必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Macau

运营商(isp): CTM

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
类型 评论内容 时间
attackbotsspam
Unauthorized connection attempt detected from IP address 125.31.26.139 to port 80 [J]
2020-03-03 02:47:35
相同子网IP讨论:
IP 类型 评论内容 时间
125.31.26.49 attack
The IP has triggered Cloudflare WAF. CF-Ray: 541566c52a97b01a | WAF_Rule_ID: 53b8357af6d244d3a132bcf913c3a388 | WAF_Kind: firewall | CF_Action: drop | Country: MO | CF_IPClass: noRecord | Protocol: HTTP/2 | Method: GET | Host: d.skk.moe | User-Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.94 Safari/537.36 | CF_DC: MFM. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2019-12-08 03:12:22
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.31.26.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42556
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.31.26.139.			IN	A

;; AUTHORITY SECTION:
.			380	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020600 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 17:06:41 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
139.26.31.125.in-addr.arpa domain name pointer n12531z26l139.static.ctmip.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.26.31.125.in-addr.arpa	name = n12531z26l139.static.ctmip.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.35.182.38 attack
RU bad_bot
2019-11-18 19:25:59
221.4.137.85 attackbots
Autoban   221.4.137.85 ABORTED AUTH
2019-11-18 19:16:59
103.23.102.245 attackspam
Autoban   103.23.102.245 AUTH/CONNECT
2019-11-18 19:11:42
218.22.235.138 attack
Autoban   218.22.235.138 ABORTED AUTH
2019-11-18 19:39:42
218.23.26.50 attackspam
Autoban   218.23.26.50 ABORTED AUTH
2019-11-18 19:37:53
115.42.123.50 attack
Telnetd brute force attack detected by fail2ban
2019-11-18 19:34:50
220.189.235.126 attackbots
Autoban   220.189.235.126 ABORTED AUTH
2019-11-18 19:22:37
103.219.187.56 attack
Autoban   103.219.187.56 AUTH/CONNECT
2019-11-18 19:24:00
37.255.193.70 attackspambots
Autoban   37.255.193.70 ABORTED AUTH
2019-11-18 19:03:39
31.13.227.4 attackspambots
Autoban   31.13.227.4 ABORTED AUTH
2019-11-18 19:05:00
218.76.255.16 attackbots
Autoban   218.76.255.16 ABORTED AUTH
2019-11-18 19:29:10
77.127.11.214 attackbotsspam
TCP Port Scanning
2019-11-18 19:41:21
103.232.228.107 attack
Autoban   103.232.228.107 AUTH/CONNECT
2019-11-18 19:06:03
103.212.211.4 attackbotsspam
Autoban   103.212.211.4 AUTH/CONNECT
2019-11-18 19:33:45
103.231.92.109 attackspambots
Autoban   103.231.92.109 AUTH/CONNECT
2019-11-18 19:09:19

最近上报的IP列表

223.16.235.57 119.193.219.2 118.71.82.2 118.69.182.3
118.48.211.1 109.213.11.153 118.25.55.1 37.210.219.163
76.115.182.123 253.215.200.229 91.239.165.158 207.20.65.81
118.25.11.2 80.6.135.125 200.104.134.119 46.163.11.210
106.248.228.114 172.157.235.183 208.5.91.83 96.36.239.223