必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America

运营商(isp): Censys Inc.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbotsspam
Multiport scan 48 ports : 2 21 23 53 81(x2) 83(x2) 88(x3) 110(x2) 123 143(x2) 161 222(x3) 445 465(x2) 591(x2) 623(x2) 631 990(x3) 993(x2) 995 1194(x2) 1311 1883 2082 2222 2323 3306(x2) 5432 5632(x2) 5672(x2) 5683(x3) 5684 5900(x2) 5901 5902(x2) 5903(x2) 6443 8080 8081 8088(x2) 8089(x2) 8443 8888 9090(x2) 9200 16992 16993 20000(x3)
2020-10-05 05:44:48
attackspambots
 TCP (SYN) 162.142.125.18:20616 -> port 5900, len 44
2020-10-04 21:40:54
attackspam
firewall-block, port(s): 20000/tcp
2020-10-04 13:27:20
attackspam
 TCP (SYN) 162.142.125.18:16923 -> port 80, len 44
2020-09-30 03:54:40
attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-09-29 20:01:49
attackbots
Unauthorized connection attempt from IP address 162.142.125.18 on Port 445(SMB)
2020-09-29 12:09:57
attackspambots
 TCP (SYN) 162.142.125.18:57317 -> port 3306, len 44
2020-08-28 00:40:28
相同子网IP讨论:
IP 类型 评论内容 时间
162.142.125.86 botsattack
Bad IP
2025-03-06 19:09:23
162.142.125.197 attackproxy
Fraud connect
2024-09-05 12:48:39
162.142.125.12 proxy
Scan
2023-06-05 16:37:12
162.142.125.11 proxy
VPN fraud
2023-06-05 12:59:49
162.142.125.223 proxy
VPN fraud
2023-05-31 21:46:50
162.142.125.225 proxy
VPN fraud
2023-05-29 12:47:59
162.142.125.84 proxy
VPN scan
2023-05-22 12:51:31
162.142.125.224 proxy
VPN fraud
2023-05-18 12:47:47
162.142.125.89 proxy
VPN f
2023-05-13 12:57:08
162.142.125.217 proxy
VPN fraud
2023-05-13 12:54:50
162.142.125.14 proxy
VPN fraud
2023-05-12 14:21:18
162.142.125.214 proxy
VPN fraud
2023-03-31 12:54:37
162.142.125.87 proxy
VPN fraud
2023-03-29 12:58:45
162.142.125.13 proxy
VPN fraud
2023-03-29 12:56:42
162.142.125.10 attack
DANGER DUDE ATTACK
2022-02-18 10:02:36
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.142.125.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;162.142.125.18.			IN	A

;; AUTHORITY SECTION:
.			549	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082701 1800 900 604800 86400

;; Query time: 117 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 28 00:40:18 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
18.125.142.162.in-addr.arpa domain name pointer scanner-01.ch1.censys-scanner.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.125.142.162.in-addr.arpa	name = scanner-01.ch1.censys-scanner.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.6.116 attack
Invalid user tc from 106.13.6.116 port 50434
2020-03-11 16:28:25
178.134.21.38 attack
CMS (WordPress or Joomla) login attempt.
2020-03-11 16:34:51
213.251.41.52 attackbots
Invalid user test3 from 213.251.41.52 port 51066
2020-03-11 16:20:07
106.116.118.89 attackspambots
Invalid user research from 106.116.118.89 port 35718
2020-03-11 16:27:32
206.189.188.223 attack
Invalid user user from 206.189.188.223 port 35266
2020-03-11 16:20:31
46.38.145.164 attackspam
Brute force attack
2020-03-11 16:12:21
195.231.3.21 attackspambots
(smtpauth) Failed SMTP AUTH login from 195.231.3.21 (IT/Italy/host21-3-231-195.serverdedicati.aruba.it): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-03-11 09:14:21 login authenticator failed for (USER) [195.231.3.21]: 535 Incorrect authentication data (set_id=info@toliddaru.ir)
2020-03-11 16:06:51
106.12.70.112 attack
Invalid user lingqi from 106.12.70.112 port 46042
2020-03-11 16:29:02
157.230.239.99 attackbotsspam
Invalid user alex from 157.230.239.99 port 54640
2020-03-11 16:23:42
182.61.49.179 attack
Mar 11 03:08:03 ns381471 sshd[26166]: Failed password for root from 182.61.49.179 port 44938 ssh2
2020-03-11 15:59:57
139.59.94.225 attackspambots
Invalid user angel from 139.59.94.225 port 43054
2020-03-11 16:25:07
206.189.196.95 attackbotsspam
[portscan] Port scan
2020-03-11 15:57:20
36.72.148.89 attackbots
DATE:2020-03-11 03:07:30, IP:36.72.148.89, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-03-11 16:06:07
90.46.51.18 attackspambots
Invalid user ian from 90.46.51.18 port 46558
2020-03-11 16:29:52
122.14.196.133 attackspam
Invalid user test from 122.14.196.133 port 41222
2020-03-11 16:37:19

最近上报的IP列表

180.254.60.82 125.25.44.57 106.53.229.196 203.192.230.222
59.95.145.54 45.142.120.209 212.102.57.138 179.176.13.85
120.9.84.63 83.96.11.210 23.106.123.32 83.8.234.209
202.153.33.50 188.92.209.170 49.235.114.186 39.38.99.217
5.173.16.12 113.134.215.20 110.54.246.140 219.100.37.1