必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 9.20.112.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12679
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;9.20.112.125.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 07:30:44 CST 2025
;; MSG SIZE  rcvd: 105
HOST信息:
Host 125.112.20.9.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.112.20.9.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
124.65.152.14 attackspambots
Aug 30 19:00:23 lnxded63 sshd[26861]: Failed password for root from 124.65.152.14 port 59769 ssh2
Aug 30 19:00:23 lnxded63 sshd[26861]: Failed password for root from 124.65.152.14 port 59769 ssh2
2019-08-31 01:39:12
178.62.30.249 attackbotsspam
Aug 30 14:00:44 vps200512 sshd\[31427\]: Invalid user job from 178.62.30.249
Aug 30 14:00:44 vps200512 sshd\[31427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.30.249
Aug 30 14:00:46 vps200512 sshd\[31427\]: Failed password for invalid user job from 178.62.30.249 port 41250 ssh2
Aug 30 14:04:53 vps200512 sshd\[31479\]: Invalid user awong from 178.62.30.249
Aug 30 14:04:53 vps200512 sshd\[31479\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.30.249
2019-08-31 02:14:58
123.207.16.96 attackspam
Aug 30 18:29:04 dedicated sshd[4488]: Failed password for root from 123.207.16.96 port 53502 ssh2
Aug 30 18:29:02 dedicated sshd[4488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.16.96  user=root
Aug 30 18:29:04 dedicated sshd[4488]: Failed password for root from 123.207.16.96 port 53502 ssh2
Aug 30 18:29:04 dedicated sshd[4488]: error: Received disconnect from 123.207.16.96 port 53502:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
Aug 30 18:29:06 dedicated sshd[4500]: Invalid user pi from 123.207.16.96 port 53570
2019-08-31 01:28:01
178.150.235.38 attackspam
19/8/30@12:28:52: FAIL: Alarm-Intrusion address from=178.150.235.38
19/8/30@12:28:52: FAIL: Alarm-Intrusion address from=178.150.235.38
...
2019-08-31 01:37:20
175.23.246.184 attack
Unauthorised access (Aug 30) SRC=175.23.246.184 LEN=40 TTL=49 ID=7016 TCP DPT=8080 WINDOW=43034 SYN 
Unauthorised access (Aug 30) SRC=175.23.246.184 LEN=40 TTL=49 ID=8129 TCP DPT=8080 WINDOW=43034 SYN 
Unauthorised access (Aug 30) SRC=175.23.246.184 LEN=40 TTL=49 ID=7524 TCP DPT=8080 WINDOW=43034 SYN 
Unauthorised access (Aug 29) SRC=175.23.246.184 LEN=40 TTL=49 ID=11335 TCP DPT=8080 WINDOW=57753 SYN
2019-08-31 02:01:48
45.227.253.116 attack
Aug 30 19:14:18 relay postfix/smtpd\[19983\]: warning: unknown\[45.227.253.116\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 19:14:25 relay postfix/smtpd\[14541\]: warning: unknown\[45.227.253.116\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 19:14:59 relay postfix/smtpd\[15119\]: warning: unknown\[45.227.253.116\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 19:15:06 relay postfix/smtpd\[9544\]: warning: unknown\[45.227.253.116\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 30 19:24:47 relay postfix/smtpd\[24309\]: warning: unknown\[45.227.253.116\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-31 01:32:31
117.254.82.196 attack
Aug 30 19:39:27 icinga sshd[25098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.254.82.196
Aug 30 19:39:29 icinga sshd[25098]: Failed password for invalid user alexander from 117.254.82.196 port 43866 ssh2
...
2019-08-31 02:10:10
118.24.25.150 attack
Aug 30 18:29:09 mail sshd\[14545\]: Invalid user vinnie from 118.24.25.150
Aug 30 18:29:09 mail sshd\[14545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.25.150
Aug 30 18:29:12 mail sshd\[14545\]: Failed password for invalid user vinnie from 118.24.25.150 port 60708 ssh2
...
2019-08-31 01:22:20
1.217.98.44 attack
Aug 30 18:24:23 MK-Soft-Root2 sshd\[18676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.217.98.44  user=root
Aug 30 18:24:25 MK-Soft-Root2 sshd\[18676\]: Failed password for root from 1.217.98.44 port 49380 ssh2
Aug 30 18:28:57 MK-Soft-Root2 sshd\[19265\]: Invalid user oracle from 1.217.98.44 port 36768
Aug 30 18:28:57 MK-Soft-Root2 sshd\[19265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.217.98.44
...
2019-08-31 01:33:08
191.241.145.111 attack
Mail sent to address harvested from public web site
2019-08-31 01:28:47
46.105.144.48 attackbots
DATE:2019-08-30 18:28:23, IP:46.105.144.48, PORT:5900 - VNC brute force auth on a honeypot server (epe-dc)
2019-08-31 02:06:33
2.59.119.105 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-08-31 02:16:50
190.131.225.195 attackbotsspam
Aug 30 18:14:25 web8 sshd\[15097\]: Invalid user test from 190.131.225.195
Aug 30 18:14:25 web8 sshd\[15097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.131.225.195
Aug 30 18:14:26 web8 sshd\[15097\]: Failed password for invalid user test from 190.131.225.195 port 50540 ssh2
Aug 30 18:20:10 web8 sshd\[17827\]: Invalid user huawei from 190.131.225.195
Aug 30 18:20:10 web8 sshd\[17827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.131.225.195
2019-08-31 02:23:11
185.126.14.78 attack
Aug 30 18:23:02 mxgate1 postfix/postscreen[31757]: CONNECT from [185.126.14.78]:43007 to [176.31.12.44]:25
Aug 30 18:23:02 mxgate1 postfix/dnsblog[32151]: addr 185.126.14.78 listed by domain zen.spamhaus.org as 127.0.0.4
Aug 30 18:23:02 mxgate1 postfix/dnsblog[32151]: addr 185.126.14.78 listed by domain zen.spamhaus.org as 127.0.0.11
Aug 30 18:23:02 mxgate1 postfix/dnsblog[32151]: addr 185.126.14.78 listed by domain zen.spamhaus.org as 127.0.0.3
Aug 30 18:23:02 mxgate1 postfix/dnsblog[32162]: addr 185.126.14.78 listed by domain cbl.abuseat.org as 127.0.0.2
Aug 30 18:23:02 mxgate1 postfix/dnsblog[32153]: addr 185.126.14.78 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Aug 30 18:23:02 mxgate1 postfix/dnsblog[32152]: addr 185.126.14.78 listed by domain b.barracudacentral.org as 127.0.0.2
Aug 30 18:23:03 mxgate1 postfix/postscreen[31757]: PREGREET 18 after 1.1 from [185.126.14.78]:43007: EHLO 01yahoo.com

Aug 30 18:23:03 mxgate1 postfix/postscreen[31757]: DNSBL rank 5 f........
-------------------------------
2019-08-31 01:19:18
178.62.220.123 attackspambots
Aug 30 18:28:44 mail sshd\[14524\]: Invalid user node from 178.62.220.123
Aug 30 18:28:44 mail sshd\[14524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.220.123
Aug 30 18:28:46 mail sshd\[14524\]: Failed password for invalid user node from 178.62.220.123 port 54018 ssh2
...
2019-08-31 01:42:45

最近上报的IP列表

134.162.90.63 169.117.169.181 51.156.175.116 62.245.234.25
215.40.130.201 50.157.40.34 53.130.102.133 202.109.51.127
238.0.191.255 231.224.238.236 130.134.94.236 73.165.45.150
201.61.221.226 230.157.52.67 205.252.156.128 7.165.137.30
82.129.168.147 70.151.134.231 47.52.170.176 60.86.185.146