必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.66.243.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.66.243.132.			IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 06:18:54 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
132.243.66.125.in-addr.arpa domain name pointer 132.243.66.125.broad.zg.sc.dynamic.163data.com.cn.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.243.66.125.in-addr.arpa	name = 132.243.66.125.broad.zg.sc.dynamic.163data.com.cn.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.187.0.20 attack
2020-07-16T17:25:17.352902ns386461 sshd\[4983\]: Invalid user tsb from 37.187.0.20 port 57042
2020-07-16T17:25:17.357440ns386461 sshd\[4983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3323025.ip-37-187-0.eu
2020-07-16T17:25:19.245725ns386461 sshd\[4983\]: Failed password for invalid user tsb from 37.187.0.20 port 57042 ssh2
2020-07-16T17:34:46.507230ns386461 sshd\[13500\]: Invalid user tmp from 37.187.0.20 port 47158
2020-07-16T17:34:46.512607ns386461 sshd\[13500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3323025.ip-37-187-0.eu
...
2020-07-17 01:58:03
40.77.167.87 attackspam
Automatic report - Banned IP Access
2020-07-17 01:47:56
116.132.47.50 attackbotsspam
Fail2Ban
2020-07-17 01:55:08
194.152.206.93 attackbotsspam
IP blocked
2020-07-17 02:02:00
94.182.190.76 attack
xmlrpc attack
2020-07-17 01:25:31
51.141.124.176 attack
Jul 16 18:53:00 ns382633 sshd\[14199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.141.124.176  user=root
Jul 16 18:53:02 ns382633 sshd\[14199\]: Failed password for root from 51.141.124.176 port 59271 ssh2
Jul 16 19:05:37 ns382633 sshd\[16949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.141.124.176  user=root
Jul 16 19:05:38 ns382633 sshd\[16949\]: Failed password for root from 51.141.124.176 port 62861 ssh2
Jul 16 19:29:05 ns382633 sshd\[23448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.141.124.176  user=root
2020-07-17 01:34:45
37.139.1.197 attackspam
2020-07-16T17:12:08.446827shield sshd\[2652\]: Invalid user ycq from 37.139.1.197 port 37720
2020-07-16T17:12:08.453448shield sshd\[2652\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.1.197
2020-07-16T17:12:10.460713shield sshd\[2652\]: Failed password for invalid user ycq from 37.139.1.197 port 37720 ssh2
2020-07-16T17:21:19.756128shield sshd\[5100\]: Invalid user steam from 37.139.1.197 port 45420
2020-07-16T17:21:19.764615shield sshd\[5100\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.1.197
2020-07-17 01:27:31
129.204.177.7 attack
Jul 16 15:54:04 rush sshd[21913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.177.7
Jul 16 15:54:06 rush sshd[21913]: Failed password for invalid user huang from 129.204.177.7 port 45640 ssh2
Jul 16 15:59:23 rush sshd[22068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.177.7
...
2020-07-17 01:33:31
95.248.137.161 attack
Automatic report - Port Scan Attack
2020-07-17 01:48:26
45.55.189.113 attackspam
Jul 16 18:25:26 abendstille sshd\[9055\]: Invalid user madura from 45.55.189.113
Jul 16 18:25:26 abendstille sshd\[9055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.189.113
Jul 16 18:25:28 abendstille sshd\[9055\]: Failed password for invalid user madura from 45.55.189.113 port 60388 ssh2
Jul 16 18:29:39 abendstille sshd\[13196\]: Invalid user ec2-user from 45.55.189.113
Jul 16 18:29:39 abendstille sshd\[13196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.189.113
...
2020-07-17 01:27:18
96.46.27.0 attackspambots
Jul 15 21:31:42 vzmaster sshd[31341]: Address 96.46.27.0 maps to 96.46.27.0.nwinternet.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul 15 21:31:42 vzmaster sshd[31341]: Invalid user admin from 96.46.27.0
Jul 15 21:31:42 vzmaster sshd[31341]: Failed none for invalid user admin from 96.46.27.0 port 60050 ssh2
Jul 15 21:31:42 vzmaster sshd[31341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.46.27.0 
Jul 15 21:31:44 vzmaster sshd[31341]: Failed password for invalid user admin from 96.46.27.0 port 60050 ssh2
Jul 15 21:31:45 vzmaster sshd[31374]: Address 96.46.27.0 maps to 96.46.27.0.nwinternet.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jul 15 21:31:46 vzmaster sshd[31374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.46.27.0  user=r.r
Jul 15 21:31:48 vzmaster sshd[31374]: Failed password for r.r from 96.46.27.0 port 601........
-------------------------------
2020-07-17 01:39:05
49.232.29.120 attack
2020-07-16T12:31:20.502425devel sshd[22200]: Invalid user sangeeta from 49.232.29.120 port 58020
2020-07-16T12:31:22.116518devel sshd[22200]: Failed password for invalid user sangeeta from 49.232.29.120 port 58020 ssh2
2020-07-16T12:36:29.706561devel sshd[22568]: Invalid user eric from 49.232.29.120 port 48884
2020-07-17 01:51:41
41.41.66.176 attack
Unauthorized connection attempt from IP address 41.41.66.176 on Port 445(SMB)
2020-07-17 02:05:21
13.74.179.179 attackspam
Jul 16 17:20:01 ssh2 sshd[56987]: User root from 13.74.179.179 not allowed because not listed in AllowUsers
Jul 16 17:20:01 ssh2 sshd[56987]: Failed password for invalid user root from 13.74.179.179 port 1470 ssh2
Jul 16 17:20:01 ssh2 sshd[56987]: Disconnected from invalid user root 13.74.179.179 port 1470 [preauth]
...
2020-07-17 01:49:53
163.172.82.142 attackspam
 UDP 163.172.82.142:37673 -> port 389, len 67
2020-07-17 01:57:00

最近上报的IP列表

125.65.111.160 125.65.10.138 125.65.113.204 125.65.113.69
125.65.140.125 125.65.229.172 125.67.153.75 125.66.77.166
125.67.61.91 125.67.16.37 125.66.59.2 125.69.76.248
125.68.143.27 125.70.18.194 125.70.79.11 125.71.121.218
125.69.96.54 125.70.89.59 125.70.76.91 125.71.43.34