必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Aurangabad

省份(region): Maharashtra

国家(country): India

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
125.99.133.239 attackspam
" "
2020-09-17 00:13:29
125.99.133.239 attackspam
" "
2020-09-16 16:30:20
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 125.99.133.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37750
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;125.99.133.145.			IN	A

;; AUTHORITY SECTION:
.			201	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020101202 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 13 11:29:30 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 145.133.99.125.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.133.99.125.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.180.9 attackbots
Dec 26 00:31:32 * sshd[25676]: Failed password for root from 222.186.180.9 port 2446 ssh2
Dec 26 00:31:46 * sshd[25676]: error: maximum authentication attempts exceeded for root from 222.186.180.9 port 2446 ssh2 [preauth]
2019-12-26 07:44:59
172.98.144.143 attackspam
172.98.144.143 - - [25/Dec/2019:23:53:02 +0100] "POST /wp-admin/admin-post.php?page=wysija_campaigns&action=themes HTTP/1.1" 403 400 "-" "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"
172.98.144.143 - - [25/Dec/2019:23:53:13 +0100] "GET /wp-admin/admin-ajax.php?action=wpuf_file_upload HTTP/1.1" 400 6255 "-" "python-requests/2.18.4"
172.98.144.143 - - [25/Dec/2019:23:53:37 +0100] "GET /wp-content/plugins/hd-webplayer/playlist.php HTTP/1.1" 404 16526 "-" "python-requests/2.18.4"
172.98.144.143 - - [25/Dec/2019:23:53:40 +0100] "POST /wp-admin/admin-post.php HTTP/1.1" 403 400 "-" "Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0"
172.98.144.143 - - [25/Dec/2019:23:54:00 +0100] "POST /wp-admin/admin-ajax.php?action=getcountryuser&cs=2 HTTP/1.1" 403 400 "-" "python-requests/2.18.4"
...
2019-12-26 07:38:07
178.62.19.13 attackspam
Dec 25 23:54:14 51-15-180-239 sshd[15937]: Invalid user nouser from 178.62.19.13 port 55662
...
2019-12-26 07:27:18
2803:1500:e01:dab9:3102:be57:9f86:e5f4 attackbotsspam
C1,WP GET /comic/wp-login.php
2019-12-26 07:08:15
93.114.86.226 attack
GET /cms/wp-login.php HTTP/1.1
2019-12-26 07:27:29
222.186.190.92 attackspam
Dec 25 23:54:26 nextcloud sshd\[24320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
Dec 25 23:54:27 nextcloud sshd\[24320\]: Failed password for root from 222.186.190.92 port 42740 ssh2
Dec 25 23:54:51 nextcloud sshd\[25106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
...
2019-12-26 07:03:57
123.58.6.219 attack
Invalid user bubbers from 123.58.6.219 port 40946
2019-12-26 07:33:47
178.62.95.122 attackbots
Dec 26 01:17:47 server sshd\[20316\]: Invalid user ahadu from 178.62.95.122
Dec 26 01:17:47 server sshd\[20316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.95.122 
Dec 26 01:17:49 server sshd\[20316\]: Failed password for invalid user ahadu from 178.62.95.122 port 44164 ssh2
Dec 26 01:54:14 server sshd\[28793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.95.122  user=bin
Dec 26 01:54:15 server sshd\[28793\]: Failed password for bin from 178.62.95.122 port 41586 ssh2
...
2019-12-26 07:26:54
37.191.130.136 attack
Honeypot attack, port: 23, PTR: 136.37-191-130.fiber.lynet.no.
2019-12-26 07:23:46
137.74.198.126 attackspam
$f2bV_matches
2019-12-26 07:42:32
133.242.79.30 attackspam
Dec 25 23:51:23 v22018076622670303 sshd\[1041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.79.30  user=root
Dec 25 23:51:25 v22018076622670303 sshd\[1041\]: Failed password for root from 133.242.79.30 port 55125 ssh2
Dec 25 23:54:38 v22018076622670303 sshd\[1091\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.242.79.30  user=mysql
...
2019-12-26 07:11:34
49.88.112.59 attackbots
Brute force attempt
2019-12-26 07:17:45
123.148.247.138 attackspambots
$f2bV_matches
2019-12-26 07:17:26
106.253.177.150 attackbots
Dec 26 00:07:25 markkoudstaal sshd[16620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.253.177.150
Dec 26 00:07:27 markkoudstaal sshd[16620]: Failed password for invalid user asterisk from 106.253.177.150 port 57098 ssh2
Dec 26 00:10:44 markkoudstaal sshd[16875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.253.177.150
2019-12-26 07:13:42
222.186.173.180 attackbotsspam
Dec 26 00:39:55 meumeu sshd[10688]: Failed password for root from 222.186.173.180 port 9808 ssh2
Dec 26 00:40:10 meumeu sshd[10688]: error: maximum authentication attempts exceeded for root from 222.186.173.180 port 9808 ssh2 [preauth]
Dec 26 00:40:22 meumeu sshd[10761]: Failed password for root from 222.186.173.180 port 16022 ssh2
...
2019-12-26 07:43:46

最近上报的IP列表

125.44.26.98 182.126.115.56 173.245.54.184 172.69.190.55
109.108.86.241 138.197.177.254 142.93.217.46 1.2.176.96
1.2.221.33 101.109.130.152 104.41.12.146 114.35.127.21
115.62.157.89 119.42.71.228 119.56.209.70 123.130.21.165
123.14.125.60 124.131.136.188 167.71.119.84 170.83.113.57