必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): IANA Special-Purpose Address

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.104.125.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;253.104.125.154.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 17:37:23 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
Host 154.125.104.253.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.125.104.253.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
131.255.82.160 attack
Aug 28 04:55:45 hcbbdb sshd\[28396\]: Invalid user ftp from 131.255.82.160
Aug 28 04:55:45 hcbbdb sshd\[28396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131-255-82-160.dynamic.logicpro.com.br
Aug 28 04:55:47 hcbbdb sshd\[28396\]: Failed password for invalid user ftp from 131.255.82.160 port 18780 ssh2
Aug 28 05:01:08 hcbbdb sshd\[28993\]: Invalid user mreal from 131.255.82.160
Aug 28 05:01:08 hcbbdb sshd\[28993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=131-255-82-160.dynamic.logicpro.com.br
2019-08-28 13:01:25
142.93.114.123 attackspam
Aug 28 08:08:48 server sshd\[19885\]: Invalid user dark from 142.93.114.123 port 48094
Aug 28 08:08:48 server sshd\[19885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.114.123
Aug 28 08:08:50 server sshd\[19885\]: Failed password for invalid user dark from 142.93.114.123 port 48094 ssh2
Aug 28 08:12:32 server sshd\[545\]: Invalid user ts3server from 142.93.114.123 port 35450
Aug 28 08:12:32 server sshd\[545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.114.123
2019-08-28 13:52:14
68.183.2.153 attackspam
Aug 28 06:25:11 mail postfix/smtpd\[3207\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 28 06:25:11 mail postfix/smtpd\[3208\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 28 06:25:11 mail postfix/smtpd\[2495\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 28 06:25:11 mail postfix/smtpd\[3200\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 28 06:25:11 mail postfix/smtpd\[3196\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 28 06:25:11 mail postfix/smtpd\[3195\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 28 06:25:11 mail postfix/smtpd\[19179\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 28 06:25:11 mail postfix/smtpd\[3198\]: warning: unknown\[68.183.2.153\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 28 06:25:11 mail p
2019-08-28 13:07:14
95.170.203.226 attack
Aug 28 07:26:40 dedicated sshd[31170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.170.203.226  user=root
Aug 28 07:26:43 dedicated sshd[31170]: Failed password for root from 95.170.203.226 port 40040 ssh2
2019-08-28 13:27:12
101.29.44.170 attackbots
Unauthorised access (Aug 28) SRC=101.29.44.170 LEN=40 TTL=49 ID=13288 TCP DPT=8080 WINDOW=3662 SYN 
Unauthorised access (Aug 25) SRC=101.29.44.170 LEN=40 TTL=49 ID=43490 TCP DPT=8080 WINDOW=6238 SYN
2019-08-28 13:23:47
51.38.234.224 attack
2019-08-28T07:49:23.292841  sshd[6583]: Invalid user minecraft from 51.38.234.224 port 44710
2019-08-28T07:49:23.304380  sshd[6583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.234.224
2019-08-28T07:49:23.292841  sshd[6583]: Invalid user minecraft from 51.38.234.224 port 44710
2019-08-28T07:49:25.686251  sshd[6583]: Failed password for invalid user minecraft from 51.38.234.224 port 44710 ssh2
2019-08-28T07:53:25.794118  sshd[6661]: Invalid user ts3sleep from 51.38.234.224 port 33058
...
2019-08-28 13:54:22
51.79.2.114 attack
Wordpress XMLRPC attack
2019-08-28 13:25:01
111.125.66.234 attackspambots
Aug 28 00:29:22 Tower sshd[31703]: Connection from 111.125.66.234 port 33618 on 192.168.10.220 port 22
Aug 28 00:29:23 Tower sshd[31703]: Invalid user tech from 111.125.66.234 port 33618
Aug 28 00:29:23 Tower sshd[31703]: error: Could not get shadow information for NOUSER
Aug 28 00:29:23 Tower sshd[31703]: Failed password for invalid user tech from 111.125.66.234 port 33618 ssh2
Aug 28 00:29:23 Tower sshd[31703]: Received disconnect from 111.125.66.234 port 33618:11: Bye Bye [preauth]
Aug 28 00:29:23 Tower sshd[31703]: Disconnected from invalid user tech 111.125.66.234 port 33618 [preauth]
2019-08-28 12:44:29
68.183.37.247 attack
Aug 28 06:56:14 eventyay sshd[3250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.37.247
Aug 28 06:56:16 eventyay sshd[3250]: Failed password for invalid user paulj from 68.183.37.247 port 33232 ssh2
Aug 28 07:00:09 eventyay sshd[4365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.37.247
...
2019-08-28 13:09:32
173.244.209.5 attackspambots
Automated report - ssh fail2ban:
Aug 28 06:29:26 wrong password, user=root, port=54628, ssh2
Aug 28 06:29:30 wrong password, user=root, port=54628, ssh2
Aug 28 06:29:34 wrong password, user=root, port=54628, ssh2
Aug 28 06:29:39 wrong password, user=root, port=54628, ssh2
2019-08-28 12:48:52
94.177.173.75 attackspam
Aug 28 06:59:49 meumeu sshd[5349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.173.75 
Aug 28 06:59:51 meumeu sshd[5349]: Failed password for invalid user orlando from 94.177.173.75 port 48226 ssh2
Aug 28 07:04:15 meumeu sshd[5825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.173.75 
...
2019-08-28 13:11:06
50.115.181.98 attackspam
Aug 28 05:39:56 web8 sshd\[16012\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.115.181.98  user=root
Aug 28 05:39:58 web8 sshd\[16012\]: Failed password for root from 50.115.181.98 port 46707 ssh2
Aug 28 05:44:40 web8 sshd\[18210\]: Invalid user adam from 50.115.181.98
Aug 28 05:44:40 web8 sshd\[18210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.115.181.98
Aug 28 05:44:42 web8 sshd\[18210\]: Failed password for invalid user adam from 50.115.181.98 port 45822 ssh2
2019-08-28 13:45:30
138.197.202.133 attack
Automated report - ssh fail2ban:
Aug 28 07:31:40 authentication failure 
Aug 28 07:31:43 wrong password, user=zxcloudsetup, port=38584, ssh2
Aug 28 07:36:02 authentication failure
2019-08-28 13:51:02
157.230.123.18 attackspambots
SSH Brute Force, server-1 sshd[29796]: Failed password for invalid user delgado from 157.230.123.18 port 48210 ssh2
2019-08-28 13:41:31
1.192.91.116 attackspam
DATE:2019-08-28 06:29:15, IP:1.192.91.116, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-08-28 13:13:23

最近上报的IP列表

196.150.195.253 236.114.77.20 59.69.34.95 208.42.15.18
161.216.163.2 34.212.88.126 53.189.109.216 142.42.95.172
233.28.103.40 26.179.5.12 251.242.173.56 255.111.179.101
174.140.195.178 96.119.56.122 86.131.55.35 104.22.163.194
234.139.96.34 26.151.160.130 219.99.86.253 90.114.180.65