必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.42.74.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53205
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.42.74.120.			IN	A

;; AUTHORITY SECTION:
.			543	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 06:18:13 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
120.74.42.125.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
120.74.42.125.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.69.222.169 attackbots
Feb  4 11:22:07 auw2 sshd\[10388\]: Invalid user ident from 195.69.222.169
Feb  4 11:22:07 auw2 sshd\[10388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.69.222.169
Feb  4 11:22:09 auw2 sshd\[10388\]: Failed password for invalid user ident from 195.69.222.169 port 34376 ssh2
Feb  4 11:25:22 auw2 sshd\[10695\]: Invalid user oracle9 from 195.69.222.169
Feb  4 11:25:22 auw2 sshd\[10695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.69.222.169
2020-02-05 05:40:30
218.92.0.172 attackspambots
Unauthorized connection attempt detected from IP address 218.92.0.172 to port 22 [J]
2020-02-05 05:55:27
163.172.90.3 attack
Feb  4 11:15:46 host sshd[10950]: reveeclipse mapping checking getaddrinfo for 163-172-90-3.rev.poneytelecom.eu [163.172.90.3] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb  4 11:15:46 host sshd[10950]: Invalid user fake from 163.172.90.3
Feb  4 11:15:46 host sshd[10950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.90.3 
Feb  4 11:15:49 host sshd[10950]: Failed password for invalid user fake from 163.172.90.3 port 55440 ssh2
Feb  4 11:15:49 host sshd[10950]: Received disconnect from 163.172.90.3: 11: Bye Bye [preauth]
Feb  4 11:15:50 host sshd[11147]: reveeclipse mapping checking getaddrinfo for 163-172-90-3.rev.poneytelecom.eu [163.172.90.3] failed - POSSIBLE BREAK-IN ATTEMPT!
Feb  4 11:15:50 host sshd[11147]: Invalid user admin from 163.172.90.3
Feb  4 11:15:50 host sshd[11147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.90.3 
Feb  4 11:15:52 host sshd[11147]: Failed pas........
-------------------------------
2020-02-05 06:20:43
178.128.247.181 attackbots
Unauthorized connection attempt detected from IP address 178.128.247.181 to port 2220 [J]
2020-02-05 06:08:33
14.45.114.39 attackbots
Unauthorized connection attempt detected from IP address 14.45.114.39 to port 4567 [J]
2020-02-05 06:06:05
117.48.201.107 attackspam
WordPress login Brute force / Web App Attack on client site.
2020-02-05 05:53:14
89.248.162.136 attackbots
Feb  4 22:24:16 h2177944 kernel: \[4049560.131956\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.162.136 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=1791 PROTO=TCP SPT=48503 DPT=2225 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  4 22:24:16 h2177944 kernel: \[4049560.131969\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.162.136 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=1791 PROTO=TCP SPT=48503 DPT=2225 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  4 22:35:49 h2177944 kernel: \[4050252.879397\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.162.136 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=2284 PROTO=TCP SPT=48503 DPT=2213 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  4 22:35:49 h2177944 kernel: \[4050252.879411\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.162.136 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=2284 PROTO=TCP SPT=48503 DPT=2213 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  4 22:35:50 h2177944 kernel: \[4050254.020184\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=89.248.162.136 DST=85.214.117.
2020-02-05 05:37:46
180.76.138.132 attackbotsspam
SSH invalid-user multiple login try
2020-02-05 05:42:54
46.229.168.145 attackbots
Malicious Traffic/Form Submission
2020-02-05 05:54:40
98.213.192.2 attackbots
Honeypot attack, port: 5555, PTR: c-98-213-192-2.hsd1.il.comcast.net.
2020-02-05 06:16:08
83.97.20.46 attackspambots
Port 6001 scan denied
2020-02-05 05:44:16
110.35.253.47 attackbotsspam
Unauthorized connection attempt detected from IP address 110.35.253.47 to port 4567 [J]
2020-02-05 05:49:33
82.137.230.207 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-05 06:00:37
89.103.27.45 attackbotsspam
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-02-05 05:43:46
134.175.168.97 attackspam
Unauthorized connection attempt detected from IP address 134.175.168.97 to port 2220 [J]
2020-02-05 06:10:22

最近上报的IP列表

125.42.244.171 125.42.254.128 125.43.113.142 125.42.93.163
125.42.8.210 125.42.95.224 125.43.0.199 125.43.113.6
125.43.129.213 125.43.135.196 125.43.166.140 125.43.160.52
125.43.18.216 125.43.165.31 125.43.18.48 125.43.184.184
125.43.183.110 125.43.181.245 125.43.188.223 125.43.194.33