必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): None

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.54.82.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19281
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.54.82.125.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 02:18:01 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 125.82.54.150.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.82.54.150.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
85.211.127.124 attackbotsspam
14.07.2019 02:34:01 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2019-07-14 13:58:26
103.61.37.14 attackspambots
2019-07-14T05:14:52.589449abusebot-8.cloudsearch.cf sshd\[5080\]: Invalid user admin from 103.61.37.14 port 44480
2019-07-14 13:45:02
14.37.38.213 attackbots
Jul 14 06:57:59 v22019058497090703 sshd[19983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.37.38.213
Jul 14 06:58:01 v22019058497090703 sshd[19983]: Failed password for invalid user plex from 14.37.38.213 port 49484 ssh2
Jul 14 07:03:48 v22019058497090703 sshd[20316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.37.38.213
...
2019-07-14 13:48:21
104.248.161.244 attackbotsspam
Jul 14 04:43:05 MK-Soft-VM6 sshd\[30104\]: Invalid user adidas from 104.248.161.244 port 35360
Jul 14 04:43:05 MK-Soft-VM6 sshd\[30104\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.161.244
Jul 14 04:43:07 MK-Soft-VM6 sshd\[30104\]: Failed password for invalid user adidas from 104.248.161.244 port 35360 ssh2
...
2019-07-14 13:25:30
190.40.64.194 attack
SSH/22 MH Probe, BF, Hack -
2019-07-14 14:13:42
153.36.236.151 attack
2019-07-14T05:48:55.107197abusebot-4.cloudsearch.cf sshd\[13576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.151  user=root
2019-07-14 14:06:10
180.250.205.114 attack
Jul 14 07:26:05 legacy sshd[17716]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.205.114
Jul 14 07:26:07 legacy sshd[17716]: Failed password for invalid user mysql from 180.250.205.114 port 52942 ssh2
Jul 14 07:31:59 legacy sshd[17860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.205.114
...
2019-07-14 14:06:45
106.13.4.172 attack
SSH Bruteforce attack
2019-07-14 14:18:04
92.8.180.40 attack
Caught in portsentry honeypot
2019-07-14 14:04:25
137.74.44.162 attackbots
Jul 14 07:52:28 SilenceServices sshd[17790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.44.162
Jul 14 07:52:30 SilenceServices sshd[17790]: Failed password for invalid user sha from 137.74.44.162 port 39205 ssh2
Jul 14 07:57:00 SilenceServices sshd[20647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.44.162
2019-07-14 14:17:27
209.95.51.11 attack
Jul 14 04:29:33 ns3367391 sshd\[10332\]: Invalid user Administrator from 209.95.51.11 port 41512
Jul 14 04:29:34 ns3367391 sshd\[10332\]: Failed password for invalid user Administrator from 209.95.51.11 port 41512 ssh2
...
2019-07-14 13:29:00
139.199.174.58 attack
Invalid user backuppc from 139.199.174.58 port 41394
2019-07-14 13:44:26
177.66.226.101 attackspambots
$f2bV_matches
2019-07-14 13:24:36
207.46.13.85 attack
Automatic report - Banned IP Access
2019-07-14 13:46:31
200.189.15.221 attack
$f2bV_matches
2019-07-14 13:29:28

最近上报的IP列表

191.243.0.156 167.163.145.138 141.217.122.202 162.94.226.133
73.252.102.235 249.64.235.184 244.142.211.220 219.185.121.124
58.85.48.38 165.174.41.240 245.197.181.38 71.142.103.17
56.235.65.176 154.159.37.218 221.191.14.37 236.56.202.90
49.62.40.45 39.164.189.244 67.101.27.87 86.145.124.166