必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.43.126.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52576
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.43.126.21.			IN	A

;; AUTHORITY SECTION:
.			258	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:02:50 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
21.126.43.125.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.126.43.125.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
113.179.133.34 attackbots
Unauthorised access (Nov 30) SRC=113.179.133.34 LEN=52 TTL=116 ID=11270 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 21:59:57
152.32.130.99 attack
DATE:2019-11-30 13:41:11,IP:152.32.130.99,MATCHES:10,PORT:ssh
2019-11-30 22:12:49
51.75.51.32 attackspambots
Nov 30 15:02:08 sd-53420 sshd\[12017\]: Invalid user preston from 51.75.51.32
Nov 30 15:02:08 sd-53420 sshd\[12017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.51.32
Nov 30 15:02:10 sd-53420 sshd\[12017\]: Failed password for invalid user preston from 51.75.51.32 port 42872 ssh2
Nov 30 15:05:11 sd-53420 sshd\[12502\]: User root from 51.75.51.32 not allowed because none of user's groups are listed in AllowGroups
Nov 30 15:05:11 sd-53420 sshd\[12502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.51.32  user=root
...
2019-11-30 22:13:32
113.173.226.64 attackbots
Unauthorised access (Nov 30) SRC=113.173.226.64 LEN=52 TTL=117 ID=9811 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Nov 30) SRC=113.173.226.64 LEN=52 TTL=117 ID=2987 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 22:11:30
136.228.161.67 attackspam
Automatic report - SSH Brute-Force Attack
2019-11-30 22:08:38
201.26.61.145 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-30 21:37:08
199.195.252.213 attackbots
Nov 30 03:33:48 mockhub sshd[404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.195.252.213
Nov 30 03:33:50 mockhub sshd[404]: Failed password for invalid user talee from 199.195.252.213 port 50364 ssh2
...
2019-11-30 21:52:31
178.219.49.61 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-30 21:38:23
138.68.24.138 attack
138.68.24.138 - - [30/Nov/2019:07:18:10 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.24.138 - - [30/Nov/2019:07:18:11 +0100] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.24.138 - - [30/Nov/2019:07:18:11 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.24.138 - - [30/Nov/2019:07:18:12 +0100] "POST /wp-login.php HTTP/1.1" 200 1684 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.24.138 - - [30/Nov/2019:07:18:13 +0100] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.24.138 - - [30/Nov/2019:07:18:14 +0100] "POST /wp-login.php HTTP/1.1" 200 1688 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-30 21:52:03
212.44.157.68 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-30 21:35:26
92.118.161.33 attackspambots
Unauthorized access to SSH at 30/Nov/2019:13:36:05 +0000.
2019-11-30 21:37:50
61.74.118.139 attackbotsspam
Nov 30 07:14:48 ns3042688 sshd\[24762\]: Invalid user update from 61.74.118.139
Nov 30 07:14:48 ns3042688 sshd\[24762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.74.118.139 
Nov 30 07:14:50 ns3042688 sshd\[24762\]: Failed password for invalid user update from 61.74.118.139 port 54278 ssh2
Nov 30 07:18:22 ns3042688 sshd\[26363\]: Invalid user christos from 61.74.118.139
Nov 30 07:18:22 ns3042688 sshd\[26363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.74.118.139 
...
2019-11-30 21:44:51
220.133.113.69 attackbots
1575094700 - 11/30/2019 07:18:20 Host: 220.133.113.69/220.133.113.69 Port: 6667 TCP Blocked
2019-11-30 21:46:32
190.205.115.82 attackbotsspam
Unauthorised access (Nov 30) SRC=190.205.115.82 LEN=52 TTL=112 ID=15744 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-30 22:02:34
87.11.206.176 attackspambots
Automatic report - Port Scan Attack
2019-11-30 21:54:30

最近上报的IP列表

125.43.127.184 125.43.124.186 125.43.128.221 125.43.125.253
118.137.198.67 125.43.130.128 125.43.129.154 125.43.131.7
125.43.141.201 125.43.134.194 125.43.140.24 125.43.138.160
125.43.138.195 125.43.133.166 125.43.133.109 125.43.138.179
125.43.142.247 118.137.198.84 125.43.143.57 125.43.162.42