必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.125.85.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11865
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.125.85.106.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:07:35 CST 2025
;; MSG SIZE  rcvd: 106
HOST信息:
106.85.125.99.in-addr.arpa domain name pointer 99-125-85-106.lightspeed.wchtks.sbcglobal.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
106.85.125.99.in-addr.arpa	name = 99-125-85-106.lightspeed.wchtks.sbcglobal.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.75.199.23 attack
Dec 15 07:30:25 nginx sshd[64793]: Invalid user a from 51.75.199.23
Dec 15 07:30:25 nginx sshd[64793]: Received disconnect from 51.75.199.23 port 54744:11: Normal Shutdown, Thank you for playing [preauth]
2019-12-15 14:58:41
165.227.94.166 attackspam
Automatic report - Banned IP Access
2019-12-15 14:21:41
134.175.191.248 attackbotsspam
Dec 15 07:21:48 v22018086721571380 sshd[5071]: Failed password for invalid user uep from 134.175.191.248 port 36006 ssh2
Dec 15 07:30:20 v22018086721571380 sshd[5696]: Failed password for invalid user sm3naru from 134.175.191.248 port 54280 ssh2
2019-12-15 14:53:27
220.248.30.58 attack
Dec 15 06:53:45 eventyay sshd[5565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.30.58
Dec 15 06:53:47 eventyay sshd[5565]: Failed password for invalid user contador from 220.248.30.58 port 64101 ssh2
Dec 15 07:01:13 eventyay sshd[5860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.30.58
...
2019-12-15 14:21:56
89.248.172.85 attackspambots
Dec 15 09:30:25 debian-2gb-vpn-nbg1-1 kernel: [769798.151472] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=89.248.172.85 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=37796 PROTO=TCP SPT=48816 DPT=4789 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-15 14:56:46
198.245.49.37 attackspambots
Invalid user chago from 198.245.49.37 port 52406
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.49.37
Failed password for invalid user chago from 198.245.49.37 port 52406 ssh2
Invalid user zuan from 198.245.49.37 port 60426
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.49.37
2019-12-15 15:04:03
201.218.249.146 attackbots
SQL APT Attack
Reported by and Credit to nic@wlink.biz from IP 118.69.71.82
2019-12-15 14:25:20
206.189.146.13 attackbotsspam
Dec 14 20:22:43 eddieflores sshd\[23022\]: Invalid user smmsp from 206.189.146.13
Dec 14 20:22:43 eddieflores sshd\[23022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.146.13
Dec 14 20:22:44 eddieflores sshd\[23022\]: Failed password for invalid user smmsp from 206.189.146.13 port 54580 ssh2
Dec 14 20:30:10 eddieflores sshd\[23696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.146.13  user=root
Dec 14 20:30:11 eddieflores sshd\[23696\]: Failed password for root from 206.189.146.13 port 46504 ssh2
2019-12-15 15:02:59
5.149.206.240 attackspam
Dec 15 07:09:09 [host] sshd[29186]: Invalid user onofredo from 5.149.206.240
Dec 15 07:09:09 [host] sshd[29186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.149.206.240
Dec 15 07:09:10 [host] sshd[29186]: Failed password for invalid user onofredo from 5.149.206.240 port 37818 ssh2
2019-12-15 14:18:09
218.92.0.145 attack
Dec 15 06:12:06 localhost sshd\[94525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.145  user=root
Dec 15 06:12:08 localhost sshd\[94525\]: Failed password for root from 218.92.0.145 port 10844 ssh2
Dec 15 06:12:11 localhost sshd\[94525\]: Failed password for root from 218.92.0.145 port 10844 ssh2
Dec 15 06:12:14 localhost sshd\[94525\]: Failed password for root from 218.92.0.145 port 10844 ssh2
Dec 15 06:12:18 localhost sshd\[94525\]: Failed password for root from 218.92.0.145 port 10844 ssh2
...
2019-12-15 14:15:31
189.240.117.236 attack
Dec 15 00:22:06 dallas01 sshd[29368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.117.236
Dec 15 00:22:08 dallas01 sshd[29368]: Failed password for invalid user rutger from 189.240.117.236 port 59530 ssh2
Dec 15 00:30:15 dallas01 sshd[30785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.240.117.236
2019-12-15 14:51:01
203.99.62.158 attackbots
Dec 15 06:24:02 hcbbdb sshd\[1954\]: Invalid user broadway from 203.99.62.158
Dec 15 06:24:02 hcbbdb sshd\[1954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158
Dec 15 06:24:04 hcbbdb sshd\[1954\]: Failed password for invalid user broadway from 203.99.62.158 port 53093 ssh2
Dec 15 06:30:32 hcbbdb sshd\[3613\]: Invalid user name from 203.99.62.158
Dec 15 06:30:32 hcbbdb sshd\[3613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.99.62.158
2019-12-15 14:41:28
192.241.213.168 attackbots
Dec 15 06:14:34 web8 sshd\[6461\]: Invalid user rails from 192.241.213.168
Dec 15 06:14:34 web8 sshd\[6461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.213.168
Dec 15 06:14:37 web8 sshd\[6461\]: Failed password for invalid user rails from 192.241.213.168 port 55856 ssh2
Dec 15 06:20:02 web8 sshd\[9082\]: Invalid user server from 192.241.213.168
Dec 15 06:20:02 web8 sshd\[9082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.213.168
2019-12-15 14:27:30
89.248.168.217 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 1057 proto: UDP cat: Misc Attack
2019-12-15 14:20:59
59.33.68.149 attackbotsspam
Dec 15 01:30:20 esmtp postfix/smtpd[27532]: lost connection after AUTH from unknown[59.33.68.149]
Dec 15 01:30:23 esmtp postfix/smtpd[27532]: lost connection after AUTH from unknown[59.33.68.149]
Dec 15 01:30:28 esmtp postfix/smtpd[27532]: lost connection after AUTH from unknown[59.33.68.149]
Dec 15 01:30:31 esmtp postfix/smtpd[27532]: lost connection after AUTH from unknown[59.33.68.149]
Dec 15 01:30:34 esmtp postfix/smtpd[27532]: lost connection after AUTH from unknown[59.33.68.149]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=59.33.68.149
2019-12-15 14:47:03

最近上报的IP列表

120.24.143.242 147.37.94.191 88.157.217.60 72.49.255.91
127.130.233.165 130.27.49.169 147.182.63.35 184.75.186.52
167.203.170.238 238.168.133.147 160.142.0.90 247.200.88.188
28.247.130.115 178.57.148.200 57.226.38.181 18.62.41.135
34.249.130.92 98.221.15.213 163.225.19.111 3.1.143.68