必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.45.89.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48369
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.45.89.133.			IN	A

;; AUTHORITY SECTION:
.			563	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:04:27 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
133.89.45.125.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
133.89.45.125.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.111.28 attack
Unauthorized connection attempt detected from IP address 106.13.111.28 to port 2220 [J]
2020-01-15 17:16:57
171.244.10.50 attackbotsspam
Unauthorized connection attempt detected from IP address 171.244.10.50 to port 2220 [J]
2020-01-15 17:03:16
198.23.166.98 attackspambots
Unauthorized connection attempt detected from IP address 198.23.166.98 to port 2220 [J]
2020-01-15 17:07:51
159.203.201.145 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-15 16:42:34
125.161.106.7 attackbots
Unauthorized connection attempt detected from IP address 125.161.106.7 to port 445
2020-01-15 17:10:15
94.102.75.131 attack
94.102.75.131 - - \[15/Jan/2020:05:50:51 +0100\] "POST /wp-login.php HTTP/1.0" 200 7556 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
94.102.75.131 - - \[15/Jan/2020:05:50:52 +0100\] "POST /wp-login.php HTTP/1.0" 200 7381 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
94.102.75.131 - - \[15/Jan/2020:05:50:53 +0100\] "POST /wp-login.php HTTP/1.0" 200 7376 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-01-15 17:02:13
103.100.209.174 attackbots
Unauthorized connection attempt detected from IP address 103.100.209.174 to port 2220 [J]
2020-01-15 17:16:20
119.29.180.70 attackspam
Unauthorized connection attempt detected from IP address 119.29.180.70 to port 2220 [J]
2020-01-15 17:05:28
172.81.237.219 attackspam
Jan 15 10:15:38 www1 sshd\[59084\]: Invalid user ftpuser from 172.81.237.219Jan 15 10:15:40 www1 sshd\[59084\]: Failed password for invalid user ftpuser from 172.81.237.219 port 37324 ssh2Jan 15 10:20:05 www1 sshd\[59471\]: Invalid user cvsroot from 172.81.237.219Jan 15 10:20:07 www1 sshd\[59471\]: Failed password for invalid user cvsroot from 172.81.237.219 port 57352 ssh2Jan 15 10:24:12 www1 sshd\[59858\]: Invalid user ubuntu from 172.81.237.219Jan 15 10:24:13 www1 sshd\[59858\]: Failed password for invalid user ubuntu from 172.81.237.219 port 49122 ssh2
...
2020-01-15 16:38:15
222.186.42.155 attackbots
SSH Brute Force, server-1 sshd[8716]: Failed password for root from 222.186.42.155 port 16910 ssh2
2020-01-15 16:47:55
222.186.31.144 attack
Jan 15 09:52:12 localhost sshd\[20054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.144  user=root
Jan 15 09:52:14 localhost sshd\[20054\]: Failed password for root from 222.186.31.144 port 63012 ssh2
Jan 15 09:52:16 localhost sshd\[20054\]: Failed password for root from 222.186.31.144 port 63012 ssh2
2020-01-15 16:54:34
142.44.240.190 attackbots
Unauthorized connection attempt detected from IP address 142.44.240.190 to port 2220 [J]
2020-01-15 16:42:15
123.148.247.46 attackbotsspam
Automatic report - XMLRPC Attack
2020-01-15 17:12:35
84.17.53.19 attackspambots
(From 32384657@yahoo.fr) Аdult dаting amеricаn оnline: https://onlineuniversalwork.com/sexygirls479662
2020-01-15 17:08:44
88.227.105.247 attack
Unauthorized connection attempt detected from IP address 88.227.105.247 to port 5555
2020-01-15 16:56:53

最近上报的IP列表

125.45.89.117 125.45.89.103 125.45.89.14 125.45.89.157
125.45.89.160 118.137.241.33 125.45.89.169 125.45.89.172
125.45.89.189 125.45.89.165 125.45.89.192 125.45.89.195
125.45.89.197 125.45.89.206 125.45.89.20 125.45.89.204
125.45.89.215 125.45.89.216 125.45.89.218 118.137.244.142