必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United Kingdom of Great Britain and Northern Ireland (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.2.125.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16830
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.2.125.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:03:32 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
20.125.2.213.in-addr.arpa domain name pointer 213-2-125-20.uk.vianw.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
20.125.2.213.in-addr.arpa	name = 213-2-125-20.uk.vianw.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.12.86 attackspambots
Automated report - ssh fail2ban:
Aug 2 03:39:27 wrong password, user=root, port=34440, ssh2
Aug 2 03:45:45 authentication failure
2019-08-02 10:02:22
43.227.66.159 attackspam
Aug  1 20:27:03 plusreed sshd[30307]: Invalid user webuser from 43.227.66.159
...
2019-08-02 09:49:11
111.230.23.81 attackspambots
Aug  2 03:12:00 localhost sshd\[47858\]: Invalid user testuser from 111.230.23.81 port 41053
Aug  2 03:12:00 localhost sshd\[47858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.23.81
...
2019-08-02 10:26:08
46.218.7.227 attackspambots
02.08.2019 00:16:50 SSH access blocked by firewall
2019-08-02 09:48:05
168.61.165.178 attackbots
Aug  2 03:23:34 MK-Soft-Root1 sshd\[5448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.165.178  user=backup
Aug  2 03:23:35 MK-Soft-Root1 sshd\[5448\]: Failed password for backup from 168.61.165.178 port 34366 ssh2
Aug  2 03:25:38 MK-Soft-Root1 sshd\[5755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.61.165.178  user=backup
...
2019-08-02 10:05:34
77.247.108.160 attackbots
01.08.2019 23:22:55 Connection to port 5060 blocked by firewall
2019-08-02 10:21:40
218.92.0.175 attackbots
Aug  1 21:26:52 debian sshd\[32696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.175  user=root
Aug  1 21:26:54 debian sshd\[32696\]: Failed password for root from 218.92.0.175 port 10614 ssh2
Aug  1 21:26:57 debian sshd\[32696\]: Failed password for root from 218.92.0.175 port 10614 ssh2
...
2019-08-02 10:25:40
81.19.215.178 attack
blogonese.net 81.19.215.178 \[02/Aug/2019:01:22:50 +0200\] "POST /wp-login.php HTTP/1.1" 200 5771 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
blogonese.net 81.19.215.178 \[02/Aug/2019:01:22:51 +0200\] "POST /wp-login.php HTTP/1.1" 200 5731 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-08-02 10:24:20
84.54.94.42 attack
IP: 84.54.94.42
ASN: AS8193 Uzbektelekom Joint Stock Company
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 1/08/2019 11:23:16 PM UTC
2019-08-02 10:11:49
73.124.2.112 attackbotsspam
Automatic report - Port Scan Attack
2019-08-02 10:21:58
168.228.151.68 attackbots
Aug  1 18:23:55 mailman postfix/smtpd[19394]: warning: unknown[168.228.151.68]: SASL PLAIN authentication failed: authentication failure
2019-08-02 09:43:58
153.36.236.151 attackspam
2019-07-27T02:12:03.986463wiz-ks3 sshd[8524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.151  user=root
2019-07-27T02:12:06.217157wiz-ks3 sshd[8524]: Failed password for root from 153.36.236.151 port 10753 ssh2
2019-07-27T02:12:07.875250wiz-ks3 sshd[8524]: Failed password for root from 153.36.236.151 port 10753 ssh2
2019-07-27T02:12:03.986463wiz-ks3 sshd[8524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.151  user=root
2019-07-27T02:12:06.217157wiz-ks3 sshd[8524]: Failed password for root from 153.36.236.151 port 10753 ssh2
2019-07-27T02:12:07.875250wiz-ks3 sshd[8524]: Failed password for root from 153.36.236.151 port 10753 ssh2
2019-07-27T02:12:03.986463wiz-ks3 sshd[8524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.236.151  user=root
2019-07-27T02:12:06.217157wiz-ks3 sshd[8524]: Failed password for root from 153.36.236.151 port 10753 ssh2
2019-07-2
2019-08-02 09:50:05
115.94.204.156 attackbotsspam
Aug  2 03:31:25 eventyay sshd[10309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.94.204.156
Aug  2 03:31:27 eventyay sshd[10309]: Failed password for invalid user carter from 115.94.204.156 port 41924 ssh2
Aug  2 03:36:18 eventyay sshd[11544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.94.204.156
...
2019-08-02 09:47:39
213.190.31.129 attackspambots
[Aegis] @ 2019-08-02 00:23:37  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-08-02 09:47:19
103.207.2.204 attackspambots
Aug  2 01:23:23 nextcloud sshd\[3754\]: Invalid user admin123 from 103.207.2.204
Aug  2 01:23:23 nextcloud sshd\[3754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.2.204
Aug  2 01:23:25 nextcloud sshd\[3754\]: Failed password for invalid user admin123 from 103.207.2.204 port 46080 ssh2
...
2019-08-02 10:04:31

最近上报的IP列表

15.218.255.28 182.132.189.152 137.29.200.198 224.143.101.8
109.166.7.163 124.3.97.125 107.205.116.194 143.9.253.67
5.22.104.140 220.134.70.68 38.60.252.2 181.94.187.52
39.142.163.60 227.251.152.27 141.35.19.248 63.50.171.174
144.67.210.92 76.25.106.71 69.134.109.45 148.139.107.10