必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.40.139.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.40.139.131.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:01:35 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
131.139.40.125.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
131.139.40.125.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
128.199.110.156 attackbotsspam
128.199.110.156 has been banned for [WebApp Attack]
...
2020-01-16 13:57:11
77.122.33.18 attack
"Fail2Ban detected SSH brute force attempt"
2020-01-16 13:49:25
46.38.144.57 attackbotsspam
2020-01-16T06:05:40.320865beta postfix/smtpd[24634]: warning: unknown[46.38.144.57]: SASL LOGIN authentication failed: authentication failure
2020-01-16T06:06:27.608759beta postfix/smtpd[24637]: warning: unknown[46.38.144.57]: SASL LOGIN authentication failed: authentication failure
2020-01-16T06:07:14.375931beta postfix/smtpd[24637]: warning: unknown[46.38.144.57]: SASL LOGIN authentication failed: authentication failure
...
2020-01-16 14:09:17
202.80.214.80 attack
Invalid user admin from 202.80.214.80 port 27187
2020-01-16 14:14:28
49.235.62.222 attackspambots
Unauthorized connection attempt detected from IP address 49.235.62.222 to port 2220 [J]
2020-01-16 14:12:30
42.114.35.249 attack
20/1/15@23:54:20: FAIL: Alarm-Network address from=42.114.35.249
20/1/15@23:54:20: FAIL: Alarm-Network address from=42.114.35.249
...
2020-01-16 14:06:28
222.186.175.202 attackbotsspam
Jan 16 00:48:57 linuxvps sshd\[5162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
Jan 16 00:48:59 linuxvps sshd\[5162\]: Failed password for root from 222.186.175.202 port 21906 ssh2
Jan 16 00:49:02 linuxvps sshd\[5162\]: Failed password for root from 222.186.175.202 port 21906 ssh2
Jan 16 00:49:05 linuxvps sshd\[5162\]: Failed password for root from 222.186.175.202 port 21906 ssh2
Jan 16 00:49:15 linuxvps sshd\[5393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2020-01-16 13:51:58
79.41.52.60 attackbots
Automatic report - Port Scan Attack
2020-01-16 13:47:15
92.53.65.40 attackspam
01/15/2020-23:54:48.384020 92.53.65.40 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-16 13:52:19
162.243.78.241 attackspambots
162.243.78.241 - - \[16/Jan/2020:05:53:56 +0100\] "POST /wp-login.php HTTP/1.0" 200 7085 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
162.243.78.241 - - \[16/Jan/2020:05:53:58 +0100\] "POST /wp-login.php HTTP/1.0" 200 7097 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
162.243.78.241 - - \[16/Jan/2020:05:53:59 +0100\] "POST /wp-login.php HTTP/1.0" 200 7089 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-16 14:16:42
217.21.193.74 attackspambots
*Port Scan* detected from 217.21.193.74 (NL/Netherlands/ip-space-by.osso.nl). 4 hits in the last 285 seconds
2020-01-16 13:36:36
119.123.100.85 attack
Unauthorized connection attempt detected from IP address 119.123.100.85 to port 2220 [J]
2020-01-16 14:07:14
124.204.51.162 attack
Jan 16 00:18:10 ny01 sshd[9218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.51.162
Jan 16 00:18:13 ny01 sshd[9218]: Failed password for invalid user antonio from 124.204.51.162 port 43132 ssh2
Jan 16 00:20:56 ny01 sshd[9519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.51.162
2020-01-16 13:42:06
202.137.155.47 attackbots
SMTP-sasl brute force
...
2020-01-16 14:03:13
148.0.35.0 attackbotsspam
Jan 15 20:49:58 mail sshd[17894]: reveeclipse mapping checking getaddrinfo for 0.35.0.148.d.dyn.claro.net.do [148.0.35.0] failed - POSSIBLE BREAK-IN ATTEMPT!
Jan 15 20:50:00 mail sshd[17894]: Failed password for invalid user ftpuser from 148.0.35.0 port 38485 ssh2
Jan 15 20:50:00 mail sshd[17894]: Received disconnect from 148.0.35.0: 11: Bye Bye [preauth]
Jan 15 20:54:11 mail sshd[18676]: reveeclipse mapping checking getaddrinfo for 0.35.0.148.d.dyn.claro.net.do [148.0.35.0] failed - POSSIBLE BREAK-IN ATTEMPT!


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=148.0.35.0
2020-01-16 14:02:39

最近上报的IP列表

125.40.123.123 125.40.139.70 125.40.145.109 118.136.10.146
125.40.145.123 125.40.145.204 125.40.145.17 125.40.146.51
125.40.146.171 125.40.146.64 125.40.147.240 125.40.147.186
125.40.150.152 125.40.150.218 125.40.150.206 125.40.151.165
118.136.10.150 125.40.152.151 125.40.153.108 125.40.153.156