必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.150.125.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34958
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.150.125.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024122303 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 24 10:46:42 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
42.125.150.129.in-addr.arpa domain name pointer oc-129-150-125-42.compute.oraclecloud.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.125.150.129.in-addr.arpa	name = oc-129-150-125-42.compute.oraclecloud.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
217.198.113.57 attackbotsspam
Jul 10 21:01:37 *** sshd[12571]: Invalid user vvv from 217.198.113.57 port 54398
Jul 10 21:01:39 *** sshd[12571]: Failed password for invalid user vvv from 217.198.113.57 port 54398 ssh2
Jul 10 21:01:39 *** sshd[12571]: Received disconnect from 217.198.113.57 port 54398:11: Bye Bye [preauth]
Jul 10 21:01:39 *** sshd[12571]: Disconnected from 217.198.113.57 port 54398 [preauth]
Jul 10 21:03:26 *** sshd[14313]: Invalid user lei from 217.198.113.57 port 46970
Jul 10 21:03:28 *** sshd[14313]: Failed password for invalid user lei from 217.198.113.57 port 46970 ssh2
Jul 10 21:03:28 *** sshd[14313]: Received disconnect from 217.198.113.57 port 46970:11: Bye Bye [preauth]
Jul 10 21:03:28 *** sshd[14313]: Disconnected from 217.198.113.57 port 46970 [preauth]
Jul 10 21:04:49 *** sshd[15763]: Invalid user ubuntu from 217.198.113.57 port 36020
Jul 10 21:04:50 *** sshd[15763]: Failed password for invalid user ubuntu from 217.198.113.57 port 36020 ssh2
Jul 10 21:04:50 *** sshd[15763]........
-------------------------------
2019-07-13 06:24:39
216.244.66.246 attackspam
login attempts
2019-07-13 06:09:18
104.248.121.159 attackspambots
Automatic report - Web App Attack
2019-07-13 06:59:08
31.173.123.11 attackbots
POP
2019-07-13 06:38:50
167.99.138.153 attackspambots
Jul 12 21:55:46 mail sshd\[23043\]: Invalid user anurag from 167.99.138.153 port 55424
Jul 12 21:55:46 mail sshd\[23043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.138.153
Jul 12 21:55:48 mail sshd\[23043\]: Failed password for invalid user anurag from 167.99.138.153 port 55424 ssh2
Jul 12 22:02:58 mail sshd\[24719\]: Invalid user postgres from 167.99.138.153 port 57242
Jul 12 22:02:58 mail sshd\[24719\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.138.153
2019-07-13 06:34:58
115.159.122.71 attack
port scan and connect, tcp 1433 (ms-sql-s)
2019-07-13 06:42:12
45.55.177.170 attack
Jul 12 18:50:44 vps200512 sshd\[8388\]: Invalid user csaba from 45.55.177.170
Jul 12 18:50:44 vps200512 sshd\[8388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.177.170
Jul 12 18:50:46 vps200512 sshd\[8388\]: Failed password for invalid user csaba from 45.55.177.170 port 59746 ssh2
Jul 12 18:55:28 vps200512 sshd\[8505\]: Invalid user mapr from 45.55.177.170
Jul 12 18:55:28 vps200512 sshd\[8505\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.177.170
2019-07-13 06:58:13
51.38.234.54 attackspambots
Invalid user robin from 51.38.234.54 port 47870
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.234.54
Failed password for invalid user robin from 51.38.234.54 port 47870 ssh2
Invalid user hmsftp from 51.38.234.54 port 49224
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.234.54
2019-07-13 06:14:11
61.163.78.132 attack
Jul 12 20:01:30 mail sshd\[10560\]: Invalid user chad from 61.163.78.132 port 44038
Jul 12 20:01:30 mail sshd\[10560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.163.78.132
Jul 12 20:01:33 mail sshd\[10560\]: Failed password for invalid user chad from 61.163.78.132 port 44038 ssh2
Jul 12 20:07:38 mail sshd\[10713\]: Invalid user admin from 61.163.78.132 port 44222
Jul 12 20:07:38 mail sshd\[10713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.163.78.132
...
2019-07-13 06:10:59
103.75.54.98 attackbots
14,99-10/02 concatform PostRequest-Spammer scoring: essen
2019-07-13 06:20:12
41.238.166.166 attackbotsspam
Telnetd brute force attack detected by fail2ban
2019-07-13 06:32:32
182.110.20.56 attackspambots
Jul 12 15:54:11 eola postfix/smtpd[2839]: connect from unknown[182.110.20.56]
Jul 12 15:54:11 eola postfix/smtpd[2839]: lost connection after AUTH from unknown[182.110.20.56]
Jul 12 15:54:11 eola postfix/smtpd[2839]: disconnect from unknown[182.110.20.56] ehlo=1 auth=0/1 commands=1/2
Jul 12 15:54:11 eola postfix/smtpd[2839]: connect from unknown[182.110.20.56]
Jul 12 15:54:12 eola postfix/smtpd[2839]: lost connection after AUTH from unknown[182.110.20.56]
Jul 12 15:54:12 eola postfix/smtpd[2839]: disconnect from unknown[182.110.20.56] ehlo=1 auth=0/1 commands=1/2
Jul 12 15:54:12 eola postfix/smtpd[2839]: connect from unknown[182.110.20.56]
Jul 12 15:54:13 eola postfix/smtpd[2839]: lost connection after AUTH from unknown[182.110.20.56]
Jul 12 15:54:13 eola postfix/smtpd[2839]: disconnect from unknown[182.110.20.56] ehlo=1 auth=0/1 commands=1/2
Jul 12 15:54:13 eola postfix/smtpd[2839]: connect from unknown[182.110.20.56]
Jul 12 15:54:14 eola postfix/smtpd[2839]: lost conn........
-------------------------------
2019-07-13 06:39:08
123.108.35.186 attackspam
Jul 12 21:58:17 mail sshd\[23503\]: Invalid user elisabetta from 123.108.35.186 port 38636
Jul 12 21:58:17 mail sshd\[23503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186
Jul 12 21:58:18 mail sshd\[23503\]: Failed password for invalid user elisabetta from 123.108.35.186 port 38636 ssh2
Jul 12 22:04:08 mail sshd\[24893\]: Invalid user alfresco from 123.108.35.186 port 39648
Jul 12 22:04:08 mail sshd\[24893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186
2019-07-13 06:35:30
89.252.184.54 attackspam
WordPress brute force
2019-07-13 06:19:08
137.59.162.169 attack
Jul 12 01:07:42 vtv3 sshd\[17486\]: Invalid user felix from 137.59.162.169 port 52312
Jul 12 01:07:42 vtv3 sshd\[17486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.169
Jul 12 01:07:43 vtv3 sshd\[17486\]: Failed password for invalid user felix from 137.59.162.169 port 52312 ssh2
Jul 12 01:17:35 vtv3 sshd\[22427\]: Invalid user central from 137.59.162.169 port 53404
Jul 12 01:17:35 vtv3 sshd\[22427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.169
Jul 12 01:57:19 vtv3 sshd\[9605\]: Invalid user steph from 137.59.162.169 port 57782
Jul 12 01:57:19 vtv3 sshd\[9605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.59.162.169
Jul 12 01:57:21 vtv3 sshd\[9605\]: Failed password for invalid user steph from 137.59.162.169 port 57782 ssh2
Jul 12 02:07:10 vtv3 sshd\[14508\]: Invalid user aaa from 137.59.162.169 port 58875
Jul 12 02:07:10 vtv3 sshd\[14508\]:
2019-07-13 06:17:04

最近上报的IP列表

185.128.79.85 156.88.38.148 15.56.175.131 36.60.63.164
2.212.100.200 164.169.193.132 156.9.8.188 141.4.178.125
14.115.252.17 142.43.237.195 4.163.105.147 29.241.149.55
37.200.7.0 202.115.226.169 245.235.6.111 239.230.115.0
32.165.246.117 244.222.110.163 22.249.127.103 162.29.73.12