必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.126.18.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28471
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.126.18.125.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 09:13:32 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 125.18.126.132.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 132.126.18.125.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
180.76.36.158 attackbotsspam
Jun 10 10:20:42 XXXXXX sshd[49985]: Invalid user admin from 180.76.36.158 port 41654
2020-06-10 23:21:35
206.253.167.205 attack
2020-06-10T10:55:51.236351abusebot.cloudsearch.cf sshd[17321]: Invalid user rootalias from 206.253.167.205 port 59306
2020-06-10T10:55:51.242532abusebot.cloudsearch.cf sshd[17321]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.253.167.205
2020-06-10T10:55:51.236351abusebot.cloudsearch.cf sshd[17321]: Invalid user rootalias from 206.253.167.205 port 59306
2020-06-10T10:55:53.739021abusebot.cloudsearch.cf sshd[17321]: Failed password for invalid user rootalias from 206.253.167.205 port 59306 ssh2
2020-06-10T10:59:47.352117abusebot.cloudsearch.cf sshd[17649]: Invalid user wug from 206.253.167.205 port 42062
2020-06-10T10:59:47.357673abusebot.cloudsearch.cf sshd[17649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.253.167.205
2020-06-10T10:59:47.352117abusebot.cloudsearch.cf sshd[17649]: Invalid user wug from 206.253.167.205 port 42062
2020-06-10T10:59:49.587937abusebot.cloudsearch.cf sshd[17649]: 
...
2020-06-10 23:41:38
187.243.6.106 attack
$f2bV_matches
2020-06-10 23:46:10
220.133.159.154 attackspambots
Honeypot attack, port: 81, PTR: 220-133-159-154.HINET-IP.hinet.net.
2020-06-10 23:56:13
51.75.171.171 attackbotsspam
Jun 10 07:07:36 Host-KLAX-C sshd[15453]: Disconnected from invalid user MCServer 51.75.171.171 port 40176 [preauth]
...
2020-06-10 23:24:47
85.209.0.101 attackspam
Jun 10 22:03:29 itv-usvr-01 sshd[8426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.101  user=root
Jun 10 22:03:32 itv-usvr-01 sshd[8426]: Failed password for root from 85.209.0.101 port 51600 ssh2
2020-06-10 23:15:53
125.91.109.232 attackbots
Jun 10 17:07:02 haigwepa sshd[21297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.109.232 
Jun 10 17:07:04 haigwepa sshd[21297]: Failed password for invalid user tuanna69 from 125.91.109.232 port 42289 ssh2
...
2020-06-10 23:36:08
114.67.250.216 attack
$f2bV_matches
2020-06-10 23:29:47
167.71.176.84 attackbotsspam
Jun 10 17:17:29 odroid64 sshd\[26749\]: User root from 167.71.176.84 not allowed because not listed in AllowUsers
Jun 10 17:17:29 odroid64 sshd\[26749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.176.84  user=root
...
2020-06-10 23:24:13
167.172.195.99 attackbotsspam
Jun 10 17:17:15 sso sshd[7842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.195.99
Jun 10 17:17:17 sso sshd[7842]: Failed password for invalid user test2 from 167.172.195.99 port 46566 ssh2
...
2020-06-10 23:33:19
180.71.58.82 attackbots
Jun 11 01:17:10 localhost sshd[3646462]: Connection closed by 180.71.58.82 port 53882 [preauth]
...
2020-06-10 23:32:28
180.163.220.68 attackbots
Automatic report - Banned IP Access
2020-06-10 23:52:42
106.13.123.29 attackspambots
Jun 10 17:28:54 vmi345603 sshd[17404]: Failed password for root from 106.13.123.29 port 50170 ssh2
...
2020-06-10 23:40:48
72.11.135.222 attackbots
proto=tcp  .  spt=58030  .  dpt=25  .     Listed on    dnsbl-sorbs plus abuseat-org and barracuda     (131)
2020-06-10 23:53:56
51.254.113.107 attack
Jun 10 15:24:21 scw-6657dc sshd[29891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.113.107
Jun 10 15:24:21 scw-6657dc sshd[29891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.113.107
Jun 10 15:24:23 scw-6657dc sshd[29891]: Failed password for invalid user admin from 51.254.113.107 port 44906 ssh2
...
2020-06-10 23:31:22

最近上报的IP列表

22.8.36.82 66.117.23.47 166.13.91.51 86.146.185.63
242.95.49.183 103.248.45.206 247.233.27.236 21.239.33.20
93.221.183.188 128.184.187.67 237.141.180.241 151.209.53.110
181.110.140.101 91.171.228.78 181.237.167.27 235.86.180.2
24.40.122.114 95.186.1.208 81.12.227.226 26.152.108.216