必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '83.125.0.0 - 83.125.255.255'

% Abuse contact for '83.125.0.0 - 83.125.255.255' is 'abuse@eunetworks.com'

inetnum:        83.125.0.0 - 83.125.255.255
netname:        DE-EUN-SUBALLOC-05052015
descr:          euNetworks SUB-ALLOCATION IPs for PA Assignment
country:        DE
admin-c:        HMS120-RIPE
tech-c:         HMS120-RIPE
status:         SUB-ALLOCATED PA
mnt-by:         LNC-MNT
mnt-by:         EUNX-MNT
created:        2015-05-05T11:02:51Z
last-modified:  2025-03-11T18:25:59Z
source:         RIPE

role:           HostMaster euNetworks
address:        euNetworks GmbH / former Serico GmbH
address:        Franklinstrae 61-63
address:        60486 FRANKFURT /M
address:        Germany
phone:          +49 69 90554 0
fax-no:         +49 69 90554 111
admin-c:        CPS30-RIPE
tech-c:         CPS30-RIPE
abuse-mailbox:  abuse@eunetworks.com
nic-hdl:        HMS120-RIPE
remarks:        **********************************************
remarks:        * Role Account for the "Sysadmin of the Day" *
remarks:        **********************************************
remarks:        * ABUSE CONTACT: abuse@eunetworks.com *
remarks:        * *
remarks:        * IN CASE OF HACK ATTACKS, ILLEGAL ACTIVITY, *
remarks:        * VIOLATION, SCANS, PROBES, SPAM, ETC. *
remarks:        **********************************************
mnt-by:         EUNX-MNT
created:        2009-02-17T13:27:54Z
last-modified:  2025-01-08T13:30:12Z
source:         RIPE # Filtered

% Information related to '83.124.0.0/14AS13237'

route:          83.124.0.0/14
descr:          Lambdanet Operations
origin:         AS13237
mnt-by:         LNC-MNT
created:        2004-10-06T10:12:32Z
last-modified:  2019-09-27T12:20:04Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.1 (BUSA)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 83.125.81.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56576
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;83.125.81.207.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031700 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 17 18:30:35 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
b'Host 207.81.125.83.in-addr.arpa not found: 2(SERVFAIL)
'
NSLOOKUP信息:
server can't find 83.125.81.207.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.140.6.8 attackbotsspam
Jun 24 13:20:10 xxxx sshd[9467]: error: PAM: Authentication error for root from 222.140.6.8
Jun 24 13:20:10 xxxx syslogd: last message repeated 1 times
2019-06-25 17:34:15
192.31.231.241 attack
Web App Attack
2019-06-25 18:28:38
95.227.95.233 attackspambots
Jun 25 08:02:13 MK-Soft-VM5 sshd\[4280\]: Invalid user ftb from 95.227.95.233 port 54390
Jun 25 08:02:13 MK-Soft-VM5 sshd\[4280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.227.95.233
Jun 25 08:02:15 MK-Soft-VM5 sshd\[4280\]: Failed password for invalid user ftb from 95.227.95.233 port 54390 ssh2
...
2019-06-25 17:44:40
128.199.133.249 attackbots
Jun 25 07:08:16 unicornsoft sshd\[11303\]: Invalid user noah from 128.199.133.249
Jun 25 07:08:16 unicornsoft sshd\[11303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.133.249
Jun 25 07:08:18 unicornsoft sshd\[11303\]: Failed password for invalid user noah from 128.199.133.249 port 55328 ssh2
2019-06-25 18:24:06
122.192.33.102 attackspambots
Jun 25 06:08:48 XXX sshd[16297]: Invalid user system from 122.192.33.102 port 56050
2019-06-25 18:44:59
194.63.143.189 attackbotsspam
SIPVicious Scanner Detection
2019-06-25 18:35:45
218.92.0.133 attackspam
2019-06-25T09:44:20.031033abusebot-4.cloudsearch.cf sshd\[8861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.133  user=root
2019-06-25 17:51:26
206.189.232.29 attackspambots
Jun 25 08:57:01 ovpn sshd\[3580\]: Invalid user duan from 206.189.232.29
Jun 25 08:57:01 ovpn sshd\[3580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.232.29
Jun 25 08:57:03 ovpn sshd\[3580\]: Failed password for invalid user duan from 206.189.232.29 port 37658 ssh2
Jun 25 09:01:39 ovpn sshd\[3689\]: Invalid user temp1 from 206.189.232.29
Jun 25 09:01:39 ovpn sshd\[3689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.232.29
2019-06-25 17:52:31
163.172.12.172 attackspambots
C1,WP GET /digitale-produkte/wp-login.php
2019-06-25 18:04:47
89.36.224.8 attack
fell into ViewStateTrap:nairobi
2019-06-25 18:17:13
34.77.68.176 attackbots
3389BruteforceFW21
2019-06-25 18:10:58
185.222.211.46 attackspambots
firewall-block, port(s): 5900/tcp
2019-06-25 18:08:48
171.8.199.77 attack
Jun 25 08:17:17 localhost sshd\[53850\]: Invalid user crv from 171.8.199.77 port 43928
Jun 25 08:17:17 localhost sshd\[53850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.8.199.77
...
2019-06-25 18:04:03
218.92.0.138 attackspam
Jun 25 09:01:37 62-210-73-4 sshd\[15079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Jun 25 09:01:39 62-210-73-4 sshd\[15079\]: Failed password for root from 218.92.0.138 port 46044 ssh2
...
2019-06-25 17:37:16
54.39.151.22 attackbotsspam
frenzy
2019-06-25 18:37:53

最近上报的IP列表

115.214.90.185 171.35.235.209 56.246.19.182 10.0.0.187
46.192.115.62 171.218.47.55 185.247.137.234 147.185.132.50
47.253.180.227 43.164.2.152 74.91.133.41 60.221.9.178
218.12.30.14 47.254.234.203 91.231.89.44 91.219.9.12
171.78.165.97 249.124.156.43 247.226.11.200 36.106.166.48