必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Japan

运营商(isp): SoftBank

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.139.125.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4433
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.139.125.27.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024112200 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 22 15:14:11 CST 2024
;; MSG SIZE  rcvd: 107
HOST信息:
27.125.139.218.in-addr.arpa domain name pointer softbank218139125027.bbtec.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
27.125.139.218.in-addr.arpa	name = softbank218139125027.bbtec.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
181.129.167.166 attackbotsspam
Sep  3 02:34:13 george sshd[17269]: Failed password for invalid user emily from 181.129.167.166 port 19393 ssh2
Sep  3 02:41:21 george sshd[17419]: Invalid user ten from 181.129.167.166 port 60993
Sep  3 02:41:21 george sshd[17419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.129.167.166 
Sep  3 02:41:23 george sshd[17419]: Failed password for invalid user ten from 181.129.167.166 port 60993 ssh2
Sep  3 02:44:56 george sshd[17433]: Invalid user steam from 181.129.167.166 port 37793
...
2020-09-03 14:51:48
222.186.190.2 attack
2020-09-03T08:29:39.256168ns386461 sshd\[27967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
2020-09-03T08:29:41.366578ns386461 sshd\[27967\]: Failed password for root from 222.186.190.2 port 1934 ssh2
2020-09-03T08:29:44.476978ns386461 sshd\[27967\]: Failed password for root from 222.186.190.2 port 1934 ssh2
2020-09-03T08:29:47.666490ns386461 sshd\[27967\]: Failed password for root from 222.186.190.2 port 1934 ssh2
2020-09-03T08:29:51.266520ns386461 sshd\[27967\]: Failed password for root from 222.186.190.2 port 1934 ssh2
...
2020-09-03 14:32:37
51.158.124.238 attack
2020-09-03T04:28:50.001868cyberdyne sshd[3144902]: Invalid user sammy from 51.158.124.238 port 43400
2020-09-03T04:28:50.004470cyberdyne sshd[3144902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.124.238
2020-09-03T04:28:50.001868cyberdyne sshd[3144902]: Invalid user sammy from 51.158.124.238 port 43400
2020-09-03T04:28:52.187725cyberdyne sshd[3144902]: Failed password for invalid user sammy from 51.158.124.238 port 43400 ssh2
...
2020-09-03 14:18:28
218.78.213.143 attackspambots
2020-09-03T00:07[Censored Hostname] sshd[30214]: Failed password for invalid user fly from 218.78.213.143 port 47332 ssh2
2020-09-03T00:10[Censored Hostname] sshd[30346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.213.143  user=root
2020-09-03T00:10[Censored Hostname] sshd[30346]: Failed password for root from 218.78.213.143 port 23546 ssh2[...]
2020-09-03 14:49:47
195.138.67.146 attack
trying to exploit wordpress
2020-09-03 14:34:53
52.152.151.77 attackspam
Hits on port : 81 8080 8088
2020-09-03 14:25:07
111.229.104.94 attackbotsspam
Invalid user contact from 111.229.104.94 port 39592
2020-09-03 14:31:14
45.142.120.89 attackspam
2020-09-03T00:28:48.643983linuxbox-skyline auth[44425]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=httpd rhost=45.142.120.89
...
2020-09-03 14:33:04
66.68.187.140 attack
Sep  3 12:47:44 itv-usvr-02 sshd[13720]: Invalid user cumulus from 66.68.187.140 port 45294
Sep  3 12:47:44 itv-usvr-02 sshd[13720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.68.187.140
Sep  3 12:47:44 itv-usvr-02 sshd[13720]: Invalid user cumulus from 66.68.187.140 port 45294
Sep  3 12:47:46 itv-usvr-02 sshd[13720]: Failed password for invalid user cumulus from 66.68.187.140 port 45294 ssh2
Sep  3 12:51:44 itv-usvr-02 sshd[13865]: Invalid user dxp from 66.68.187.140 port 53324
2020-09-03 14:48:53
45.142.120.166 attack
SASL LOGIN authentication failed: authentication failure
2020-09-03 14:39:09
134.209.123.101 attack
134.209.123.101 - - [03/Sep/2020:07:00:53 +0100] "POST /wp-login.php HTTP/1.1" 200 1905 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.123.101 - - [03/Sep/2020:07:00:54 +0100] "POST /wp-login.php HTTP/1.1" 200 1890 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
134.209.123.101 - - [03/Sep/2020:07:00:56 +0100] "POST /wp-login.php HTTP/1.1" 200 1887 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-03 14:52:48
180.76.53.230 attack
$f2bV_matches
2020-09-03 14:20:30
178.49.9.210 attackspam
2020-09-02T16:52:07.025993correo.[domain] sshd[36028]: Invalid user charlie from 178.49.9.210 port 38114 2020-09-02T16:52:09.061144correo.[domain] sshd[36028]: Failed password for invalid user charlie from 178.49.9.210 port 38114 ssh2 2020-09-02T17:03:08.009075correo.[domain] sshd[37104]: Invalid user intern from 178.49.9.210 port 48772 ...
2020-09-03 14:28:14
118.24.83.41 attackspam
(sshd) Failed SSH login from 118.24.83.41 (CN/China/-): 5 in the last 3600 secs
2020-09-03 14:53:14
200.72.147.186 attackbots
Unauthorized connection attempt from IP address 200.72.147.186 on Port 445(SMB)
2020-09-03 14:47:44

最近上报的IP列表

184.248.148.255 216.120.100.50 9.22.35.255 229.20.100.94
115.197.99.255 208.42.139.180 201.121.7.99 233.173.168.172
180.107.15.189 136.197.165.15 104.176.235.204 180.159.221.20
43.23.52.211 165.109.110.129 43.122.176.135 160.71.121.121
251.217.165.0 193.78.169.21 172.168.139.221 192.168.128.177