必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): New Zealand

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.125.244.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.125.244.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 52 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:09:22 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
Host 20.244.125.45.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 20.244.125.45.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
109.229.176.251 attackbotsspam
Email rejected due to spam filtering
2020-03-03 22:26:27
107.193.106.251 attack
suspicious action Tue, 03 Mar 2020 10:24:57 -0300
2020-03-03 22:24:34
109.200.156.102 attackbotsspam
Jan  5 19:45:13 mercury wordpress(www.learnargentinianspanish.com)[21293]: XML-RPC authentication failure for josh from 109.200.156.102
...
2020-03-03 22:16:14
222.186.15.10 attackspam
Mar  3 04:12:00 kapalua sshd\[1002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
Mar  3 04:12:03 kapalua sshd\[1002\]: Failed password for root from 222.186.15.10 port 37666 ssh2
Mar  3 04:15:53 kapalua sshd\[1284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.10  user=root
Mar  3 04:15:56 kapalua sshd\[1284\]: Failed password for root from 222.186.15.10 port 11089 ssh2
Mar  3 04:15:58 kapalua sshd\[1284\]: Failed password for root from 222.186.15.10 port 11089 ssh2
2020-03-03 22:18:02
109.200.155.196 attackspambots
Dec 26 14:37:46 mercury wordpress(www.learnargentinianspanish.com)[21412]: XML-RPC authentication attempt for unknown user silvina from 109.200.155.196
...
2020-03-03 22:32:09
45.133.99.130 attackspam
2020-03-03 14:57:15 dovecot_login authenticator failed for \(\[45.133.99.130\]\) \[45.133.99.130\]: 535 Incorrect authentication data \(set_id=harald.schueller@jugend-ohne-grenzen.net\)
2020-03-03 14:57:26 dovecot_login authenticator failed for \(\[45.133.99.130\]\) \[45.133.99.130\]: 535 Incorrect authentication data \(set_id=harald.schueller\)
2020-03-03 14:58:36 dovecot_login authenticator failed for \(\[45.133.99.130\]\) \[45.133.99.130\]: 535 Incorrect authentication data \(set_id=german@sensecell.de\)
2020-03-03 14:58:47 dovecot_login authenticator failed for \(\[45.133.99.130\]\) \[45.133.99.130\]: 535 Incorrect authentication data
2020-03-03 14:58:58 dovecot_login authenticator failed for \(\[45.133.99.130\]\) \[45.133.99.130\]: 535 Incorrect authentication data
...
2020-03-03 22:07:11
89.76.234.43 attackspambots
SpamScore above: 10.0
2020-03-03 22:55:24
111.177.113.175 attack
Feb 12 17:26:19 mercury wordpress(www.learnargentinianspanish.com)[31381]: XML-RPC authentication attempt for unknown user silvina from 111.177.113.175
...
2020-03-03 22:24:16
125.106.93.139 attackbotsspam
125.106.93.139 - - [12/Dec/2019:11:36:20 +0000] "POST /xmlrpc.php HTTP/1.1" 301 596 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
125.106.93.139 - - [12/Dec/2019:11:36:29 +0000] "POST /xmlrpc.php HTTP/1.1" 301 596 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
...
2020-03-03 22:37:09
198.55.50.196 attackbots
Mar  2 15:22:33 server2 sshd[26713]: reveeclipse mapping checking getaddrinfo for 198-55-50-196.static-ip.ravand.ca [198.55.50.196] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar  2 15:22:33 server2 sshd[26713]: Invalid user khostnameamoehlenkamp from 198.55.50.196
Mar  2 15:22:33 server2 sshd[26713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.50.196 
Mar  2 15:22:35 server2 sshd[26713]: Failed password for invalid user khostnameamoehlenkamp from 198.55.50.196 port 46406 ssh2
Mar  2 15:22:35 server2 sshd[26713]: Received disconnect from 198.55.50.196: 11: Normal Shutdown [preauth]
Mar  2 15:25:27 server2 sshd[27018]: reveeclipse mapping checking getaddrinfo for 198-55-50-196.static-ip.ravand.ca [198.55.50.196] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar  2 15:25:27 server2 sshd[27018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.55.50.196  user=r.r
Mar  2 15:25:29 server2 sshd[27018........
-------------------------------
2020-03-03 22:27:23
52.130.76.97 attack
Mar  3 14:15:16 silence02 sshd[4306]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.130.76.97
Mar  3 14:15:18 silence02 sshd[4306]: Failed password for invalid user gzx from 52.130.76.97 port 54870 ssh2
Mar  3 14:24:48 silence02 sshd[4745]: Failed password for mysql from 52.130.76.97 port 52632 ssh2
2020-03-03 22:40:30
191.237.251.21 attack
Mar  3 14:50:58 vps647732 sshd[21933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.237.251.21
Mar  3 14:51:00 vps647732 sshd[21933]: Failed password for invalid user louis from 191.237.251.21 port 47934 ssh2
...
2020-03-03 22:25:49
112.200.246.118 attack
[Sun Jan 05 07:22:18.202272 2020] [access_compat:error] [pid 27252] [client 112.200.246.118:49508] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php
...
2020-03-03 22:09:23
103.70.227.163 attackbots
2020-01-04T04:47:38.183Z CLOSE host=103.70.227.163 port=42811 fd=4 time=10.010 bytes=0
...
2020-03-03 22:24:57
51.15.149.20 attack
Mar  3 14:25:01 MK-Soft-Root1 sshd[4191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.149.20 
Mar  3 14:25:03 MK-Soft-Root1 sshd[4191]: Failed password for invalid user magda from 51.15.149.20 port 42942 ssh2
...
2020-03-03 22:10:13

最近上报的IP列表

211.26.67.70 44.148.64.91 252.104.36.113 122.108.73.167
144.104.198.187 66.105.53.83 151.156.3.193 155.80.141.144
198.74.51.126 58.226.125.173 142.41.29.8 13.248.250.91
207.148.197.252 230.118.58.204 129.23.97.130 139.119.35.2
73.49.39.191 12.251.114.129 14.14.0.152 218.108.151.177