必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.46.131.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44764
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.46.131.50.			IN	A

;; AUTHORITY SECTION:
.			209	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030802 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 04:04:57 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
50.131.46.125.in-addr.arpa domain name pointer hn.kd.ny.adsl.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
50.131.46.125.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
1.53.52.187 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-21 18:44:12
51.158.104.58 attackbotsspam
ssh failed login
2019-11-21 18:48:13
36.79.169.248 attackspam
*Port Scan* detected from 36.79.169.248 (ID/Indonesia/-). 4 hits in the last 101 seconds
2019-11-21 18:42:58
220.141.5.55 attack
Honeypot attack, port: 23, PTR: 220-141-5-55.dynamic-ip.hinet.net.
2019-11-21 18:54:27
218.23.104.250 attackbots
Nov 21 09:37:17 srv01 sshd[19503]: Invalid user mokkarala from 218.23.104.250 port 44952
Nov 21 09:37:17 srv01 sshd[19503]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.23.104.250
Nov 21 09:37:17 srv01 sshd[19503]: Invalid user mokkarala from 218.23.104.250 port 44952
Nov 21 09:37:19 srv01 sshd[19503]: Failed password for invalid user mokkarala from 218.23.104.250 port 44952 ssh2
Nov 21 09:41:23 srv01 sshd[19902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.23.104.250  user=root
Nov 21 09:41:24 srv01 sshd[19902]: Failed password for root from 218.23.104.250 port 51268 ssh2
...
2019-11-21 19:05:40
182.254.198.221 attack
11/21/2019-01:24:24.841959 182.254.198.221 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-21 19:17:44
186.147.223.47 attack
Nov 21 00:15:49 indra sshd[918894]: reveeclipse mapping checking getaddrinfo for static-ip-18614722347.cable.net.co [186.147.223.47] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov 21 00:15:49 indra sshd[918894]: Invalid user coffee from 186.147.223.47
Nov 21 00:15:49 indra sshd[918894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.223.47 
Nov 21 00:15:51 indra sshd[918894]: Failed password for invalid user coffee from 186.147.223.47 port 54785 ssh2
Nov 21 00:15:51 indra sshd[918894]: Received disconnect from 186.147.223.47: 11: Bye Bye [preauth]
Nov 21 00:24:46 indra sshd[920149]: reveeclipse mapping checking getaddrinfo for static-ip-18614722347.cable.net.co [186.147.223.47] failed - POSSIBLE BREAK-IN ATTEMPT!
Nov 21 00:24:46 indra sshd[920149]: Invalid user rieserver from 186.147.223.47
Nov 21 00:24:46 indra sshd[920149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.147.223.47 
........
-------------------------------
2019-11-21 19:15:58
51.254.201.67 attackspambots
Nov 21 07:21:46 firewall sshd[2565]: Invalid user mysql from 51.254.201.67
Nov 21 07:21:48 firewall sshd[2565]: Failed password for invalid user mysql from 51.254.201.67 port 36778 ssh2
Nov 21 07:25:12 firewall sshd[2645]: Invalid user nakakubo from 51.254.201.67
...
2019-11-21 18:49:31
125.24.155.129 attackspam
Honeypot attack, port: 445, PTR: node-upt.pool-125-24.dynamic.totinternet.net.
2019-11-21 18:57:27
185.143.223.149 attack
firewall-block, port(s): 33062/tcp, 33083/tcp, 33088/tcp, 33099/tcp, 33120/tcp, 33190/tcp, 33201/tcp, 33480/tcp, 33509/tcp, 33632/tcp, 33649/tcp, 33687/tcp, 33703/tcp, 33714/tcp
2019-11-21 18:58:38
106.12.37.43 attack
firewall-block, port(s): 6379/tcp
2019-11-21 18:50:51
101.108.83.120 attackspambots
Honeypot attack, port: 445, PTR: node-ghk.pool-101-108.dynamic.totinternet.net.
2019-11-21 18:51:19
222.186.175.220 attackbots
Nov 21 11:51:20 SilenceServices sshd[24337]: Failed password for root from 222.186.175.220 port 45150 ssh2
Nov 21 11:51:23 SilenceServices sshd[24337]: Failed password for root from 222.186.175.220 port 45150 ssh2
Nov 21 11:51:26 SilenceServices sshd[24337]: Failed password for root from 222.186.175.220 port 45150 ssh2
Nov 21 11:51:29 SilenceServices sshd[24337]: Failed password for root from 222.186.175.220 port 45150 ssh2
2019-11-21 19:00:25
104.42.77.216 attack
Nov 21 14:11:29 areeb-Workstation sshd[30057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.42.77.216
Nov 21 14:11:31 areeb-Workstation sshd[30057]: Failed password for invalid user pass123 from 104.42.77.216 port 15380 ssh2
...
2019-11-21 18:53:42
40.117.235.16 attack
Nov 21 07:38:26 sd-53420 sshd\[2804\]: User root from 40.117.235.16 not allowed because none of user's groups are listed in AllowGroups
Nov 21 07:38:26 sd-53420 sshd\[2804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.235.16  user=root
Nov 21 07:38:27 sd-53420 sshd\[2804\]: Failed password for invalid user root from 40.117.235.16 port 52972 ssh2
Nov 21 07:42:58 sd-53420 sshd\[4234\]: Invalid user oscarson from 40.117.235.16
Nov 21 07:42:58 sd-53420 sshd\[4234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.235.16
...
2019-11-21 18:41:48

最近上报的IP列表

125.46.131.19 125.46.130.42 125.46.134.182 125.46.132.21
125.46.138.214 125.46.139.134 125.46.139.158 125.46.139.226
125.46.144.38 125.46.143.50 125.46.156.248 125.46.151.204
125.46.145.245 125.46.156.39 125.46.146.152 125.46.157.108
118.137.26.81 125.46.159.216 125.46.159.97 125.46.160.254