必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.74.68.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;125.74.68.120.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:50:01 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 120.68.74.125.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 120.68.74.125.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
107.170.18.163 attackbotsspam
Dec 30 20:54:01 game-panel sshd[23132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.18.163
Dec 30 20:54:03 game-panel sshd[23132]: Failed password for invalid user asprey from 107.170.18.163 port 35693 ssh2
Dec 30 20:57:24 game-panel sshd[23282]: Failed password for games from 107.170.18.163 port 47442 ssh2
2019-12-31 05:14:12
71.139.124.243 attackspam
SSH brutforce
2019-12-31 04:57:49
37.187.127.13 attackbots
Dec 30 21:03:16 pi sshd\[8892\]: Invalid user kalindi from 37.187.127.13 port 41087
Dec 30 21:03:16 pi sshd\[8892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.127.13
Dec 30 21:03:18 pi sshd\[8892\]: Failed password for invalid user kalindi from 37.187.127.13 port 41087 ssh2
Dec 30 21:05:32 pi sshd\[8942\]: Invalid user pundyk from 37.187.127.13 port 51710
Dec 30 21:05:32 pi sshd\[8942\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.127.13
...
2019-12-31 05:21:08
49.88.112.63 attack
19/12/30@16:13:09: FAIL: IoT-SSH address from=49.88.112.63
...
2019-12-31 05:17:56
144.217.136.227 attack
Dec 30 21:13:42 MK-Soft-Root2 sshd[3884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.136.227 
Dec 30 21:13:45 MK-Soft-Root2 sshd[3884]: Failed password for invalid user caecilie from 144.217.136.227 port 56344 ssh2
...
2019-12-31 05:01:26
106.54.160.59 attack
Automatic report - Banned IP Access
2019-12-31 05:30:42
45.141.86.122 attackbotsspam
Fail2Ban Ban Triggered
2019-12-31 05:18:12
206.189.165.34 attackspam
Dec 30 21:13:15 lnxded64 sshd[14237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.165.34
Dec 30 21:13:15 lnxded64 sshd[14237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.165.34
2019-12-31 05:19:43
40.77.167.81 attack
Automatic report - Banned IP Access
2019-12-31 05:14:39
164.40.240.150 attackbotsspam
[munged]::443 164.40.240.150 - - [30/Dec/2019:21:13:25 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 164.40.240.150 - - [30/Dec/2019:21:13:27 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 164.40.240.150 - - [30/Dec/2019:21:13:29 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 164.40.240.150 - - [30/Dec/2019:21:13:31 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 164.40.240.150 - - [30/Dec/2019:21:13:33 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 164.40.240.150 - - [30/Dec/2019:21:13:35 +0100] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11
2019-12-31 05:01:13
157.7.184.37 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-12-31 05:13:26
149.56.131.73 attackspam
2019-12-30T20:11:59.796510shield sshd\[16518\]: Invalid user info from 149.56.131.73 port 48534
2019-12-30T20:11:59.801007shield sshd\[16518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-149-56-131.net
2019-12-30T20:12:01.735056shield sshd\[16518\]: Failed password for invalid user info from 149.56.131.73 port 48534 ssh2
2019-12-30T20:13:45.778937shield sshd\[16906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.ip-149-56-131.net  user=root
2019-12-30T20:13:48.269189shield sshd\[16906\]: Failed password for root from 149.56.131.73 port 36314 ssh2
2019-12-31 04:56:50
222.230.115.251 attack
$f2bV_matches
2019-12-31 05:18:42
178.207.212.125 attack
1577736805 - 12/30/2019 21:13:25 Host: 178.207.212.125/178.207.212.125 Port: 445 TCP Blocked
2019-12-31 05:12:50
182.61.26.50 attackspam
Dec 30 21:55:08 lnxded64 sshd[24398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.26.50
2019-12-31 05:28:12

最近上报的IP列表

96.87.82.24 166.166.59.60 28.88.206.87 18.131.25.57
98.34.224.170 201.220.229.13 156.185.80.89 44.155.244.229
119.78.46.162 51.81.87.187 75.157.28.28 133.254.74.60
126.107.141.238 9.16.221.24 118.46.110.83 132.61.18.249
2.255.186.171 245.3.63.176 89.4.135.157 14.123.103.7