必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Medan

省份(region): North Sumatra

国家(country): Indonesia

运营商(isp): Esia

主机名(hostname): unknown

机构(organization): PT Telekomunikasi Indonesia

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 36.68.125.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53499
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;36.68.125.94.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052900 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 29 21:06:10 CST 2019
;; MSG SIZE  rcvd: 116

HOST信息:
Host 94.125.68.36.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 94.125.68.36.in-addr.arpa: SERVFAIL

相关IP信息:
最新评论:
IP 类型 评论内容 时间
66.70.149.203 attackspambots
SMB Server BruteForce Attack
2019-07-30 05:23:24
62.233.65.182 attackspam
\[2019-07-29 21:55:50\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-07-29T21:55:50.919+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="655442262-1160005794-1688747169",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/62.233.65.182/50493",Challenge="1564430150/3843a2808b19af62feed4a5dc27b0530",Response="aa2957a8a7fea859a05508c5e4e2531a",ExpectedResponse=""
\[2019-07-29 21:55:50\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResponseFailed",EventTV="2019-07-29T21:55:50.976+0200",Severity="Error",Service="PJSIP",EventVersion="1",AccountID="\",SessionID="655442262-1160005794-1688747169",LocalAddress="IPV4/UDP/188.40.118.248/5060",RemoteAddress="IPV4/UDP/62.233.65.182/50493",Challenge="1564430150/3843a2808b19af62feed4a5dc27b0530",Response="f0b5467bb257ee1e6c3d6b6a116f755c",ExpectedResponse=""
\[2019-07-29 21:55:51\] SECURITY\[1715\] res_security_log.c: SecurityEvent="ChallengeResp
2019-07-30 04:43:01
151.31.51.112 attackbots
Unauthorised access (Jul 29) SRC=151.31.51.112 LEN=44 TTL=53 ID=5912 TCP DPT=23 WINDOW=63691 SYN
2019-07-30 05:14:01
200.61.187.49 attack
Honeypot attack, port: 445, PTR: mail0.cylarcom.net.
2019-07-30 04:51:53
73.2.139.100 attackspambots
Jul 29 22:30:45 dedicated sshd[13149]: Invalid user anna from 73.2.139.100 port 34376
2019-07-30 04:56:11
118.71.44.170 attackspam
" "
2019-07-30 04:57:37
120.203.197.58 attackspambots
Jul 29 14:36:42 vtv3 sshd\[12980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.203.197.58  user=root
Jul 29 14:36:44 vtv3 sshd\[12980\]: Failed password for root from 120.203.197.58 port 49363 ssh2
Jul 29 14:42:10 vtv3 sshd\[15732\]: Invalid user com from 120.203.197.58 port 41962
Jul 29 14:42:10 vtv3 sshd\[15732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.203.197.58
Jul 29 14:42:12 vtv3 sshd\[15732\]: Failed password for invalid user com from 120.203.197.58 port 41962 ssh2
Jul 29 14:52:47 vtv3 sshd\[20658\]: Invalid user hsq from 120.203.197.58 port 55407
Jul 29 14:52:47 vtv3 sshd\[20658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.203.197.58
Jul 29 14:52:50 vtv3 sshd\[20658\]: Failed password for invalid user hsq from 120.203.197.58 port 55407 ssh2
Jul 29 14:58:12 vtv3 sshd\[23186\]: Invalid user qwe123rty456 from 120.203.197.58 port 48024
Jul 29 14:5
2019-07-30 04:59:02
13.93.1.86 attackspam
Jul 30 00:01:23 www2 sshd\[1536\]: Invalid user lee from 13.93.1.86Jul 30 00:01:25 www2 sshd\[1536\]: Failed password for invalid user lee from 13.93.1.86 port 62941 ssh2Jul 30 00:05:35 www2 sshd\[3421\]: Invalid user mit from 13.93.1.86Jul 30 00:05:37 www2 sshd\[3421\]: Failed password for invalid user mit from 13.93.1.86 port 35772 ssh2Jul 30 00:09:49 www2 sshd\[3750\]: Invalid user ftphome from 13.93.1.86Jul 30 00:09:51 www2 sshd\[3750\]: Failed password for invalid user ftphome from 13.93.1.86 port 64897 ssh2
...
2019-07-30 05:12:44
150.66.1.167 attack
SSH Brute-Force reported by Fail2Ban
2019-07-30 05:07:42
159.65.34.82 attack
Jul 29 20:48:05 MK-Soft-VM4 sshd\[5933\]: Invalid user ma from 159.65.34.82 port 57694
Jul 29 20:48:05 MK-Soft-VM4 sshd\[5933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.34.82
Jul 29 20:48:07 MK-Soft-VM4 sshd\[5933\]: Failed password for invalid user ma from 159.65.34.82 port 57694 ssh2
...
2019-07-30 04:55:51
112.85.194.198 attack
SASL Brute Force
2019-07-30 05:09:40
151.63.28.33 attackbots
Automatic report - Port Scan Attack
2019-07-30 05:03:01
51.255.83.44 attackspambots
Jul 29 17:02:17 xtremcommunity sshd\[2436\]: Invalid user lorena from 51.255.83.44 port 51024
Jul 29 17:02:17 xtremcommunity sshd\[2436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.83.44
Jul 29 17:02:20 xtremcommunity sshd\[2436\]: Failed password for invalid user lorena from 51.255.83.44 port 51024 ssh2
Jul 29 17:06:14 xtremcommunity sshd\[10242\]: Invalid user marcio from 51.255.83.44 port 38066
Jul 29 17:06:14 xtremcommunity sshd\[10242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.83.44
...
2019-07-30 05:21:18
77.247.108.170 attackspam
Trying to (more than 3 packets) bruteforce (not in use) VoIP/SIP port 5060
2019-07-30 04:51:30
117.102.88.119 attackspam
Jul 29 19:39:33 herz-der-gamer sshd[11266]: Failed password for invalid user horia from 117.102.88.119 port 33632 ssh2
...
2019-07-30 05:19:29

最近上报的IP列表

221.232.177.19 146.111.90.120 104.152.52.36 111.248.243.216
63.102.184.145 39.229.80.85 206.244.239.23 197.211.225.66
79.235.78.132 178.164.165.33 78.174.129.166 66.79.178.247
71.123.156.155 112.157.145.26 195.249.218.200 154.49.211.244
90.100.36.155 143.18.89.70 80.46.58.199 177.65.135.210