必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Korea, Republic of

运营商(isp): Pusan National University

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): University/College/School

用户上报:
类型 评论内容 时间
attackbotsspam
May 27 14:17:34 pi sshd[26969]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.125.149.197 
May 27 14:17:36 pi sshd[26969]: Failed password for invalid user admin from 164.125.149.197 port 56408 ssh2
2020-07-24 06:29:29
attack
May 29 06:59:49 sip sshd[450734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.125.149.197 
May 29 06:59:49 sip sshd[450734]: Invalid user bi from 164.125.149.197 port 60494
May 29 06:59:51 sip sshd[450734]: Failed password for invalid user bi from 164.125.149.197 port 60494 ssh2
...
2020-05-29 13:54:57
attackbotsspam
May 28 08:13:51 NPSTNNYC01T sshd[15952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.125.149.197
May 28 08:13:53 NPSTNNYC01T sshd[15952]: Failed password for invalid user ubnt from 164.125.149.197 port 54770 ssh2
May 28 08:17:39 NPSTNNYC01T sshd[16280]: Failed password for root from 164.125.149.197 port 54094 ssh2
...
2020-05-28 21:41:43
attackbots
Invalid user james from 164.125.149.197 port 47784
2020-05-26 03:55:02
attackspambots
May  3 06:58:37 h1745522 sshd[20179]: Invalid user rundeck from 164.125.149.197 port 55818
May  3 06:58:37 h1745522 sshd[20179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.125.149.197
May  3 06:58:37 h1745522 sshd[20179]: Invalid user rundeck from 164.125.149.197 port 55818
May  3 06:58:39 h1745522 sshd[20179]: Failed password for invalid user rundeck from 164.125.149.197 port 55818 ssh2
May  3 07:03:03 h1745522 sshd[20303]: Invalid user nash from 164.125.149.197 port 38572
May  3 07:03:03 h1745522 sshd[20303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.125.149.197
May  3 07:03:03 h1745522 sshd[20303]: Invalid user nash from 164.125.149.197 port 38572
May  3 07:03:05 h1745522 sshd[20303]: Failed password for invalid user nash from 164.125.149.197 port 38572 ssh2
May  3 07:07:17 h1745522 sshd[20386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164
...
2020-05-03 13:13:04
attack
May  1 12:13:29 work-partkepr sshd\[3476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.125.149.197  user=root
May  1 12:13:31 work-partkepr sshd\[3476\]: Failed password for root from 164.125.149.197 port 56364 ssh2
...
2020-05-01 21:47:07
attackbots
2020-04-27T04:10:09.741900shield sshd\[31165\]: Invalid user deploy from 164.125.149.197 port 49208
2020-04-27T04:10:09.745330shield sshd\[31165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.125.149.197
2020-04-27T04:10:11.707053shield sshd\[31165\]: Failed password for invalid user deploy from 164.125.149.197 port 49208 ssh2
2020-04-27T04:14:47.951345shield sshd\[32241\]: Invalid user zxz from 164.125.149.197 port 33108
2020-04-27T04:14:47.953956shield sshd\[32241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.125.149.197
2020-04-27 14:30:02
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.125.149.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.125.149.197.		IN	A

;; AUTHORITY SECTION:
.			175	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042601 1800 900 604800 86400

;; Query time: 131 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 27 14:29:57 CST 2020
;; MSG SIZE  rcvd: 119
HOST信息:
Host 197.149.125.164.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.149.125.164.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
31.178.124.165 attackbots
3306/tcp 3306/tcp
[2019-10-30]2pkt
2019-10-30 23:47:58
69.64.85.167 attack
LGS,WP GET /wp-login.php
2019-10-30 23:58:20
94.191.39.69 attack
Oct 30 16:23:05 markkoudstaal sshd[11244]: Failed password for root from 94.191.39.69 port 59318 ssh2
Oct 30 16:29:45 markkoudstaal sshd[11873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.39.69
Oct 30 16:29:47 markkoudstaal sshd[11873]: Failed password for invalid user adam from 94.191.39.69 port 39742 ssh2
2019-10-31 00:16:47
101.109.247.190 attack
Automatic report - Port Scan Attack
2019-10-31 00:26:52
138.204.235.30 attack
Lines containing failures of 138.204.235.30
Oct 29 01:42:35 shared11 sshd[7816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.235.30  user=r.r
Oct 29 01:42:38 shared11 sshd[7816]: Failed password for r.r from 138.204.235.30 port 51014 ssh2
Oct 29 01:42:38 shared11 sshd[7816]: Received disconnect from 138.204.235.30 port 51014:11: Bye Bye [preauth]
Oct 29 01:42:38 shared11 sshd[7816]: Disconnected from authenticating user r.r 138.204.235.30 port 51014 [preauth]
Oct 29 01:57:12 shared11 sshd[12485]: Invalid user asconex from 138.204.235.30 port 40713
Oct 29 01:57:12 shared11 sshd[12485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.204.235.30
Oct 29 01:57:14 shared11 sshd[12485]: Failed password for invalid user asconex from 138.204.235.30 port 40713 ssh2
Oct 29 01:57:14 shared11 sshd[12485]: Received disconnect from 138.204.235.30 port 40713:11: Bye Bye [preauth]
Oct 29 01:57........
------------------------------
2019-10-31 00:04:51
79.137.68.86 attackspambots
scan z
2019-10-31 00:18:52
197.254.193.230 attack
445/tcp 445/tcp 445/tcp
[2019-10-30]3pkt
2019-10-31 00:01:26
121.34.35.123 attackbotsspam
Oct 30 06:18:39 mxgate1 postfix/postscreen[10450]: CONNECT from [121.34.35.123]:27220 to [176.31.12.44]:25
Oct 30 06:18:39 mxgate1 postfix/dnsblog[10451]: addr 121.34.35.123 listed by domain cbl.abuseat.org as 127.0.0.2
Oct 30 06:18:39 mxgate1 postfix/dnsblog[10453]: addr 121.34.35.123 listed by domain zen.spamhaus.org as 127.0.0.3
Oct 30 06:18:39 mxgate1 postfix/dnsblog[10453]: addr 121.34.35.123 listed by domain zen.spamhaus.org as 127.0.0.11
Oct 30 06:18:39 mxgate1 postfix/dnsblog[10453]: addr 121.34.35.123 listed by domain zen.spamhaus.org as 127.0.0.4
Oct 30 06:18:39 mxgate1 postfix/dnsblog[10454]: addr 121.34.35.123 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Oct 30 06:18:39 mxgate1 postfix/dnsblog[10455]: addr 121.34.35.123 listed by domain b.barracudacentral.org as 127.0.0.2
Oct 30 06:18:45 mxgate1 postfix/postscreen[10450]: DNSBL rank 5 for [121.34.35.123]:27220
Oct x@x
Oct 30 06:18:46 mxgate1 postfix/postscreen[10450]: DISCONNECT [121.34.35.123]:27220


........
-------------------------------
2019-10-30 23:53:15
179.180.244.50 attackbots
" "
2019-10-30 23:42:06
31.185.11.173 attack
445/tcp 445/tcp 445/tcp
[2019-10-30]3pkt
2019-10-31 00:03:40
54.36.214.76 attack
2019-10-30T17:08:16.290442mail01 postfix/smtpd[9723]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T17:08:49.481471mail01 postfix/smtpd[19280]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T17:09:34.403244mail01 postfix/smtpd[24064]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-30T17:09:34.403650mail01 postfix/smtpd[19280]: warning: ip76.ip-54-36-214.eu[54.36.214.76]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-31 00:26:31
122.51.57.114 attackspambots
Oct 30 14:03:00 site3 sshd\[104701\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.57.114  user=root
Oct 30 14:03:03 site3 sshd\[104701\]: Failed password for root from 122.51.57.114 port 53086 ssh2
Oct 30 14:07:57 site3 sshd\[104782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.57.114  user=root
Oct 30 14:07:59 site3 sshd\[104782\]: Failed password for root from 122.51.57.114 port 34940 ssh2
Oct 30 14:12:47 site3 sshd\[104924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.57.114  user=root
...
2019-10-30 23:40:38
196.28.101.63 attackbotsspam
Unauthorised access (Oct 30) SRC=196.28.101.63 LEN=40 TOS=0x10 PREC=0x40 TTL=240 ID=3808 TCP DPT=445 WINDOW=1024 SYN
2019-10-31 00:08:31
37.133.22.255 attackspambots
Oct 29 02:03:23 indra sshd[89961]: Invalid user pi from 37.133.22.255
Oct 29 02:03:24 indra sshd[89961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.133.22.255 
Oct 29 02:03:24 indra sshd[89963]: Invalid user pi from 37.133.22.255
Oct 29 02:03:24 indra sshd[89963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.133.22.255 
Oct 29 02:03:26 indra sshd[89961]: Failed password for invalid user pi from 37.133.22.255 port 32778 ssh2
Oct 29 02:03:26 indra sshd[89961]: Connection closed by 37.133.22.255 [preauth]
Oct 29 02:03:26 indra sshd[89963]: Failed password for invalid user pi from 37.133.22.255 port 32782 ssh2
Oct 29 02:03:26 indra sshd[89963]: Connection closed by 37.133.22.255 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.133.22.255
2019-10-31 00:10:59
171.118.11.156 attackbots
23/tcp
[2019-10-30]1pkt
2019-10-30 23:39:30

最近上报的IP列表

148.229.3.242 58.23.49.87 136.169.168.118 125.161.104.210
189.237.117.123 134.122.79.3 14.226.204.161 3.127.73.233
183.156.78.198 124.108.58.79 203.81.71.210 114.216.194.100
45.190.220.53 197.217.70.65 14.177.248.215 178.255.168.249
120.196.188.210 14.172.48.199 177.16.207.161 222.97.237.248