必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Taiwan, China

运营商(isp): Chunghwa Telecom Co. Ltd.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackspambots
1596801768 - 08/07/2020 14:02:48 Host: 125.231.141.66/125.231.141.66 Port: 445 TCP Blocked
2020-08-08 01:49:42
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.231.141.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25384
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.231.141.66.			IN	A

;; AUTHORITY SECTION:
.			552	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080701 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Aug 08 01:49:30 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
66.141.231.125.in-addr.arpa domain name pointer 125-231-141-66.dynamic-ip.hinet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
66.141.231.125.in-addr.arpa	name = 125-231-141-66.dynamic-ip.hinet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.84.213.159 attackbots
Oct 18 19:42:47 areeb-Workstation sshd[29383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.84.213.159
Oct 18 19:42:49 areeb-Workstation sshd[29383]: Failed password for invalid user vp from 49.84.213.159 port 54214 ssh2
...
2019-10-18 22:14:13
201.208.40.64 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/201.208.40.64/ 
 VE - 1H : (27)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : VE 
 NAME ASN : ASN8048 
 
 IP : 201.208.40.64 
 
 CIDR : 201.208.32.0/19 
 
 PREFIX COUNT : 467 
 
 UNIQUE IP COUNT : 2731520 
 
 
 WYKRYTE ATAKI Z ASN8048 :  
  1H - 1 
  3H - 5 
  6H - 7 
 12H - 13 
 24H - 24 
 
 DateTime : 2019-10-18 13:42:39 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-18 21:48:05
222.186.175.169 attackbots
Oct 18 16:03:20 minden010 sshd[26264]: Failed password for root from 222.186.175.169 port 51362 ssh2
Oct 18 16:03:38 minden010 sshd[26264]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 51362 ssh2 [preauth]
Oct 18 16:03:49 minden010 sshd[26681]: Failed password for root from 222.186.175.169 port 3590 ssh2
...
2019-10-18 22:10:43
216.14.66.150 attackspam
Oct 18 13:42:18 vserver sshd\[18811\]: Failed password for root from 216.14.66.150 port 55872 ssh2Oct 18 13:42:20 vserver sshd\[18811\]: Failed password for root from 216.14.66.150 port 55872 ssh2Oct 18 13:42:23 vserver sshd\[18811\]: Failed password for root from 216.14.66.150 port 55872 ssh2Oct 18 13:42:24 vserver sshd\[18811\]: Failed password for root from 216.14.66.150 port 55872 ssh2
...
2019-10-18 21:59:00
176.10.99.200 attackspambots
Unauthorized access detected from banned ip
2019-10-18 21:39:06
49.72.65.238 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/49.72.65.238/ 
 CN - 1H : (501)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 49.72.65.238 
 
 CIDR : 49.72.64.0/19 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 WYKRYTE ATAKI Z ASN4134 :  
  1H - 5 
  3H - 23 
  6H - 49 
 12H - 91 
 24H - 176 
 
 DateTime : 2019-10-18 13:42:57 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-18 21:34:51
222.186.173.142 attackspambots
Oct 18 15:48:40 nextcloud sshd\[29660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Oct 18 15:48:42 nextcloud sshd\[29660\]: Failed password for root from 222.186.173.142 port 46964 ssh2
Oct 18 15:49:01 nextcloud sshd\[29660\]: Failed password for root from 222.186.173.142 port 46964 ssh2
...
2019-10-18 21:52:30
83.23.31.85 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/83.23.31.85/ 
 PL - 1H : (149)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PL 
 NAME ASN : ASN5617 
 
 IP : 83.23.31.85 
 
 CIDR : 83.20.0.0/14 
 
 PREFIX COUNT : 183 
 
 UNIQUE IP COUNT : 5363456 
 
 
 WYKRYTE ATAKI Z ASN5617 :  
  1H - 2 
  3H - 8 
  6H - 14 
 12H - 26 
 24H - 64 
 
 DateTime : 2019-10-18 13:42:57 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-18 21:35:55
222.186.180.223 attackspambots
Oct 18 16:31:24 server sshd\[7676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.223  user=root
Oct 18 16:31:26 server sshd\[7676\]: Failed password for root from 222.186.180.223 port 49496 ssh2
Oct 18 16:31:30 server sshd\[7676\]: Failed password for root from 222.186.180.223 port 49496 ssh2
Oct 18 16:31:34 server sshd\[7676\]: Failed password for root from 222.186.180.223 port 49496 ssh2
Oct 18 16:31:38 server sshd\[7676\]: Failed password for root from 222.186.180.223 port 49496 ssh2
...
2019-10-18 21:38:33
222.186.180.8 attackbots
2019-10-18T13:45:34.792828abusebot-5.cloudsearch.cf sshd\[20730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.8  user=root
2019-10-18 21:55:27
74.208.94.213 attack
Invalid user test from 74.208.94.213 port 49614
2019-10-18 22:01:24
104.248.205.67 attackspam
Oct 18 15:16:19 localhost sshd\[25194\]: Invalid user mafalda from 104.248.205.67 port 50976
Oct 18 15:16:19 localhost sshd\[25194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67
Oct 18 15:16:22 localhost sshd\[25194\]: Failed password for invalid user mafalda from 104.248.205.67 port 50976 ssh2
2019-10-18 22:13:03
45.116.251.190 attackbots
45.116.251.190 - - [18/Oct/2019:07:42:42 -0400] "GET /?page=..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00&action=view&manufacturerID=143&productID=9300&linkID=7489&duplicate=0 HTTP/1.1" 200 16775 "https://exitdevice.com/?page=..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00&action=view&manufacturerID=143&productID=9300&linkID=7489&duplicate=0" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-10-18 21:39:37
130.61.51.92 attack
Oct 18 16:34:57 sauna sshd[43859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.51.92
Oct 18 16:34:59 sauna sshd[43859]: Failed password for invalid user abc123456 from 130.61.51.92 port 37056 ssh2
...
2019-10-18 21:38:06
185.220.102.4 attackbots
Oct 18 15:33:12 rotator sshd\[672\]: Failed password for root from 185.220.102.4 port 39179 ssh2Oct 18 15:33:14 rotator sshd\[672\]: Failed password for root from 185.220.102.4 port 39179 ssh2Oct 18 15:33:17 rotator sshd\[672\]: Failed password for root from 185.220.102.4 port 39179 ssh2Oct 18 15:33:19 rotator sshd\[672\]: Failed password for root from 185.220.102.4 port 39179 ssh2Oct 18 15:33:22 rotator sshd\[672\]: Failed password for root from 185.220.102.4 port 39179 ssh2Oct 18 15:33:24 rotator sshd\[672\]: Failed password for root from 185.220.102.4 port 39179 ssh2
...
2019-10-18 21:43:56

最近上报的IP列表

49.205.252.200 37.229.255.192 189.212.114.125 110.167.20.47
62.210.11.219 103.151.77.202 45.114.169.18 46.138.39.212
202.163.101.10 139.124.214.255 106.12.106.221 183.88.17.19
176.222.157.113 60.247.127.220 76.79.221.130 60.53.214.204
163.44.197.189 138.68.245.152 103.140.105.62 175.138.212.75