必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Nagasaki

省份(region): Nagasaki

国家(country): Japan

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): QTnet,Inc.

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.31.125.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7839
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.31.125.12.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 19 20:50:53 CST 2019
;; MSG SIZE  rcvd: 117

HOST信息:
12.125.31.125.in-addr.arpa domain name pointer 125-31-125-12.ppp.bbiq.jp.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
12.125.31.125.in-addr.arpa	name = 125-31-125-12.ppp.bbiq.jp.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
61.175.194.90 attackbots
2019-12-26T06:21:50.563696shield sshd\[20255\]: Invalid user yang from 61.175.194.90 port 54316
2019-12-26T06:21:50.569314shield sshd\[20255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.194.90
2019-12-26T06:21:52.733246shield sshd\[20255\]: Failed password for invalid user yang from 61.175.194.90 port 54316 ssh2
2019-12-26T06:24:20.182397shield sshd\[21399\]: Invalid user guest from 61.175.194.90 port 44302
2019-12-26T06:24:20.188044shield sshd\[21399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.194.90
2019-12-26 18:52:49
2.185.144.172 attackspambots
Unauthorized connection attempt detected from IP address 2.185.144.172 to port 445
2019-12-26 18:41:53
185.56.153.229 attackbots
$f2bV_matches
2019-12-26 18:38:16
46.101.94.240 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-12-26 19:08:21
113.161.60.13 attackspambots
[ThuDec2607:23:32.4521652019][:error][pid12668:tid47392699787008][client113.161.60.13:33688][client113.161.60.13]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"402"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(DisableifyouwanttoallowMSIE6\)"][severity"WARNING"][hostname"pepperdreams.ch"][uri"/"][unique_id"XgRR5MK7O96T9YE1@LEMjgAAAAc"][ThuDec2607:23:35.1927212019][:error][pid12901:tid47392697685760][client113.161.60.13:33698][client113.161.60.13]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"402"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(Disableif
2019-12-26 19:18:20
91.121.110.97 attack
Dec 26 08:36:10 silence02 sshd[29719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.97
Dec 26 08:36:12 silence02 sshd[29719]: Failed password for invalid user 123456 from 91.121.110.97 port 35158 ssh2
Dec 26 08:38:08 silence02 sshd[29781]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.110.97
2019-12-26 18:51:42
89.248.168.217 attackbotsspam
firewall-block, port(s): 1068/udp, 1083/udp, 1101/udp, 1284/udp
2019-12-26 19:14:27
222.186.173.215 attackbotsspam
Dec 26 11:31:35 nextcloud sshd\[31610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Dec 26 11:31:37 nextcloud sshd\[31610\]: Failed password for root from 222.186.173.215 port 5260 ssh2
Dec 26 11:31:40 nextcloud sshd\[31610\]: Failed password for root from 222.186.173.215 port 5260 ssh2
...
2019-12-26 18:36:56
77.247.108.241 attackbotsspam
Dec 26 12:05:35 debian-2gb-nbg1-2 kernel: \[1011064.791620\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.247.108.241 DST=195.201.40.59 LEN=438 TOS=0x00 PREC=0x00 TTL=51 ID=0 DF PROTO=UDP SPT=5090 DPT=5060 LEN=418
2019-12-26 19:11:23
200.86.228.10 attackspam
Dec 26 10:47:40 vmd17057 sshd\[12138\]: Invalid user webadmin from 200.86.228.10 port 39481
Dec 26 10:47:40 vmd17057 sshd\[12138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.86.228.10
Dec 26 10:47:41 vmd17057 sshd\[12138\]: Failed password for invalid user webadmin from 200.86.228.10 port 39481 ssh2
...
2019-12-26 19:09:22
1.58.22.201 attackbotsspam
FTP Brute Force
2019-12-26 19:12:36
66.112.216.105 attack
Dec 26 09:06:44 localhost sshd\[9016\]: Invalid user hardcore from 66.112.216.105 port 42384
Dec 26 09:06:44 localhost sshd\[9016\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.112.216.105
Dec 26 09:06:46 localhost sshd\[9016\]: Failed password for invalid user hardcore from 66.112.216.105 port 42384 ssh2
2019-12-26 18:39:34
142.44.162.120 attack
Dec 26 09:54:29 localhost sshd[30264]: Failed password for invalid user seefeld from 142.44.162.120 port 60496 ssh2
Dec 26 10:08:08 localhost sshd[30783]: Failed password for invalid user djmax from 142.44.162.120 port 33788 ssh2
Dec 26 10:10:43 localhost sshd[30930]: Failed password for invalid user www from 142.44.162.120 port 33684 ssh2
2019-12-26 18:59:48
113.251.37.54 attackbotsspam
FTP Brute Force
2019-12-26 19:05:01
51.38.128.30 attackbotsspam
Dec 26 08:30:16 localhost sshd\[2122\]: Invalid user rpm from 51.38.128.30 port 49926
Dec 26 08:30:16 localhost sshd\[2122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.128.30
Dec 26 08:30:18 localhost sshd\[2122\]: Failed password for invalid user rpm from 51.38.128.30 port 49926 ssh2
2019-12-26 19:18:51

最近上报的IP列表

90.227.209.189 64.2.12.150 135.115.28.170 213.40.67.7
208.38.160.140 83.121.179.242 210.153.91.179 182.75.44.75
100.146.93.89 79.10.11.244 177.174.229.252 201.61.163.150
185.40.5.135 176.9.57.119 132.48.179.124 206.253.79.75
77.184.91.154 17.243.162.100 139.142.55.50 138.130.16.38