必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.28.216.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.28.216.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 06:38:38 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
142.216.28.125.in-addr.arpa domain name pointer KD125028216142.ppp-bb.dion.ne.jp.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.216.28.125.in-addr.arpa	name = KD125028216142.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
13.72.79.240 attack
SSH / Telnet Brute Force Attempts on Honeypot
2020-07-16 07:58:45
106.12.87.159 attack
Automatic Fail2ban report - Trying login SSH
2020-07-16 07:40:44
51.38.134.204 attackbots
Jul 16 00:06:24 mellenthin sshd[30090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.134.204
Jul 16 00:06:26 mellenthin sshd[30090]: Failed password for invalid user boy from 51.38.134.204 port 49114 ssh2
2020-07-16 07:42:43
52.249.187.121 attackspambots
$f2bV_matches
2020-07-16 07:29:42
98.234.87.116 attack
20 attempts against mh-ssh on river
2020-07-16 07:31:44
52.249.195.72 attackspambots
Invalid user admin from 52.249.195.72 port 1564
2020-07-16 07:29:01
107.13.186.21 attackspambots
2020-07-15T22:14:13.291212abusebot-3.cloudsearch.cf sshd[30580]: Invalid user user3 from 107.13.186.21 port 58360
2020-07-15T22:14:13.295722abusebot-3.cloudsearch.cf sshd[30580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.13.186.21
2020-07-15T22:14:13.291212abusebot-3.cloudsearch.cf sshd[30580]: Invalid user user3 from 107.13.186.21 port 58360
2020-07-15T22:14:15.998848abusebot-3.cloudsearch.cf sshd[30580]: Failed password for invalid user user3 from 107.13.186.21 port 58360 ssh2
2020-07-15T22:18:08.517155abusebot-3.cloudsearch.cf sshd[30593]: Invalid user ava from 107.13.186.21 port 47100
2020-07-15T22:18:08.523715abusebot-3.cloudsearch.cf sshd[30593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.13.186.21
2020-07-15T22:18:08.517155abusebot-3.cloudsearch.cf sshd[30593]: Invalid user ava from 107.13.186.21 port 47100
2020-07-15T22:18:10.489055abusebot-3.cloudsearch.cf sshd[30593]: Failed pas
...
2020-07-16 07:40:31
212.83.183.57 attackspam
SSH Login Bruteforce
2020-07-16 07:37:50
52.230.18.21 attack
Jul 15 23:15:28 ssh2 sshd[88958]: User root from 52.230.18.21 not allowed because not listed in AllowUsers
Jul 15 23:15:28 ssh2 sshd[88958]: Failed password for invalid user root from 52.230.18.21 port 28070 ssh2
Jul 15 23:15:28 ssh2 sshd[88958]: Disconnected from invalid user root 52.230.18.21 port 28070 [preauth]
...
2020-07-16 07:57:57
79.227.28.5 attack
Jul 16 01:11:17 jane sshd[20197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.227.28.5 
Jul 16 01:11:19 jane sshd[20197]: Failed password for invalid user manjaro from 79.227.28.5 port 49263 ssh2
...
2020-07-16 07:27:57
52.244.70.121 attackspambots
Jul 16 01:28:50 db sshd[8466]: User root from 52.244.70.121 not allowed because none of user's groups are listed in AllowGroups
...
2020-07-16 07:36:35
147.135.132.179 attackspam
Jul 16 01:09:55 santamaria sshd\[26462\]: Invalid user finance from 147.135.132.179
Jul 16 01:09:55 santamaria sshd\[26462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.132.179
Jul 16 01:09:57 santamaria sshd\[26462\]: Failed password for invalid user finance from 147.135.132.179 port 45870 ssh2
...
2020-07-16 07:47:11
112.220.29.100 attack
Jul 15 23:20:44 game-panel sshd[22139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.29.100
Jul 15 23:20:45 game-panel sshd[22139]: Failed password for invalid user zf from 112.220.29.100 port 39230 ssh2
Jul 15 23:24:43 game-panel sshd[22365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.220.29.100
2020-07-16 07:24:59
111.229.199.67 attackspambots
2020-07-15T17:50:36.5035501495-001 sshd[58731]: Invalid user students from 111.229.199.67 port 41282
2020-07-15T17:50:38.0195391495-001 sshd[58731]: Failed password for invalid user students from 111.229.199.67 port 41282 ssh2
2020-07-15T18:04:25.2095201495-001 sshd[59543]: Invalid user o from 111.229.199.67 port 57862
2020-07-15T18:04:25.2166821495-001 sshd[59543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.199.67
2020-07-15T18:04:25.2095201495-001 sshd[59543]: Invalid user o from 111.229.199.67 port 57862
2020-07-15T18:04:26.8661071495-001 sshd[59543]: Failed password for invalid user o from 111.229.199.67 port 57862 ssh2
...
2020-07-16 07:25:29
188.254.0.183 attackspam
Jul 16 01:34:03 lnxded63 sshd[6678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.183
Jul 16 01:34:05 lnxded63 sshd[6678]: Failed password for invalid user testuser from 188.254.0.183 port 43268 ssh2
Jul 16 01:40:44 lnxded63 sshd[7452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.183
2020-07-16 07:49:27

最近上报的IP列表

162.93.143.9 62.128.44.62 201.173.1.104 220.157.36.77
29.215.179.99 141.81.172.195 33.124.116.29 67.103.94.158
250.178.226.220 71.153.212.61 127.17.93.248 205.192.71.113
216.213.19.58 8.179.221.149 144.176.254.233 48.245.61.99
242.180.184.164 226.72.47.79 32.117.224.28 65.42.116.169