必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): KDDI Corporation

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.48.125.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 958
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.48.125.126.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 17:10:44 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 126.125.48.163.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 126.125.48.163.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
80.82.65.90 attackspam
Nov 26 09:38:36 mc1 kernel: \[6043748.212737\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.90 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=63067 PROTO=TCP SPT=8080 DPT=9654 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 26 09:40:19 mc1 kernel: \[6043851.230351\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.90 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=34330 PROTO=TCP SPT=8080 DPT=4000 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 26 09:43:11 mc1 kernel: \[6044023.234511\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.90 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=41208 PROTO=TCP SPT=8080 DPT=33789 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-26 20:19:28
82.102.20.165 attackbotsspam
2019-11-26T07:23:48.479006abusebot-4.cloudsearch.cf sshd\[21061\]: Invalid user admin from 82.102.20.165 port 27053
2019-11-26 20:24:19
218.92.0.171 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Failed password for root from 218.92.0.171 port 20371 ssh2
Failed password for root from 218.92.0.171 port 20371 ssh2
Failed password for root from 218.92.0.171 port 20371 ssh2
Failed password for root from 218.92.0.171 port 20371 ssh2
2019-11-26 20:34:34
45.136.109.95 attackspam
11/26/2019-12:41:45.668476 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 42
2019-11-26 20:33:10
175.119.91.147 attack
" "
2019-11-26 20:42:52
193.188.22.229 attackspambots
2019-11-26T05:50:40.0925631495-001 sshd\[9955\]: Failed password for invalid user admin from 193.188.22.229 port 47337 ssh2
2019-11-26T07:32:22.5321201495-001 sshd\[13570\]: Invalid user admin from 193.188.22.229 port 44680
2019-11-26T07:32:22.6418801495-001 sshd\[13570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.229
2019-11-26T07:32:24.4137191495-001 sshd\[13570\]: Failed password for invalid user admin from 193.188.22.229 port 44680 ssh2
2019-11-26T07:32:25.3543141495-001 sshd\[13572\]: Invalid user admin from 193.188.22.229 port 47968
2019-11-26T07:32:25.4646041495-001 sshd\[13572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.229
...
2019-11-26 20:46:42
193.70.2.117 attackspambots
Nov 26 12:09:26 ns381471 sshd[12199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.2.117
Nov 26 12:09:27 ns381471 sshd[12199]: Failed password for invalid user huu from 193.70.2.117 port 34690 ssh2
2019-11-26 20:36:44
116.106.31.245 attack
11/26/2019-13:25:43.347977 116.106.31.245 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-26 20:29:03
150.164.110.35 attackspam
Fail2Ban Ban Triggered
2019-11-26 20:45:53
46.101.168.144 attackbots
Nov 26 12:22:04 freedom sshd\[13694\]: Invalid user redhat from 46.101.168.144 port 46908
Nov 26 12:22:28 freedom sshd\[13698\]: Invalid user redhat from 46.101.168.144 port 51092
Nov 26 12:22:53 freedom sshd\[13705\]: Invalid user redhat from 46.101.168.144 port 55282
Nov 26 12:23:18 freedom sshd\[13709\]: Invalid user redhat from 46.101.168.144 port 59480
Nov 26 12:23:44 freedom sshd\[13712\]: Invalid user redhat from 46.101.168.144 port 35456
...
2019-11-26 20:47:59
114.67.82.158 attackspambots
11/26/2019-06:54:10.051798 114.67.82.158 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-26 20:23:08
213.32.91.37 attackbots
Nov 26 04:59:19 linuxvps sshd\[48634\]: Invalid user poiuyt from 213.32.91.37
Nov 26 04:59:19 linuxvps sshd\[48634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.91.37
Nov 26 04:59:22 linuxvps sshd\[48634\]: Failed password for invalid user poiuyt from 213.32.91.37 port 57364 ssh2
Nov 26 05:05:17 linuxvps sshd\[52259\]: Invalid user rom from 213.32.91.37
Nov 26 05:05:17 linuxvps sshd\[52259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.91.37
2019-11-26 20:10:35
178.128.81.125 attackbots
2019-11-26T09:22:16.9036661240 sshd\[15568\]: Invalid user butter from 178.128.81.125 port 44935
2019-11-26T09:22:16.9076641240 sshd\[15568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.125
2019-11-26T09:22:19.2834641240 sshd\[15568\]: Failed password for invalid user butter from 178.128.81.125 port 44935 ssh2
...
2019-11-26 20:16:41
188.213.212.70 attack
Nov 26 07:21:47  exim[2120]: [1\51] 1iZUEM-0000YC-0L H=primer.yarkaci.com (primer.hanhlee.com) [188.213.212.70] F= rejected after DATA: This message scored 101.3 spam points.
2019-11-26 20:26:57
118.173.85.88 attackbots
Unauthorised access (Nov 26) SRC=118.173.85.88 LEN=52 TTL=116 ID=10469 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-26 20:46:10

最近上报的IP列表

109.207.170.186 42.19.79.42 167.137.92.226 41.226.174.139
162.52.129.239 118.126.136.118 248.3.38.156 37.75.185.13
107.2.38.250 109.35.59.254 135.164.184.16 151.110.220.224
21.100.244.65 177.84.164.9 213.2.249.115 97.242.176.160
67.66.182.57 244.40.71.34 195.198.222.219 53.182.233.252