必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
20.52.52.144 attackbotsspam
Unauthorized connection attempt detected from IP address 20.52.52.144 to port 7002
2020-08-01 19:48:08
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.52.52.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.52.52.125.			IN	A

;; AUTHORITY SECTION:
.			230	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011201 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 13 03:55:31 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 125.52.52.20.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.52.52.20.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
202.106.93.46 attackbotsspam
Nov 29 07:39:53 hpm sshd\[778\]: Invalid user foh from 202.106.93.46
Nov 29 07:39:53 hpm sshd\[778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
Nov 29 07:39:54 hpm sshd\[778\]: Failed password for invalid user foh from 202.106.93.46 port 54971 ssh2
Nov 29 07:44:45 hpm sshd\[1207\]: Invalid user apache from 202.106.93.46
Nov 29 07:44:45 hpm sshd\[1207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.106.93.46
2019-11-30 01:59:23
163.172.191.192 attack
Nov 29 17:11:24 zeus sshd[21536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.191.192 
Nov 29 17:11:27 zeus sshd[21536]: Failed password for invalid user test from 163.172.191.192 port 43918 ssh2
Nov 29 17:14:36 zeus sshd[21584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.191.192 
Nov 29 17:14:37 zeus sshd[21584]: Failed password for invalid user test from 163.172.191.192 port 52132 ssh2
2019-11-30 01:28:50
14.139.120.141 attack
Nov 29 18:07:28 server sshd\[32506\]: Invalid user fang from 14.139.120.141
Nov 29 18:07:28 server sshd\[32506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.141 
Nov 29 18:07:30 server sshd\[32506\]: Failed password for invalid user fang from 14.139.120.141 port 35818 ssh2
Nov 29 18:11:44 server sshd\[1165\]: Invalid user test from 14.139.120.141
Nov 29 18:11:44 server sshd\[1165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.120.141 
...
2019-11-30 01:30:54
186.38.19.1 attackspambots
Spam Timestamp : 29-Nov-19 14:30   BlockList Provider  combined abuse   (550)
2019-11-30 01:39:34
165.22.76.53 attackspam
Invalid user geam from 165.22.76.53 port 33400
2019-11-30 01:53:09
95.86.34.46 attack
Automatic report - Port Scan Attack
2019-11-30 01:57:22
171.251.119.226 attack
Spam Timestamp : 29-Nov-19 14:15   BlockList Provider  combined abuse   (547)
2019-11-30 01:41:22
51.38.51.108 attackspambots
Nov 29 18:15:44 SilenceServices sshd[9344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.51.108
Nov 29 18:15:46 SilenceServices sshd[9344]: Failed password for invalid user oracle from 51.38.51.108 port 60188 ssh2
Nov 29 18:18:38 SilenceServices sshd[10107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.51.108
2019-11-30 01:29:41
185.175.93.25 attackbots
11/29/2019-16:11:37.029659 185.175.93.25 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-30 01:33:56
116.239.107.113 attackspambots
Nov 29 10:01:48 eola postfix/smtpd[17797]: connect from unknown[116.239.107.113]
Nov 29 10:01:50 eola postfix/smtpd[17797]: lost connection after AUTH from unknown[116.239.107.113]
Nov 29 10:01:50 eola postfix/smtpd[17797]: disconnect from unknown[116.239.107.113] ehlo=1 auth=0/1 commands=1/2
Nov 29 10:01:50 eola postfix/smtpd[17797]: connect from unknown[116.239.107.113]
Nov 29 10:01:51 eola postfix/smtpd[17797]: lost connection after AUTH from unknown[116.239.107.113]
Nov 29 10:01:51 eola postfix/smtpd[17797]: disconnect from unknown[116.239.107.113] ehlo=1 auth=0/1 commands=1/2
Nov 29 10:01:51 eola postfix/smtpd[17797]: connect from unknown[116.239.107.113]
Nov 29 10:01:53 eola postfix/smtpd[17797]: lost connection after AUTH from unknown[116.239.107.113]
Nov 29 10:01:53 eola postfix/smtpd[17797]: disconnect from unknown[116.239.107.113] ehlo=1 auth=0/1 commands=1/2
Nov 29 10:01:56 eola postfix/smtpd[17797]: connect from unknown[116.239.107.113]
Nov 29 10:01:57 eola ........
-------------------------------
2019-11-30 01:32:34
138.197.5.191 attackbots
Invalid user teste from 138.197.5.191 port 38212
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.5.191
Failed password for invalid user teste from 138.197.5.191 port 38212 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.5.191  user=root
Failed password for root from 138.197.5.191 port 45638 ssh2
2019-11-30 01:32:01
92.63.196.10 attack
TCP Port Scanning
2019-11-30 01:19:38
37.70.132.170 attack
Nov 29 06:45:37 wbs sshd\[3592\]: Invalid user katsuto from 37.70.132.170
Nov 29 06:45:37 wbs sshd\[3592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.132.70.37.rev.sfr.net
Nov 29 06:45:39 wbs sshd\[3592\]: Failed password for invalid user katsuto from 37.70.132.170 port 47652 ssh2
Nov 29 06:51:45 wbs sshd\[4121\]: Invalid user ching from 37.70.132.170
Nov 29 06:51:45 wbs sshd\[4121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.132.70.37.rev.sfr.net
2019-11-30 01:15:10
159.89.165.7 attackbots
Lines containing failures of 159.89.165.7
Nov 29 15:55:37 shared02 sshd[32623]: Invalid user bianca from 159.89.165.7 port 54460
Nov 29 15:55:37 shared02 sshd[32623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.165.7
Nov 29 15:55:39 shared02 sshd[32623]: Failed password for invalid user bianca from 159.89.165.7 port 54460 ssh2
Nov 29 15:55:40 shared02 sshd[32623]: Received disconnect from 159.89.165.7 port 54460:11: Bye Bye [preauth]
Nov 29 15:55:40 shared02 sshd[32623]: Disconnected from invalid user bianca 159.89.165.7 port 54460 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=159.89.165.7
2019-11-30 01:51:21
113.110.214.76 attackspam
port scan/probe/communication attempt
2019-11-30 01:13:29

最近上报的IP列表

52.50.82.176 84.37.89.41 154.163.132.222 177.211.57.202
142.45.31.169 137.8.39.168 134.116.226.22 48.165.150.2
178.85.75.88 6.121.97.220 177.4.231.51 82.38.162.17
206.206.1.99 138.121.172.133 100.205.183.49 74.23.96.78
200.190.121.142 61.104.192.17 44.77.132.19 30.44.168.28