam
(Oct 24)  LEN=40 TTL=244 ID=34819 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 24)  LEN=40 TTL=244 ID=16461 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 24)  LEN=40 TTL=244 ID=25750 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 24)  LEN=40 TTL=244 ID=58796 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 24)  LEN=40 TTL=244 ID=46331 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 24)  LEN=40 TTL=244 ID=38184 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 24)  LEN=40 TTL=244 ID=23679 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 24)  LEN=40 TTL=244 ID=58726 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 23)  LEN=40 TTL=244 ID=60197 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 23)  LEN=40 TTL=244 ID=29498 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 23)  LEN=40 TTL=244 ID=51131 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 23)  LEN=40 TTL=244 ID=52266 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 23)  LEN=40 TTL=244 ID=9888 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 23)  LEN=40 TTL=244 ID=45270 DF TCP DPT=23 WINDOW=14600 SYN 
 (Oct 23)  LEN=40 TTL=244 ID=37679 DF TCP DPT=23 WINDOW=14600 S...
2019-10-24 18:21:25
168.61.176.121 attackbots
Oct 24 11:42:37 v22019058497090703 sshd[28106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.176.121
Oct 24 11:42:39 v22019058497090703 sshd[28106]: Failed password for invalid user nrpe from 168.61.176.121 port 55146 ssh2
Oct 24 11:50:12 v22019058497090703 sshd[28655]: Failed password for root from 168.61.176.121 port 39152 ssh2
...
2019-10-24 18:35:09
167.114.152.139 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/167.114.152.139/ 
 
 FR - 1H : (55)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : FR 
 NAME ASN : ASN16276 
 
 IP : 167.114.152.139 
 
 CIDR : 167.114.128.0/18 
 
 PREFIX COUNT : 132 
 
 UNIQUE IP COUNT : 3052544 
 
 
 ATTACKS DETECTED ASN16276 :  
  1H - 2 
  3H - 3 
  6H - 8 
 12H - 12 
 24H - 37 
 
 DateTime : 2019-10-24 12:22:34 
 
 INFO : Port SSH 22 Scan Detected and Blocked by ADMIN  - data recovery
2019-10-24 18:24:57
151.231.26.177 attackbots
Automatic report - Banned IP Access
2019-10-24 18:07:46
182.61.43.47 attackspam
Oct 24 07:03:51 www sshd\[39217\]: Failed password for root from 182.61.43.47 port 44172 ssh2Oct 24 07:08:16 www sshd\[39269\]: Invalid user jinhan from 182.61.43.47Oct 24 07:08:18 www sshd\[39269\]: Failed password for invalid user jinhan from 182.61.43.47 port 52324 ssh2
...
2019-10-24 18:22:54
134.175.154.22 attackspambots
2019-10-24T05:32:17.790846abusebot-2.cloudsearch.cf sshd\[13392\]: Invalid user water from 134.175.154.22 port 46590
2019-10-24 18:06:08
117.50.71.169 attack
Oct 24 07:03:09 www5 sshd\[23483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.71.169  user=root
Oct 24 07:03:11 www5 sshd\[23483\]: Failed password for root from 117.50.71.169 port 33726 ssh2
Oct 24 07:08:01 www5 sshd\[24251\]: Invalid user stupid from 117.50.71.169
Oct 24 07:08:01 www5 sshd\[24251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.71.169
...
2019-10-24 18:20:20
176.120.37.181 attack
postfix
2019-10-24 18:21:12
106.13.10.159 attackspambots
Oct 24 12:19:01 v22018076622670303 sshd\[5600\]: Invalid user ervisor from 106.13.10.159 port 51520
Oct 24 12:19:01 v22018076622670303 sshd\[5600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.10.159
Oct 24 12:19:03 v22018076622670303 sshd\[5600\]: Failed password for invalid user ervisor from 106.13.10.159 port 51520 ssh2
...
2019-10-24 18:38:12
23.83.230.2 attackspam
Automatic report - XMLRPC Attack
2019-10-24 18:03:46
107.155.49.126 attack
Oct 24 10:15:30 thevastnessof sshd[14825]: Failed password for root from 107.155.49.126 port 39446 ssh2
...
2019-10-24 18:24:13

最近上报的IP列表

18.242.104.254 149.193.175.227 3.196.188.121 83.165.17.148
20.123.166.20 94.121.26.71 69.249.125.180 245.2.161.241
30.12.216.214 179.108.153.143 206.147.2.154 176.40.144.43
223.237.201.79 81.174.109.66 95.173.42.183 22.255.58.106
55.183.91.164 4.245.168.65 119.7.21.98 114.157.173.242