必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.138.129.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6880
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;135.138.129.125.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121401 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 15 10:52:17 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
125.129.138.135.in-addr.arpa domain name pointer nothing.attdns.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.129.138.135.in-addr.arpa	name = nothing.attdns.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
156.218.160.74 attackspambots
port scan and connect, tcp 23 (telnet)
2020-10-14 02:10:11
201.174.59.122 attackspambots
Unauthorized connection attempt from IP address 201.174.59.122 on Port 445(SMB)
2020-10-14 01:52:20
158.69.74.240 attack
Oct 12 02:32:21 HOST sshd[5268]: reveeclipse mapping checking getaddrinfo for ip-158-69-74.eu [158.69.74.240] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 12 02:32:23 HOST sshd[5268]: Failed password for invalid user gyoshi from 158.69.74.240 port 28114 ssh2
Oct 12 02:32:23 HOST sshd[5268]: Received disconnect from 158.69.74.240: 11: Bye Bye [preauth]
Oct 12 02:36:05 HOST sshd[5396]: reveeclipse mapping checking getaddrinfo for ip-158-69-74.eu [158.69.74.240] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 12 02:36:05 HOST sshd[5396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.74.240  user=r.r
Oct 12 02:36:06 HOST sshd[5396]: Failed password for r.r from 158.69.74.240 port 9480 ssh2
Oct 12 02:36:06 HOST sshd[5396]: Received disconnect from 158.69.74.240: 11: Bye Bye [preauth]
Oct 12 02:37:36 HOST sshd[5425]: reveeclipse mapping checking getaddrinfo for ip-158-69-74.eu [158.69.74.240] failed - POSSIBLE BREAK-IN ATTEMPT!
Oct 12 02:37........
-------------------------------
2020-10-14 02:01:36
103.89.176.74 attackbotsspam
Oct 13 19:51:26 abendstille sshd\[24518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.176.74  user=root
Oct 13 19:51:28 abendstille sshd\[24518\]: Failed password for root from 103.89.176.74 port 54100 ssh2
Oct 13 19:55:17 abendstille sshd\[29206\]: Invalid user menyhart from 103.89.176.74
Oct 13 19:55:17 abendstille sshd\[29206\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.89.176.74
Oct 13 19:55:19 abendstille sshd\[29206\]: Failed password for invalid user menyhart from 103.89.176.74 port 50162 ssh2
...
2020-10-14 02:05:27
54.36.180.236 attackbots
SSH invalid-user multiple login try
2020-10-14 01:41:16
183.83.133.165 attack
Unauthorized connection attempt from IP address 183.83.133.165 on Port 445(SMB)
2020-10-14 02:16:31
27.195.159.166 attack
Oct 13 19:06:27 *hidden* sshd[1598]: Failed password for invalid user matt from 27.195.159.166 port 41232 ssh2 Oct 13 19:11:01 *hidden* sshd[1769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.195.159.166 user=root Oct 13 19:11:03 *hidden* sshd[1769]: Failed password for *hidden* from 27.195.159.166 port 21436 ssh2
2020-10-14 01:57:04
186.88.170.182 attackspam
[Tue Oct 13 15:21:20 2020] IN=enp34s0 OUT= MAC=SERVERMAC SRC=186.88.170.182 DST=MYSERVERIP LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=12908 DF PROTO=TCP SPT=61589 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0  Ports: 445
2020-10-14 02:00:21
223.99.22.141 attack
Oct 13 00:14:36 h2779839 sshd[5914]: Invalid user ivanna from 223.99.22.141 port 40950
Oct 13 00:14:37 h2779839 sshd[5914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.99.22.141
Oct 13 00:14:36 h2779839 sshd[5914]: Invalid user ivanna from 223.99.22.141 port 40950
Oct 13 00:14:38 h2779839 sshd[5914]: Failed password for invalid user ivanna from 223.99.22.141 port 40950 ssh2
Oct 13 00:19:05 h2779839 sshd[5992]: Invalid user test from 223.99.22.141 port 38660
Oct 13 00:19:05 h2779839 sshd[5992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.99.22.141
Oct 13 00:19:05 h2779839 sshd[5992]: Invalid user test from 223.99.22.141 port 38660
Oct 13 00:19:07 h2779839 sshd[5992]: Failed password for invalid user test from 223.99.22.141 port 38660 ssh2
Oct 13 00:23:21 h2779839 sshd[6074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.99.22.141  user=root
Oct 13
...
2020-10-14 02:17:51
134.175.236.132 attackspam
Oct 13 17:50:36 ajax sshd[3139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.236.132 
Oct 13 17:50:38 ajax sshd[3139]: Failed password for invalid user emosfeedback from 134.175.236.132 port 56100 ssh2
2020-10-14 01:40:45
172.67.28.198 attackbotsspam
deny from zare.com cloudflare.com #always bad traffic
2020-10-14 02:13:49
177.75.107.3 attackspam
Unauthorized connection attempt from IP address 177.75.107.3 on Port 445(SMB)
2020-10-14 01:46:13
101.95.186.146 attack
Unauthorized connection attempt from IP address 101.95.186.146 on Port 445(SMB)
2020-10-14 02:14:37
49.235.16.103 attackspam
prod8
...
2020-10-14 01:55:58
140.148.248.8 attackbotsspam
[Tue Oct 13 06:53:47 2020] IN=enp34s0 OUT= MAC=SERVERMAC SRC=140.148.248.8 DST=MYSERVERIP LEN=52 TOS=0x00 PREC=0x00 TTL=107 ID=3184 DF PROTO=TCP SPT=44932 DPT=445 WINDOW=8192 RES=0x00 SYN URGP=0 Ports: 445
2020-10-14 01:42:15

最近上报的IP列表

134.202.251.94 98.113.72.169 186.254.129.237 13.235.91.141
178.237.14.120 252.95.245.42 195.60.6.77 7.17.17.42
15.88.70.97 155.152.52.156 61.29.92.199 140.53.230.12
101.75.194.252 5.234.194.53 217.169.29.19 192.37.173.216
58.28.86.78 254.123.64.255 169.152.249.242 127.32.116.116