必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Aobadai

省份(region): Tokyo

国家(country): Japan

运营商(isp): NTT docomo

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.103.54.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.103.54.125.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031002 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 11 12:02:09 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
125.54.103.49.in-addr.arpa domain name pointer mo49-103-54-125.air.mopera.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.54.103.49.in-addr.arpa	name = mo49-103-54-125.air.mopera.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.59.46.228 attackbotsspam
37.59.46.228 - - [05/Jun/2020:13:49:13 +0100] "POST /wp-login.php HTTP/1.1" 200 6718 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.46.228 - - [05/Jun/2020:13:49:54 +0100] "POST /wp-login.php HTTP/1.1" 200 6718 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
37.59.46.228 - - [05/Jun/2020:13:50:32 +0100] "POST /wp-login.php HTTP/1.1" 200 6705 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-06-05 20:50:54
52.155.97.128 attackspam
Jun  5 19:27:30 itv-usvr-01 sshd[32569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.155.97.128  user=root
Jun  5 19:27:32 itv-usvr-01 sshd[32569]: Failed password for root from 52.155.97.128 port 50676 ssh2
Jun  5 19:27:39 itv-usvr-01 sshd[32571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.155.97.128  user=root
Jun  5 19:27:41 itv-usvr-01 sshd[32571]: Failed password for root from 52.155.97.128 port 38802 ssh2
Jun  5 19:27:49 itv-usvr-01 sshd[32602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.155.97.128  user=root
Jun  5 19:27:51 itv-usvr-01 sshd[32602]: Failed password for root from 52.155.97.128 port 54798 ssh2
2020-06-05 20:34:14
114.234.252.203 attackspambots
SpamScore above: 10.0
2020-06-05 20:31:20
183.82.2.22 attackspambots
2020-06-05T13:57:11.010806vps773228.ovh.net sshd[8522]: Failed password for root from 183.82.2.22 port 50732 ssh2
2020-06-05T14:01:01.849044vps773228.ovh.net sshd[8565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.2.22  user=root
2020-06-05T14:01:03.379053vps773228.ovh.net sshd[8565]: Failed password for root from 183.82.2.22 port 54542 ssh2
2020-06-05T14:04:51.911863vps773228.ovh.net sshd[8587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.2.22  user=root
2020-06-05T14:04:53.683060vps773228.ovh.net sshd[8587]: Failed password for root from 183.82.2.22 port 58348 ssh2
...
2020-06-05 20:48:06
61.177.172.128 attack
Jun  5 14:57:34 vps sshd[697401]: Failed password for root from 61.177.172.128 port 4186 ssh2
Jun  5 14:57:37 vps sshd[697401]: Failed password for root from 61.177.172.128 port 4186 ssh2
Jun  5 14:57:40 vps sshd[697401]: Failed password for root from 61.177.172.128 port 4186 ssh2
Jun  5 14:57:43 vps sshd[697401]: Failed password for root from 61.177.172.128 port 4186 ssh2
Jun  5 14:57:46 vps sshd[697401]: Failed password for root from 61.177.172.128 port 4186 ssh2
...
2020-06-05 21:02:04
177.84.146.16 attack
failed logins
2020-06-05 20:24:12
109.173.40.60 attack
2020-06-05T07:37:50.2086951495-001 sshd[37688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-109-173-40-60.ip.moscow.rt.ru  user=root
2020-06-05T07:37:52.3972111495-001 sshd[37688]: Failed password for root from 109.173.40.60 port 32790 ssh2
2020-06-05T07:41:08.9362651495-001 sshd[37767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-109-173-40-60.ip.moscow.rt.ru  user=root
2020-06-05T07:41:10.6878781495-001 sshd[37767]: Failed password for root from 109.173.40.60 port 33838 ssh2
2020-06-05T07:44:30.0135081495-001 sshd[37898]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-109-173-40-60.ip.moscow.rt.ru  user=root
2020-06-05T07:44:32.0259991495-001 sshd[37898]: Failed password for root from 109.173.40.60 port 34900 ssh2
...
2020-06-05 21:01:02
202.79.34.76 attack
Jun  5 14:16:17 vps647732 sshd[17026]: Failed password for root from 202.79.34.76 port 39018 ssh2
...
2020-06-05 20:32:55
122.51.230.155 attack
2020-06-05T12:13:59.652845shield sshd\[21065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.230.155  user=root
2020-06-05T12:14:01.654649shield sshd\[21065\]: Failed password for root from 122.51.230.155 port 41058 ssh2
2020-06-05T12:17:26.851022shield sshd\[21427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.230.155  user=root
2020-06-05T12:17:28.602143shield sshd\[21427\]: Failed password for root from 122.51.230.155 port 58402 ssh2
2020-06-05T12:20:55.352008shield sshd\[21702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.230.155  user=root
2020-06-05 20:40:27
39.98.249.124 attackbots
Port Scan
2020-06-05 20:46:35
180.106.81.168 attack
Jun  5 13:56:28 PorscheCustomer sshd[26205]: Failed password for root from 180.106.81.168 port 38862 ssh2
Jun  5 14:00:17 PorscheCustomer sshd[26317]: Failed password for root from 180.106.81.168 port 38992 ssh2
...
2020-06-05 20:16:28
45.126.161.186 attack
Jun  5 14:35:49 [host] sshd[13346]: pam_unix(sshd:
Jun  5 14:35:52 [host] sshd[13346]: Failed passwor
Jun  5 14:39:58 [host] sshd[13704]: pam_unix(sshd:
2020-06-05 20:53:20
68.183.193.148 attackspam
Jun  5 02:31:00 web1 sshd\[13692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148  user=root
Jun  5 02:31:01 web1 sshd\[13692\]: Failed password for root from 68.183.193.148 port 51180 ssh2
Jun  5 02:34:28 web1 sshd\[13945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148  user=root
Jun  5 02:34:30 web1 sshd\[13945\]: Failed password for root from 68.183.193.148 port 54616 ssh2
Jun  5 02:37:55 web1 sshd\[14205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.193.148  user=root
2020-06-05 20:45:40
45.231.12.37 attackbotsspam
Jun  5 12:54:04 pi sshd[30902]: Failed password for root from 45.231.12.37 port 34376 ssh2
2020-06-05 20:49:15
68.183.39.136 attackspam
trying to access non-authorized port
2020-06-05 20:42:52

最近上报的IP列表

5.122.41.111 35.57.77.201 201.131.125.180 27.54.201.67
125.77.66.86 185.160.103.246 108.255.1.173 7.118.244.121
15.104.10.72 248.112.17.51 154.144.148.89 181.131.162.28
127.48.95.203 3.211.93.103 209.59.228.151 62.103.51.120
203.211.56.116 174.225.173.87 58.8.133.69 59.168.214.177