必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Reserved

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 253.49.125.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;253.49.125.139.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122502 1800 900 604800 86400

;; Query time: 115 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 26 04:38:39 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
Host 139.125.49.253.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.125.49.253.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
212.129.242.171 attack
Aug  3 13:13:31 localhost sshd[81115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.242.171  user=root
Aug  3 13:13:32 localhost sshd[81115]: Failed password for root from 212.129.242.171 port 42616 ssh2
Aug  3 13:16:54 localhost sshd[81521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.242.171  user=root
Aug  3 13:16:56 localhost sshd[81521]: Failed password for root from 212.129.242.171 port 52238 ssh2
Aug  3 13:20:21 localhost sshd[82004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.242.171  user=root
Aug  3 13:20:23 localhost sshd[82004]: Failed password for root from 212.129.242.171 port 33632 ssh2
...
2020-08-03 21:26:46
124.156.218.80 attackspambots
Aug  3 15:15:03 buvik sshd[31507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.218.80  user=root
Aug  3 15:15:05 buvik sshd[31507]: Failed password for root from 124.156.218.80 port 35746 ssh2
Aug  3 15:20:16 buvik sshd[32306]: Invalid user com from 124.156.218.80
...
2020-08-03 21:24:34
177.220.189.111 attackbotsspam
Aug  3 01:37:04 v11 sshd[12147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.189.111  user=r.r
Aug  3 01:37:06 v11 sshd[12147]: Failed password for r.r from 177.220.189.111 port 51000 ssh2
Aug  3 01:37:06 v11 sshd[12147]: Received disconnect from 177.220.189.111 port 51000:11: Bye Bye [preauth]
Aug  3 01:37:06 v11 sshd[12147]: Disconnected from 177.220.189.111 port 51000 [preauth]
Aug  3 02:09:01 v11 sshd[19044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.220.189.111  user=r.r
Aug  3 02:09:03 v11 sshd[19044]: Failed password for r.r from 177.220.189.111 port 41543 ssh2
Aug  3 02:09:03 v11 sshd[19044]: Received disconnect from 177.220.189.111 port 41543:11: Bye Bye [preauth]
Aug  3 02:09:03 v11 sshd[19044]: Disconnected from 177.220.189.111 port 41543 [preauth]
Aug  3 02:13:41 v11 sshd[20534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse........
-------------------------------
2020-08-03 22:03:48
74.82.47.56 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-08-03 22:02:50
123.207.142.31 attackspambots
Aug  3 09:03:10 ny01 sshd[11086]: Failed password for root from 123.207.142.31 port 37892 ssh2
Aug  3 09:07:51 ny01 sshd[11724]: Failed password for root from 123.207.142.31 port 35777 ssh2
2020-08-03 21:37:36
103.145.12.177 attackbots
[2020-08-03 08:27:16] NOTICE[1248] chan_sip.c: Registration from '"1017" ' failed for '103.145.12.177:5272' - Wrong password
[2020-08-03 08:27:16] SECURITY[1275] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-03T08:27:16.831-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1017",SessionID="0x7f27203cfef8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.177/5272",Challenge="782df7f8",ReceivedChallenge="782df7f8",ReceivedHash="8da3e16a2705dd399ba0da2201f7e6a4"
[2020-08-03 08:27:16] NOTICE[1248] chan_sip.c: Registration from '"1017" ' failed for '103.145.12.177:5272' - Wrong password
[2020-08-03 08:27:16] SECURITY[1275] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-03T08:27:16.973-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="1017",SessionID="0x7f2720091b18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP
...
2020-08-03 21:45:49
148.72.207.250 attackspambots
148.72.207.250 - - [03/Aug/2020:13:27:27 +0100] "POST /wp-login.php HTTP/1.1" 200 1960 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
148.72.207.250 - - [03/Aug/2020:13:27:29 +0100] "POST /wp-login.php HTTP/1.1" 200 1927 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
148.72.207.250 - - [03/Aug/2020:13:27:30 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-03 21:34:08
104.223.143.101 attackspambots
Aug  3 19:19:32 itv-usvr-01 sshd[30755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.223.143.101  user=root
Aug  3 19:19:34 itv-usvr-01 sshd[30755]: Failed password for root from 104.223.143.101 port 56074 ssh2
Aug  3 19:25:27 itv-usvr-01 sshd[30983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.223.143.101  user=root
Aug  3 19:25:29 itv-usvr-01 sshd[30983]: Failed password for root from 104.223.143.101 port 54930 ssh2
Aug  3 19:27:15 itv-usvr-01 sshd[31083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.223.143.101  user=root
Aug  3 19:27:17 itv-usvr-01 sshd[31083]: Failed password for root from 104.223.143.101 port 45116 ssh2
2020-08-03 21:42:30
183.134.89.199 attack
20 attempts against mh-ssh on cloud
2020-08-03 22:08:37
185.46.17.114 attack
Port Scan
...
2020-08-03 21:33:12
192.99.11.195 attack
Aug  3 13:30:58 ip-172-31-61-156 sshd[3478]: Failed password for root from 192.99.11.195 port 37685 ssh2
Aug  3 13:35:12 ip-172-31-61-156 sshd[3645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.11.195  user=root
Aug  3 13:35:15 ip-172-31-61-156 sshd[3645]: Failed password for root from 192.99.11.195 port 43841 ssh2
Aug  3 13:35:12 ip-172-31-61-156 sshd[3645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.99.11.195  user=root
Aug  3 13:35:15 ip-172-31-61-156 sshd[3645]: Failed password for root from 192.99.11.195 port 43841 ssh2
...
2020-08-03 21:53:09
165.227.86.14 attackspambots
165.227.86.14 - - [03/Aug/2020:14:51:12 +0200] "POST /wp-login.php HTTP/1.1" 200 3434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-03 21:51:11
142.93.251.1 attackspambots
2020-08-03T08:27:32.249366sorsha.thespaminator.com sshd[21114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.251.1  user=root
2020-08-03T08:27:34.559282sorsha.thespaminator.com sshd[21114]: Failed password for root from 142.93.251.1 port 36582 ssh2
...
2020-08-03 21:31:12
114.67.85.74 attackspambots
Aug  3 12:10:14 ns3033917 sshd[17267]: Failed password for root from 114.67.85.74 port 41248 ssh2
Aug  3 12:27:28 ns3033917 sshd[17393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.85.74  user=root
Aug  3 12:27:30 ns3033917 sshd[17393]: Failed password for root from 114.67.85.74 port 47774 ssh2
...
2020-08-03 21:35:48
129.152.141.71 attackbotsspam
Aug  3 14:26:46 rancher-0 sshd[740578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.152.141.71  user=root
Aug  3 14:26:48 rancher-0 sshd[740578]: Failed password for root from 129.152.141.71 port 17358 ssh2
...
2020-08-03 22:05:12

最近上报的IP列表

178.146.189.239 42.121.109.153 120.79.23.95 183.89.119.173
26.38.95.40 186.137.100.136 113.111.210.227 41.191.212.90
23.8.22.113 179.214.233.66 70.112.71.216 73.67.228.51
212.19.112.4 120.79.199.195 73.233.242.200 110.56.49.112
119.3.244.130 97.14.137.215 116.58.186.101 93.192.246.128