必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.24.125.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7471
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.24.125.109.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 01:03:01 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
109.125.24.4.in-addr.arpa domain name pointer p5-0.sttlwa1-cr2.bbnplanet.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.125.24.4.in-addr.arpa	name = p5-0.sttlwa1-cr2.bbnplanet.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
216.218.139.75 attack
Jan 18 23:55:42 ms-srv sshd[50605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.218.139.75  user=root
Jan 18 23:55:43 ms-srv sshd[50605]: Failed password for invalid user root from 216.218.139.75 port 60406 ssh2
2020-03-08 22:40:56
216.83.57.141 attackbotsspam
Jan  9 00:38:00 ms-srv sshd[24235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.83.57.141
Jan  9 00:38:02 ms-srv sshd[24235]: Failed password for invalid user openvpn_as from 216.83.57.141 port 48602 ssh2
2020-03-08 22:29:42
217.111.239.37 attackbotsspam
Feb 16 00:25:43 ms-srv sshd[56886]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.111.239.37  user=root
Feb 16 00:25:45 ms-srv sshd[56886]: Failed password for invalid user root from 217.111.239.37 port 39896 ssh2
2020-03-08 22:24:08
111.93.235.74 attackspam
Mar  8 15:30:36 sso sshd[16752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.235.74
Mar  8 15:30:38 sso sshd[16752]: Failed password for invalid user hduser from 111.93.235.74 port 22532 ssh2
...
2020-03-08 22:59:52
91.195.248.111 attackspambots
Honeypot attack, port: 81, PTR: 111.248.195.91.akson45.net.
2020-03-08 22:49:28
106.52.114.162 attackspambots
Automatic report - SSH Brute-Force Attack
2020-03-08 22:33:16
216.7.159.250 attackspam
Feb  4 21:31:28 ms-srv sshd[22910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.7.159.250
Feb  4 21:31:30 ms-srv sshd[22910]: Failed password for invalid user leonidas from 216.7.159.250 port 50978 ssh2
2020-03-08 22:34:01
216.155.94.51 attack
Jul 24 05:22:23 ms-srv sshd[14274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.155.94.51
Jul 24 05:22:25 ms-srv sshd[14274]: Failed password for invalid user todd from 216.155.94.51 port 33449 ssh2
2020-03-08 22:50:21
106.124.135.232 attackbotsspam
Mar  8 00:38:57 db01 sshd[13268]: Invalid user wanghui from 106.124.135.232
Mar  8 00:38:57 db01 sshd[13268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.135.232 
Mar  8 00:38:59 db01 sshd[13268]: Failed password for invalid user wanghui from 106.124.135.232 port 37929 ssh2
Mar  8 00:38:59 db01 sshd[13268]: Received disconnect from 106.124.135.232: 11: Bye Bye [preauth]
Mar  8 00:48:57 db01 sshd[14228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.135.232  user=r.r
Mar  8 00:48:59 db01 sshd[14228]: Failed password for r.r from 106.124.135.232 port 40769 ssh2
Mar  8 00:48:59 db01 sshd[14228]: Received disconnect from 106.124.135.232: 11: Bye Bye [preauth]
Mar  8 00:53:14 db01 sshd[14634]: Invalid user oracle from 106.124.135.232
Mar  8 00:53:14 db01 sshd[14634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.135.232 
Mar ........
-------------------------------
2020-03-08 22:52:01
217.113.28.7 attackbotsspam
Oct 20 09:19:39 ms-srv sshd[42521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.113.28.7
Oct 20 09:19:41 ms-srv sshd[42521]: Failed password for invalid user pop3 from 217.113.28.7 port 50425 ssh2
2020-03-08 22:22:42
216.144.251.86 attackspam
Sep  1 21:29:40 ms-srv sshd[2777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.144.251.86  user=root
Sep  1 21:29:42 ms-srv sshd[2777]: Failed password for invalid user root from 216.144.251.86 port 40592 ssh2
2020-03-08 22:54:10
216.224.170.89 attackspambots
May  2 09:28:00 ms-srv sshd[14857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.224.170.89
May  2 09:28:02 ms-srv sshd[14857]: Failed password for invalid user agsadmin from 216.224.170.89 port 52744 ssh2
2020-03-08 22:38:27
125.235.9.10 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-08 22:59:13
116.196.121.227 attackspambots
(sshd) Failed SSH login from 116.196.121.227 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  8 14:18:20 ubnt-55d23 sshd[28600]: Invalid user omura from 116.196.121.227 port 47124
Mar  8 14:18:21 ubnt-55d23 sshd[28600]: Failed password for invalid user omura from 116.196.121.227 port 47124 ssh2
2020-03-08 22:41:38
183.158.132.138 attackbotsspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-03-08 22:32:52

最近上报的IP列表

35.141.94.171 195.44.219.88 43.52.18.246 160.51.120.80
43.186.86.104 143.52.244.41 187.14.197.120 223.59.106.76
193.19.90.56 114.222.32.233 174.71.108.55 113.27.91.8
172.105.8.218 171.50.190.7 55.0.156.222 180.198.125.239
121.57.77.153 254.165.79.213 206.57.167.119 251.182.61.193