必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.168.125.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9384
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.168.125.111.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 16:31:59 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
111.125.168.145.in-addr.arpa domain name pointer 145.168.EARLY-REGISTRATION.of.SURFnet.invalid.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
111.125.168.145.in-addr.arpa	name = 145.168.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
78.194.237.128 attackbots
Unauthorised access (Aug 27) SRC=78.194.237.128 LEN=44 TOS=0x10 PREC=0x40 TTL=51 ID=21522 TCP DPT=8080 WINDOW=33689 SYN 
Unauthorised access (Aug 26) SRC=78.194.237.128 LEN=44 TOS=0x10 PREC=0x40 TTL=51 ID=59872 TCP DPT=8080 WINDOW=33689 SYN 
Unauthorised access (Aug 25) SRC=78.194.237.128 LEN=44 TOS=0x10 PREC=0x40 TTL=51 ID=17769 TCP DPT=8080 WINDOW=33689 SYN
2019-08-27 09:20:39
111.59.184.141 attackspam
Aug 26 13:41:23 auw2 sshd\[1841\]: Invalid user admin from 111.59.184.141
Aug 26 13:41:23 auw2 sshd\[1841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.59.184.141
Aug 26 13:41:25 auw2 sshd\[1841\]: Failed password for invalid user admin from 111.59.184.141 port 42437 ssh2
Aug 26 13:41:27 auw2 sshd\[1841\]: Failed password for invalid user admin from 111.59.184.141 port 42437 ssh2
Aug 26 13:41:29 auw2 sshd\[1841\]: Failed password for invalid user admin from 111.59.184.141 port 42437 ssh2
2019-08-27 09:18:49
109.167.98.27 attackbotsspam
Aug 26 21:03:36 TORMINT sshd\[28174\]: Invalid user karin from 109.167.98.27
Aug 26 21:03:36 TORMINT sshd\[28174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.167.98.27
Aug 26 21:03:39 TORMINT sshd\[28174\]: Failed password for invalid user karin from 109.167.98.27 port 58236 ssh2
...
2019-08-27 09:29:08
218.111.88.185 attack
Aug 26 14:27:41 hiderm sshd\[10304\]: Invalid user sh from 218.111.88.185
Aug 26 14:27:41 hiderm sshd\[10304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.111.88.185
Aug 26 14:27:44 hiderm sshd\[10304\]: Failed password for invalid user sh from 218.111.88.185 port 33458 ssh2
Aug 26 14:33:09 hiderm sshd\[10798\]: Invalid user rpm from 218.111.88.185
Aug 26 14:33:09 hiderm sshd\[10798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.111.88.185
2019-08-27 08:46:08
49.207.109.63 attack
Aug 27 02:14:26 datentool sshd[19604]: Invalid user admin from 49.207.109.63
Aug 27 02:14:26 datentool sshd[19604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.109.63 
Aug 27 02:14:28 datentool sshd[19604]: Failed password for invalid user admin from 49.207.109.63 port 42818 ssh2
Aug 27 02:14:30 datentool sshd[19604]: Failed password for invalid user admin from 49.207.109.63 port 42818 ssh2
Aug 27 02:14:32 datentool sshd[19604]: Failed password for invalid user admin from 49.207.109.63 port 42818 ssh2
Aug 27 02:14:34 datentool sshd[19604]: Failed password for invalid user admin from 49.207.109.63 port 42818 ssh2
Aug 27 02:14:36 datentool sshd[19604]: Failed password for invalid user admin from 49.207.109.63 port 42818 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.207.109.63
2019-08-27 08:50:30
205.185.127.219 attack
Invalid user ubnt from 205.185.127.219 port 42822
2019-08-27 09:20:03
124.43.16.244 attackspam
Aug 27 03:15:46 localhost sshd\[20405\]: Invalid user signalhill from 124.43.16.244 port 36842
Aug 27 03:15:46 localhost sshd\[20405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.43.16.244
Aug 27 03:15:48 localhost sshd\[20405\]: Failed password for invalid user signalhill from 124.43.16.244 port 36842 ssh2
2019-08-27 09:22:39
201.89.50.221 attack
2019-08-27T01:15:04.096570abusebot-7.cloudsearch.cf sshd\[9097\]: Invalid user san from 201.89.50.221 port 44952
2019-08-27 09:27:54
222.175.126.74 attackbotsspam
Aug 27 02:53:31 ks10 sshd[28002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.175.126.74 
Aug 27 02:53:33 ks10 sshd[28002]: Failed password for invalid user ekain from 222.175.126.74 port 10255 ssh2
...
2019-08-27 08:53:44
162.158.75.187 attackbotsspam
162.158.75.187 - - [27/Aug/2019:00:41:23 +0100] "POST /wp-login.php HTTP/1.1" 200 1096 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-27 09:26:30
220.231.47.58 attackspam
Aug 26 15:19:09 friendsofhawaii sshd\[3930\]: Invalid user djmax from 220.231.47.58
Aug 26 15:19:09 friendsofhawaii sshd\[3930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.231.47.58
Aug 26 15:19:11 friendsofhawaii sshd\[3930\]: Failed password for invalid user djmax from 220.231.47.58 port 53300 ssh2
Aug 26 15:22:29 friendsofhawaii sshd\[4267\]: Invalid user alessia from 220.231.47.58
Aug 26 15:22:29 friendsofhawaii sshd\[4267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.231.47.58
2019-08-27 09:24:52
66.70.189.209 attack
Aug 27 03:43:28 srv-4 sshd\[21186\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.209  user=www-data
Aug 27 03:43:30 srv-4 sshd\[21186\]: Failed password for www-data from 66.70.189.209 port 41722 ssh2
Aug 27 03:47:12 srv-4 sshd\[21320\]: Invalid user rppt from 66.70.189.209
Aug 27 03:47:12 srv-4 sshd\[21320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.189.209
...
2019-08-27 08:47:27
179.241.229.83 attack
2019-08-27 00:45:54 H=179-241-229-83.3g.claro.net.br [179.241.229.83]:2897 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=179.241.229.83)
2019-08-27 00:45:56 unexpected disconnection while reading SMTP command from 179-241-229-83.3g.claro.net.br [179.241.229.83]:2897 I=[10.100.18.23]:25 (error: Connection reset by peer)
2019-08-27 01:38:20 H=179-241-229-83.3g.claro.net.br [179.241.229.83]:2881 I=[10.100.18.23]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=179.241.229.83)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=179.241.229.83
2019-08-27 09:13:07
106.12.56.218 attack
Aug 27 03:44:42 srv-4 sshd\[21212\]: Invalid user test from 106.12.56.218
Aug 27 03:44:42 srv-4 sshd\[21212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.56.218
Aug 27 03:44:44 srv-4 sshd\[21212\]: Failed password for invalid user test from 106.12.56.218 port 57548 ssh2
...
2019-08-27 09:09:11
144.217.79.233 attack
Aug 26 19:54:54 aat-srv002 sshd[31016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.79.233
Aug 26 19:54:56 aat-srv002 sshd[31016]: Failed password for invalid user ejabberd123 from 144.217.79.233 port 59870 ssh2
Aug 26 19:58:41 aat-srv002 sshd[31129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.79.233
Aug 26 19:58:44 aat-srv002 sshd[31129]: Failed password for invalid user 1qaz@WSX from 144.217.79.233 port 47910 ssh2
...
2019-08-27 09:02:39

最近上报的IP列表

163.80.112.151 223.21.14.211 30.162.242.210 125.106.163.8
114.14.155.47 142.171.46.84 180.164.159.81 195.20.114.199
86.213.137.183 220.189.146.167 234.29.215.254 49.225.219.70
160.179.15.218 95.60.129.109 160.112.187.198 18.208.200.206
243.147.135.110 196.131.101.191 248.206.78.84 133.134.208.3