必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Portugal

运营商(isp): Vodafone

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.61.170.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6644
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;94.61.170.125.			IN	A

;; AUTHORITY SECTION:
.			409	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050300 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 04 03:30:04 CST 2023
;; MSG SIZE  rcvd: 106
HOST信息:
125.170.61.94.in-addr.arpa domain name pointer 125.170.61.94.rev.vodafone.pt.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
125.170.61.94.in-addr.arpa	name = 125.170.61.94.rev.vodafone.pt.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.171.121.25 attackspam
Unauthorized connection attempt from IP address 14.171.121.25 on Port 445(SMB)
2020-09-25 03:10:54
36.228.7.155 attackbots
Unauthorized connection attempt from IP address 36.228.7.155 on Port 445(SMB)
2020-09-25 02:57:54
219.239.47.66 attackspam
Sep 24 14:25:19 web1 sshd[2639]: Invalid user everdata from 219.239.47.66 port 39192
Sep 24 14:25:19 web1 sshd[2639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66
Sep 24 14:25:19 web1 sshd[2639]: Invalid user everdata from 219.239.47.66 port 39192
Sep 24 14:25:21 web1 sshd[2639]: Failed password for invalid user everdata from 219.239.47.66 port 39192 ssh2
Sep 24 14:41:09 web1 sshd[7958]: Invalid user oracle from 219.239.47.66 port 1085
Sep 24 14:41:09 web1 sshd[7958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66
Sep 24 14:41:09 web1 sshd[7958]: Invalid user oracle from 219.239.47.66 port 1085
Sep 24 14:41:10 web1 sshd[7958]: Failed password for invalid user oracle from 219.239.47.66 port 1085 ssh2
Sep 24 14:44:31 web1 sshd[9020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66  user=root
Sep 24 14:44:33 web1 sshd[9020]: 
...
2020-09-25 02:41:05
185.156.73.60 attackspam
445/tcp 60389/tcp 38919/tcp...
[2020-07-25/09-24]13773pkt,693pt.(tcp),63pt.(udp)
2020-09-25 02:46:18
115.50.229.111 attack
Auto Detect Rule!
proto TCP (SYN), 115.50.229.111:41518->gjan.info:23, len 40
2020-09-25 02:42:00
20.46.183.211 attack
$f2bV_matches
2020-09-25 02:33:29
81.214.86.250 attackbots
Automatic report - Port Scan Attack
2020-09-25 02:53:44
14.183.173.87 attackbotsspam
20/9/23@13:00:29: FAIL: Alarm-Network address from=14.183.173.87
20/9/23@13:00:29: FAIL: Alarm-Network address from=14.183.173.87
...
2020-09-25 02:58:23
190.186.43.70 attackbots
Auto Detect Rule!
proto TCP (SYN), 190.186.43.70:61587->gjan.info:1433, len 48
2020-09-25 02:48:12
185.232.65.71 attackbots
Port scan denied
2020-09-25 03:08:23
52.255.185.215 attackbots
Lines containing failures of 52.255.185.215
Sep 24 05:56:31 shared07 sshd[30392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.255.185.215  user=r.r
Sep 24 05:56:32 shared07 sshd[30395]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.255.185.215  user=r.r
Sep 24 05:56:34 shared07 sshd[30395]: Failed password for r.r from 52.255.185.215 port 13469 ssh2
Sep 24 05:56:34 shared07 sshd[30395]: Received disconnect from 52.255.185.215 port 13469:11: Client disconnecting normally [preauth]
Sep 24 05:56:34 shared07 sshd[30395]: Disconnected from authenticating user r.r 52.255.185.215 port 13469 [preauth]
Sep 24 05:56:34 shared07 sshd[30392]: Failed password for r.r from 52.255.185.215 port 13453 ssh2
Sep 24 05:56:34 shared07 sshd[30392]: Received disconnect from 52.255.185.215 port 13453:11: Client disconnecting normally [preauth]
Sep 24 05:56:34 shared07 sshd[30392]: Disconnected from authe........
------------------------------
2020-09-25 02:59:39
47.89.192.12 attack
 TCP (SYN) 47.89.192.12:56228 -> port 80, len 40
2020-09-25 02:46:51
75.97.67.213 attackbots
Sep 24 03:17:59 server2 sshd\[30013\]: Invalid user admin from 75.97.67.213
Sep 24 03:18:00 server2 sshd\[30015\]: Invalid user admin from 75.97.67.213
Sep 24 03:18:02 server2 sshd\[30017\]: Invalid user admin from 75.97.67.213
Sep 24 03:18:03 server2 sshd\[30046\]: Invalid user admin from 75.97.67.213
Sep 24 03:18:04 server2 sshd\[30048\]: Invalid user admin from 75.97.67.213
Sep 24 03:18:05 server2 sshd\[30050\]: Invalid user admin from 75.97.67.213
2020-09-25 02:59:28
123.206.26.133 attack
Sep 24 06:41:39 sshgateway sshd\[25634\]: Invalid user share from 123.206.26.133
Sep 24 06:41:39 sshgateway sshd\[25634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.26.133
Sep 24 06:41:41 sshgateway sshd\[25634\]: Failed password for invalid user share from 123.206.26.133 port 58220 ssh2
2020-09-25 03:01:40
221.127.22.165 attack
Brute-force attempt banned
2020-09-25 03:11:20

最近上报的IP列表

206.69.205.234 185.213.81.69 140.9.75.128 20.181.118.242
40.79.189.59 52.96.88.18 96.6.42.97 52.96.111.2
52.96.79.146 52.109.16.111 52.96.179.114 12.211.135.233
108.65.244.157 246.40.198.249 12.54.174.152 73.70.129.204
52.104.7.25 195.240.76.175 83.29.132.8 17.251.193.192