必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America

运营商(isp): Censys Inc.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
 TCP (SYN) 162.142.125.21:21423 -> port 81, len 44
2020-09-18 01:59:25
attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-17 18:01:39
attack
Sep 16 14:19:24 : SSH login attempts with invalid user
2020-09-17 09:14:18
attackbotsspam
firewall-block, port(s): 3389/tcp
2020-09-13 02:29:44
attack
 TCP (SYN) 162.142.125.21:55472 -> port 623, len 44
2020-09-12 18:32:41
attackbots
 TCP (SYN) 162.142.125.21:59806 -> port 2323, len 44
2020-09-08 21:37:06
attackbots
Port scanning [5 denied]
2020-09-08 13:28:43
attack
 TCP (SYN) 162.142.125.21:14984 -> port 80, len 44
2020-09-08 06:02:50
attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-24 23:19:08
attack
Unwanted checking 80 or 443 port
...
2020-08-23 13:29:05
相同子网IP讨论:
IP 类型 评论内容 时间
162.142.125.86 botsattack
Bad IP
2025-03-06 19:09:23
162.142.125.197 attackproxy
Fraud connect
2024-09-05 12:48:39
162.142.125.12 proxy
Scan
2023-06-05 16:37:12
162.142.125.11 proxy
VPN fraud
2023-06-05 12:59:49
162.142.125.223 proxy
VPN fraud
2023-05-31 21:46:50
162.142.125.225 proxy
VPN fraud
2023-05-29 12:47:59
162.142.125.84 proxy
VPN scan
2023-05-22 12:51:31
162.142.125.224 proxy
VPN fraud
2023-05-18 12:47:47
162.142.125.89 proxy
VPN f
2023-05-13 12:57:08
162.142.125.217 proxy
VPN fraud
2023-05-13 12:54:50
162.142.125.14 proxy
VPN fraud
2023-05-12 14:21:18
162.142.125.214 proxy
VPN fraud
2023-03-31 12:54:37
162.142.125.87 proxy
VPN fraud
2023-03-29 12:58:45
162.142.125.13 proxy
VPN fraud
2023-03-29 12:56:42
162.142.125.10 attack
DANGER DUDE ATTACK
2022-02-18 10:02:36
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.142.125.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57040
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;162.142.125.21.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 23 13:28:59 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
21.125.142.162.in-addr.arpa domain name pointer scanner-01.ch1.censys-scanner.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.125.142.162.in-addr.arpa	name = scanner-01.ch1.censys-scanner.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
176.212.104.19 attack
SP-Scan 3133:23 detected 2020.10.04 06:37:41
blocked until 2020.11.22 22:40:28
2020-10-05 07:17:26
175.151.231.250 attackspambots
23/tcp 23/tcp
[2020-10-01/02]2pkt
2020-10-05 07:03:51
189.51.118.22 attackspam
 TCP (SYN) 189.51.118.22:43838 -> port 445, len 44
2020-10-05 07:19:57
185.132.53.14 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-05 07:36:53
118.43.97.168 attack
Automatic report - Banned IP Access
2020-10-05 07:29:15
165.227.195.122 attackbots
Automatic report - XMLRPC Attack
2020-10-05 07:34:34
157.245.237.33 attack
Oct  4 00:49:59 web1 sshd\[18508\]: Invalid user telnet from 157.245.237.33
Oct  4 00:49:59 web1 sshd\[18508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.237.33
Oct  4 00:50:02 web1 sshd\[18508\]: Failed password for invalid user telnet from 157.245.237.33 port 44202 ssh2
Oct  4 00:53:15 web1 sshd\[18761\]: Invalid user dennis from 157.245.237.33
Oct  4 00:53:15 web1 sshd\[18761\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.237.33
2020-10-05 07:34:46
62.114.123.136 attackspambots
Unauthorized connection attempt from IP address 62.114.123.136 on Port 445(SMB)
2020-10-05 07:24:34
106.12.214.128 attackspam
Found on   CINS badguys     / proto=6  .  srcport=52002  .  dstport=10679  .     (1272)
2020-10-05 07:10:39
45.142.120.149 attackbots
Oct  5 01:13:30 srv01 postfix/smtpd\[24596\]: warning: unknown\[45.142.120.149\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 01:13:39 srv01 postfix/smtpd\[23028\]: warning: unknown\[45.142.120.149\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 01:13:40 srv01 postfix/smtpd\[23016\]: warning: unknown\[45.142.120.149\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 01:13:44 srv01 postfix/smtpd\[17888\]: warning: unknown\[45.142.120.149\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  5 01:13:49 srv01 postfix/smtpd\[23035\]: warning: unknown\[45.142.120.149\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-05 07:26:03
103.129.95.34 attackspambots
139/tcp 445/tcp
[2020-10-01]2pkt
2020-10-05 07:12:59
112.85.42.117 attackbots
2020-10-04T06:15:40.559159correo.[domain] sshd[26082]: Failed password for root from 112.85.42.117 port 22172 ssh2 2020-10-04T06:15:44.137669correo.[domain] sshd[26082]: Failed password for root from 112.85.42.117 port 22172 ssh2 2020-10-04T06:15:47.263576correo.[domain] sshd[26082]: Failed password for root from 112.85.42.117 port 22172 ssh2 ...
2020-10-05 07:02:14
37.205.51.40 attackbots
Oct  4 23:50:58 xeon sshd[52055]: Failed password for root from 37.205.51.40 port 44180 ssh2
2020-10-05 07:12:01
122.176.94.202 attackbots
 TCP (SYN) 122.176.94.202:56827 -> port 445, len 52
2020-10-05 07:37:54
190.203.88.235 attack
445/tcp
[2020-10-03]1pkt
2020-10-05 07:33:30

最近上报的IP列表

151.233.52.89 107.158.202.162 79.92.30.131 3.227.217.65
109.108.53.30 137.74.192.62 190.245.95.122 181.215.88.146
207.244.118.125 96.35.110.212 5.206.227.225 198.74.51.217
191.13.5.246 178.128.167.139 242.196.163.109 185.127.9.95
1.244.46.33 74.41.65.238 122.215.157.227 51.89.25.74