必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 34.125.161.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61818
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;34.125.161.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 23:53:50 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
150.161.125.34.in-addr.arpa domain name pointer 150.161.125.34.bc.googleusercontent.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.161.125.34.in-addr.arpa	name = 150.161.125.34.bc.googleusercontent.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.246.185.227 attack
SSH login attempts brute force.
2019-11-29 02:29:03
72.28.16.73 attackbots
Telnet/23 MH Probe, BF, Hack -
2019-11-29 02:17:42
211.114.178.122 attackspambots
Nov 28 11:21:48 our-server-hostname postfix/smtpd[7794]: connect from unknown[211.114.178.122]
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov 28 11:22:05 our-server-hostname postfix/smtpd[7794]: too many errors after RCPT from unknown[211.114.178.122]
Nov 28 11:22:05 our-server-hostname postfix/smtpd[7794]: disconnect from unknown[211.114.178.122]
Nov 28 12:02:42 our-server-hostname postfix/smtpd[26720]: connect from unknown[211.114.178.122]
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov 28 12:02:48 our-server-hostname postfix/smtpd[26720]: lost connection after RCPT from unknown[211.114.178.122]
Nov 28 12:02:48 our-server-hostname postfix/smtpd[26720]: disconnect from unknown[211.114.178.122]
Nov 28 23:51:08 our-server-hostname postfix/smtpd[25146]: connect from unknown[211.114.178.122]
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x........
-------------------------------
2019-11-29 02:39:02
129.213.117.53 attackspam
Nov 28 12:34:16 linuxvps sshd\[4043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.117.53  user=root
Nov 28 12:34:18 linuxvps sshd\[4043\]: Failed password for root from 129.213.117.53 port 53079 ssh2
Nov 28 12:40:25 linuxvps sshd\[7508\]: Invalid user server from 129.213.117.53
Nov 28 12:40:25 linuxvps sshd\[7508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.117.53
Nov 28 12:40:27 linuxvps sshd\[7508\]: Failed password for invalid user server from 129.213.117.53 port 15392 ssh2
2019-11-29 02:14:15
116.108.167.7 attack
Invalid user admin from 116.108.167.7 port 51456
2019-11-29 02:19:34
104.248.27.238 attack
104.248.27.238 - - \[28/Nov/2019:19:01:54 +0100\] "POST /wp-login.php HTTP/1.0" 200 7411 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.27.238 - - \[28/Nov/2019:19:01:55 +0100\] "POST /wp-login.php HTTP/1.0" 200 7226 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
104.248.27.238 - - \[28/Nov/2019:19:01:56 +0100\] "POST /wp-login.php HTTP/1.0" 200 7223 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-29 02:42:53
159.65.26.166 attack
159.65.26.166 - - \[28/Nov/2019:18:22:43 +0000\] "POST /wp-login.php HTTP/1.1" 200 6393 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
159.65.26.166 - - \[28/Nov/2019:18:22:49 +0000\] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-11-29 02:49:44
71.120.220.158 attack
2019-11-26T14:40:01.736811static.108.197.76.144.clients.your-server.de sshd[30272]: Invalid user pi from 71.120.220.158
2019-11-26T14:40:01.836074static.108.197.76.144.clients.your-server.de sshd[30274]: Invalid user pi from 71.120.220.158
2019-11-26T14:40:01.845149static.108.197.76.144.clients.your-server.de sshd[30272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.120.220.158
2019-11-26T14:40:01.954302static.108.197.76.144.clients.your-server.de sshd[30274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.120.220.158
2019-11-26T14:40:03.847306static.108.197.76.144.clients.your-server.de sshd[30272]: Failed password for invalid user pi from 71.120.220.158 port 51082 ssh2
2019-11-26T14:40:03.956333static.108.197.76.144.clients.your-server.de sshd[30274]: Failed password for invalid user pi from 71.120.220.158 port 51088 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip
2019-11-29 02:45:14
176.241.63.238 attack
WP_xmlrpc_attack
2019-11-29 02:52:28
212.232.34.180 attackspam
Automatic report - Port Scan Attack
2019-11-29 02:40:28
103.253.3.174 attackspambots
Nov 25 12:51:06 our-server-hostname postfix/smtpd[13754]: connect from unknown[103.253.3.174]
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.253.3.174
2019-11-29 02:46:40
197.204.2.67 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-29 02:23:09
218.221.117.241 attackspam
Nov 29 01:26:16 webhost01 sshd[7628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.221.117.241
Nov 29 01:26:18 webhost01 sshd[7628]: Failed password for invalid user admin from 218.221.117.241 port 51024 ssh2
...
2019-11-29 02:36:45
40.114.246.252 attack
$f2bV_matches
2019-11-29 02:15:12
187.64.60.33 attackbotsspam
Nov 28 17:30:36 srv1-bit sshd[22145]: Invalid user pi from 187.64.60.33
Nov 28 17:30:36 srv1-bit sshd[22143]: Invalid user pi from 187.64.60.33
...
2019-11-29 02:33:01

最近上报的IP列表

19.251.79.198 92.10.177.29 190.224.1.100 96.216.190.183
51.65.169.192 145.68.90.182 140.122.20.4 152.31.12.98
7.218.133.53 210.105.237.40 188.175.118.102 235.36.54.29
208.216.154.87 162.139.202.66 130.64.236.71 197.197.197.46
240.3.152.181 88.57.164.53 150.127.44.5 124.90.145.117