必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Singapore

省份(region): unknown

国家(country): Singapore

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.162.63.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51993
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.162.63.125.			IN	A

;; AUTHORITY SECTION:
.			578	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:10:39 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
125.63.162.139.in-addr.arpa domain name pointer li1476-125.members.linode.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.63.162.139.in-addr.arpa	name = li1476-125.members.linode.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
121.142.111.106 attackspam
Automatic report - Banned IP Access
2019-08-22 04:51:34
202.51.74.189 attackbotsspam
Aug 21 22:43:14 * sshd[28007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
Aug 21 22:43:16 * sshd[28007]: Failed password for invalid user curelea from 202.51.74.189 port 54766 ssh2
2019-08-22 05:20:31
117.213.187.16 attackbotsspam
Unauthorised access (Aug 21) SRC=117.213.187.16 LEN=52 TTL=117 ID=29327 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-22 05:26:06
60.13.226.94 attackspam
RDPBruteCAu24
2019-08-22 05:06:51
94.42.178.137 attackbots
Aug 21 07:02:40 hcbb sshd\[8974\]: Invalid user admin from 94.42.178.137
Aug 21 07:02:40 hcbb sshd\[8974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.42.178.137
Aug 21 07:02:42 hcbb sshd\[8974\]: Failed password for invalid user admin from 94.42.178.137 port 36829 ssh2
Aug 21 07:08:25 hcbb sshd\[9478\]: Invalid user maud from 94.42.178.137
Aug 21 07:08:25 hcbb sshd\[9478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.42.178.137
2019-08-22 05:00:57
200.29.108.214 attackspambots
Aug 21 16:59:48 ny01 sshd[24398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214
Aug 21 16:59:50 ny01 sshd[24398]: Failed password for invalid user ubuntu from 200.29.108.214 port 52737 ssh2
Aug 21 17:04:28 ny01 sshd[24854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.29.108.214
2019-08-22 05:21:05
125.130.110.20 attackbotsspam
Jan 27 07:37:50 vtv3 sshd\[5480\]: Invalid user ftpuser from 125.130.110.20 port 60606
Jan 27 07:37:50 vtv3 sshd\[5480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
Jan 27 07:37:52 vtv3 sshd\[5480\]: Failed password for invalid user ftpuser from 125.130.110.20 port 60606 ssh2
Jan 27 07:43:01 vtv3 sshd\[6919\]: Invalid user ghost from 125.130.110.20 port 36430
Jan 27 07:43:01 vtv3 sshd\[6919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
Feb 15 22:21:13 vtv3 sshd\[30811\]: Invalid user ts3bot3 from 125.130.110.20 port 41200
Feb 15 22:21:13 vtv3 sshd\[30811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.130.110.20
Feb 15 22:21:15 vtv3 sshd\[30811\]: Failed password for invalid user ts3bot3 from 125.130.110.20 port 41200 ssh2
Feb 15 22:26:59 vtv3 sshd\[32300\]: Invalid user srashid from 125.130.110.20 port 59454
Feb 15 22:26:59 vtv3 sshd\[
2019-08-22 04:47:31
178.235.187.195 attackspam
Autoban   178.235.187.195 AUTH/CONNECT
2019-08-22 04:46:37
201.216.193.65 attackspambots
Aug 21 20:41:23 XXX sshd[19178]: Invalid user hunt from 201.216.193.65 port 49596
2019-08-22 05:11:28
144.217.209.249 attack
Aug 21 16:41:24 ks10 sshd[26289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.209.249 
Aug 21 16:41:26 ks10 sshd[26289]: Failed password for invalid user test3 from 144.217.209.249 port 41528 ssh2
...
2019-08-22 05:30:41
203.195.155.100 attackspambots
Aug 21 04:46:41 php1 sshd\[2252\]: Invalid user web1 from 203.195.155.100
Aug 21 04:46:41 php1 sshd\[2252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.155.100
Aug 21 04:46:42 php1 sshd\[2252\]: Failed password for invalid user web1 from 203.195.155.100 port 60462 ssh2
Aug 21 04:49:36 php1 sshd\[2532\]: Invalid user chandru from 203.195.155.100
Aug 21 04:49:36 php1 sshd\[2532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.155.100
2019-08-22 05:19:22
218.92.1.156 attackbots
Aug 21 20:33:07 h2177944 sshd\[7760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.1.156  user=root
Aug 21 20:33:09 h2177944 sshd\[7760\]: Failed password for root from 218.92.1.156 port 28461 ssh2
Aug 21 20:33:10 h2177944 sshd\[7760\]: Failed password for root from 218.92.1.156 port 28461 ssh2
Aug 21 20:33:13 h2177944 sshd\[7760\]: Failed password for root from 218.92.1.156 port 28461 ssh2
...
2019-08-22 05:01:46
118.25.64.218 attackbots
vps1:sshd-InvalidUser
2019-08-22 05:13:38
192.241.220.227 attackspambots
WordPress wp-login brute force :: 192.241.220.227 0.200 BYPASS [22/Aug/2019:00:53:18  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-22 04:58:04
117.140.146.103 attack
[portscan] Port scan
2019-08-22 04:49:15

最近上报的IP列表

139.162.61.24 139.162.62.60 139.162.65.112 118.232.31.158
139.162.65.83 139.162.66.140 139.162.68.138 139.162.69.170
139.162.69.208 139.162.66.246 139.162.65.150 139.162.69.214
139.162.7.175 139.162.7.187 139.162.7.240 139.162.70.124
118.232.31.55 139.162.70.169 139.162.72.137 139.162.71.115