必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Hakusan Shi

省份(region): Ishikawa

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.122.125.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18478
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.122.125.140.		IN	A

;; AUTHORITY SECTION:
.			421	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031700 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 17 17:52:00 CST 2022
;; MSG SIZE  rcvd: 108
HOST信息:
140.125.122.126.in-addr.arpa domain name pointer softbank126122125140.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.125.122.126.in-addr.arpa	name = softbank126122125140.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
42.112.17.30 attackbotsspam
Connection by 42.112.17.30 on port: 5901 got caught by honeypot at 5/8/2020 2:14:28 PM
2020-05-09 03:46:15
185.202.2.120 attackspam
1588966156 - 05/08/2020 21:29:16 Host: 185.202.2.120/185.202.2.120 Port: 6000 TCP Blocked
2020-05-09 03:53:21
49.89.171.219 attack
Unauthorized connection attempt detected from IP address 49.89.171.219 to port 23 [T]
2020-05-09 03:43:08
171.38.192.191 attackbotsspam
20/5/8@13:54:00: FAIL: IoT-Telnet address from=171.38.192.191
...
2020-05-09 03:23:28
47.102.110.56 attackspambots
Unauthorized connection attempt detected from IP address 47.102.110.56 to port 7002 [T]
2020-05-09 03:43:34
39.77.118.106 attackspambots
Unauthorized connection attempt detected from IP address 39.77.118.106 to port 23 [T]
2020-05-09 03:46:33
121.237.143.13 attackspambots
Unauthorized connection attempt detected from IP address 121.237.143.13 to port 81 [T]
2020-05-09 03:29:17
45.195.156.16 attackspam
Unauthorized connection attempt detected from IP address 45.195.156.16 to port 23 [T]
2020-05-09 03:45:18
27.124.37.105 attack
Unauthorized connection attempt detected from IP address 27.124.37.105 to port 445 [T]
2020-05-09 03:15:01
222.210.52.122 attackspam
Unauthorized connection attempt detected from IP address 222.210.52.122 to port 23 [T]
2020-05-09 03:17:10
222.70.83.6 attack
Unauthorized connection attempt detected from IP address 222.70.83.6 to port 445 [T]
2020-05-09 03:51:34
212.164.238.189 attack
Unauthorized connection attempt detected from IP address 212.164.238.189 to port 23 [T]
2020-05-09 03:52:16
222.252.16.71 attack
SSH brute-force attempt
2020-05-09 03:16:52
66.240.236.119 attack
05/08/2020-15:20:01.491531 66.240.236.119 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 68
2020-05-09 03:40:13
5.8.18.88 attackspam
5.8.18.88:64149 is connecting...
   Exception normal: Tried to send data to a client after losing connection

(on my terraria server)
2020-05-09 03:50:36

最近上报的IP列表

71.159.213.127 21.249.183.114 114.137.211.6 163.152.96.146
197.33.23.28 133.182.49.194 162.19.127.144 202.94.77.110
79.112.61.114 72.251.36.50 186.103.231.180 25.30.213.125
108.136.85.194 78.126.252.40 133.243.211.203 165.20.38.119
140.25.198.56 180.66.52.203 25.173.242.235 159.170.190.237