必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Colombia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 201.190.125.130
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11002
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;201.190.125.130.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 23:23:49 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
130.125.190.201.in-addr.arpa domain name pointer adsl-201-190-125-130.une.net.co.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
130.125.190.201.in-addr.arpa	name = adsl-201-190-125-130.une.net.co.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.159.111.228 attack
xmlrpc attack
2020-09-19 17:09:26
122.51.92.116 attackspam
Sep 19 10:07:08 ovpn sshd\[22634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.116  user=root
Sep 19 10:07:10 ovpn sshd\[22634\]: Failed password for root from 122.51.92.116 port 52822 ssh2
Sep 19 10:13:06 ovpn sshd\[24077\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.116  user=root
Sep 19 10:13:08 ovpn sshd\[24077\]: Failed password for root from 122.51.92.116 port 39424 ssh2
Sep 19 10:15:49 ovpn sshd\[24787\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.116  user=root
2020-09-19 17:20:27
196.207.30.179 attackbotsspam
Brute forcing RDP port 3389
2020-09-19 17:24:13
193.228.91.11 attackbots
Sep 19 11:43:49 server2 sshd\[21834\]: User root from 193.228.91.11 not allowed because not listed in AllowUsers
Sep 19 11:44:17 server2 sshd\[21881\]: Invalid user oracle from 193.228.91.11
Sep 19 11:44:46 server2 sshd\[21897\]: User root from 193.228.91.11 not allowed because not listed in AllowUsers
Sep 19 11:45:13 server2 sshd\[22102\]: Invalid user postgres from 193.228.91.11
Sep 19 11:45:40 server2 sshd\[22132\]: User root from 193.228.91.11 not allowed because not listed in AllowUsers
Sep 19 11:46:07 server2 sshd\[22171\]: Invalid user hadoop from 193.228.91.11
2020-09-19 17:11:54
211.143.255.70 attackspambots
2020-09-19T04:30:32.109343abusebot-7.cloudsearch.cf sshd[27816]: Invalid user jenkins from 211.143.255.70 port 2064
2020-09-19T04:30:32.117549abusebot-7.cloudsearch.cf sshd[27816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.255.70
2020-09-19T04:30:32.109343abusebot-7.cloudsearch.cf sshd[27816]: Invalid user jenkins from 211.143.255.70 port 2064
2020-09-19T04:30:34.179662abusebot-7.cloudsearch.cf sshd[27816]: Failed password for invalid user jenkins from 211.143.255.70 port 2064 ssh2
2020-09-19T04:35:16.486159abusebot-7.cloudsearch.cf sshd[27942]: Invalid user test from 211.143.255.70 port 29811
2020-09-19T04:35:16.500290abusebot-7.cloudsearch.cf sshd[27942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.143.255.70
2020-09-19T04:35:16.486159abusebot-7.cloudsearch.cf sshd[27942]: Invalid user test from 211.143.255.70 port 29811
2020-09-19T04:35:18.552145abusebot-7.cloudsearch.cf sshd[27942]
...
2020-09-19 17:27:42
37.187.7.95 attack
Sep 19 10:38:56 ns381471 sshd[3314]: Failed password for root from 37.187.7.95 port 52688 ssh2
2020-09-19 17:20:56
107.132.88.42 attack
Sep 19 14:03:15 gw1 sshd[28248]: Failed password for root from 107.132.88.42 port 42944 ssh2
Sep 19 14:10:10 gw1 sshd[28600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.132.88.42
...
2020-09-19 17:17:17
146.185.25.187 attackbotsspam
Automatic report - Port Scan Attack
2020-09-19 17:02:52
114.104.139.68 attackbotsspam
Lines containing failures of 114.104.139.68
Sep 19 03:18:58 neweola postfix/smtpd[29829]: connect from unknown[114.104.139.68]
Sep 19 03:19:00 neweola postfix/smtpd[29829]: NOQUEUE: reject: RCPT from unknown[114.104.139.68]: 504 5.5.2 : Helo command rejected: need fully-qualified hostname; from=x@x helo=
Sep 19 03:19:00 neweola postfix/smtpd[29829]: disconnect from unknown[114.104.139.68] ehlo=2 starttls=1 mail=1 rcpt=0/1 quhostname=1 commands=5/6
Sep 19 03:19:02 neweola postfix/smtpd[29829]: connect from unknown[114.104.139.68]
Sep 19 03:19:04 neweola postfix/smtpd[29829]: lost connection after AUTH from unknown[114.104.139.68]
Sep 19 03:19:04 neweola postfix/smtpd[29829]: disconnect from unknown[114.104.139.68] ehlo=2 starttls=1 auth=0/1 commands=3/4
Sep 19 03:19:04 neweola postfix/smtpd[29829]: connect from unknown[114.104.139.68]
Sep 19 03:19:07 neweola postfix/smtpd[29829]: lost connection after AUTH from unknown[114.104.139.68]
Sep 19 03:19:07 neweol........
------------------------------
2020-09-19 17:07:47
52.203.153.231 attackbots
52.203.153.231 - - [19/Sep/2020:09:51:26 +0100] "POST /wp-login.php HTTP/1.1" 200 2221 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.203.153.231 - - [19/Sep/2020:09:51:27 +0100] "POST /wp-login.php HTTP/1.1" 200 2147 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.203.153.231 - - [19/Sep/2020:09:51:28 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-19 17:21:55
59.126.108.47 attackspambots
Invalid user user from 59.126.108.47 port 50181
2020-09-19 17:09:03
60.167.177.95 attackbots
<6 unauthorized SSH connections
2020-09-19 17:30:47
125.69.82.14 attackspambots
2020-09-19T09:24:26.003039upcloud.m0sh1x2.com sshd[1098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.69.82.14  user=root
2020-09-19T09:24:28.102437upcloud.m0sh1x2.com sshd[1098]: Failed password for root from 125.69.82.14 port 34592 ssh2
2020-09-19 17:37:26
141.98.10.211 attack
detected by Fail2Ban
2020-09-19 17:31:09
23.225.240.242 attack
 TCP (SYN) 23.225.240.242:44412 -> port 1433, len 44
2020-09-19 17:40:01

最近上报的IP列表

203.162.42.151 236.215.171.106 63.3.234.235 186.96.193.68
240.47.146.221 205.39.38.48 199.21.55.180 20.219.127.226
203.162.155.86 96.165.62.127 181.149.82.191 210.245.211.139
96.124.215.73 44.118.225.138 241.235.18.45 174.3.135.33
49.173.167.108 15.16.142.19 151.107.146.59 200.64.209.81