必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Binjai

省份(region): North Sumatra

国家(country): Indonesia

运营商(isp): Esia

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
103.138.148.25 attack
Jul 18 11:38:25 pixelmemory sshd[1878945]: Invalid user matilde from 103.138.148.25 port 58228
Jul 18 11:38:25 pixelmemory sshd[1878945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.25 
Jul 18 11:38:25 pixelmemory sshd[1878945]: Invalid user matilde from 103.138.148.25 port 58228
Jul 18 11:38:27 pixelmemory sshd[1878945]: Failed password for invalid user matilde from 103.138.148.25 port 58228 ssh2
Jul 18 11:42:05 pixelmemory sshd[1888333]: Invalid user web1 from 103.138.148.25 port 33590
...
2020-07-19 03:03:54
103.138.148.25 attackbots
Jul 16 14:37:56 srv-ubuntu-dev3 sshd[25959]: Invalid user access from 103.138.148.25
Jul 16 14:37:56 srv-ubuntu-dev3 sshd[25959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.25
Jul 16 14:37:56 srv-ubuntu-dev3 sshd[25959]: Invalid user access from 103.138.148.25
Jul 16 14:37:58 srv-ubuntu-dev3 sshd[25959]: Failed password for invalid user access from 103.138.148.25 port 39322 ssh2
Jul 16 14:40:40 srv-ubuntu-dev3 sshd[26237]: Invalid user tfl from 103.138.148.25
Jul 16 14:40:40 srv-ubuntu-dev3 sshd[26237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.25
Jul 16 14:40:40 srv-ubuntu-dev3 sshd[26237]: Invalid user tfl from 103.138.148.25
Jul 16 14:40:42 srv-ubuntu-dev3 sshd[26237]: Failed password for invalid user tfl from 103.138.148.25 port 54382 ssh2
Jul 16 14:43:30 srv-ubuntu-dev3 sshd[26558]: Invalid user vivek from 103.138.148.25
...
2020-07-16 21:08:29
103.138.148.25 attack
Jul  6 23:28:56 srv-ubuntu-dev3 sshd[80895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.25  user=root
Jul  6 23:28:58 srv-ubuntu-dev3 sshd[80895]: Failed password for root from 103.138.148.25 port 48004 ssh2
Jul  6 23:32:20 srv-ubuntu-dev3 sshd[81457]: Invalid user wim from 103.138.148.25
Jul  6 23:32:20 srv-ubuntu-dev3 sshd[81457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.25
Jul  6 23:32:20 srv-ubuntu-dev3 sshd[81457]: Invalid user wim from 103.138.148.25
Jul  6 23:32:22 srv-ubuntu-dev3 sshd[81457]: Failed password for invalid user wim from 103.138.148.25 port 45916 ssh2
Jul  6 23:35:34 srv-ubuntu-dev3 sshd[81956]: Invalid user redmine from 103.138.148.25
Jul  6 23:35:34 srv-ubuntu-dev3 sshd[81956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.25
Jul  6 23:35:34 srv-ubuntu-dev3 sshd[81956]: Invalid user redmine from 
...
2020-07-07 06:14:14
103.138.145.123 attackspambots
1590896897 - 05/31/2020 05:48:17 Host: 103.138.145.123/103.138.145.123 Port: 445 TCP Blocked
2020-05-31 18:18:34
103.138.144.81 attackspambots
invalid login attempt (guest)
2020-02-08 20:42:55
103.138.145.2 attackspambots
web Attack on Wordpress site at 2020-01-02.
2020-01-03 03:39:27
103.138.148.59 attack
82/tcp
[2019-10-26]1pkt
2019-10-26 15:36:30
103.138.148.63 attackspambots
Oct 20 21:22:28 hcbbdb sshd\[32230\]: Invalid user sarath from 103.138.148.63
Oct 20 21:22:28 hcbbdb sshd\[32230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.63
Oct 20 21:22:30 hcbbdb sshd\[32230\]: Failed password for invalid user sarath from 103.138.148.63 port 36062 ssh2
Oct 20 21:26:19 hcbbdb sshd\[32627\]: Invalid user mahalkita from 103.138.148.63
Oct 20 21:26:19 hcbbdb sshd\[32627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.63
2019-10-21 05:28:38
103.138.148.63 attack
Oct 18 18:36:46 lnxmail61 sshd[25239]: Failed password for root from 103.138.148.63 port 37132 ssh2
Oct 18 18:44:28 lnxmail61 sshd[26349]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.63
Oct 18 18:44:30 lnxmail61 sshd[26349]: Failed password for invalid user temp from 103.138.148.63 port 49616 ssh2
2019-10-19 00:47:27
103.138.148.63 attack
Oct 15 16:35:00 h2034429 sshd[1397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.63  user=r.r
Oct 15 16:35:02 h2034429 sshd[1397]: Failed password for r.r from 103.138.148.63 port 46628 ssh2
Oct 15 16:35:02 h2034429 sshd[1397]: Received disconnect from 103.138.148.63 port 46628:11: Bye Bye [preauth]
Oct 15 16:35:02 h2034429 sshd[1397]: Disconnected from 103.138.148.63 port 46628 [preauth]
Oct 15 16:47:51 h2034429 sshd[1647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.63  user=r.r
Oct 15 16:47:53 h2034429 sshd[1647]: Failed password for r.r from 103.138.148.63 port 42968 ssh2
Oct 15 16:47:53 h2034429 sshd[1647]: Received disconnect from 103.138.148.63 port 42968:11: Bye Bye [preauth]
Oct 15 16:47:53 h2034429 sshd[1647]: Disconnected from 103.138.148.63 port 42968 [preauth]
Oct 15 16:52:02 h2034429 sshd[1700]: pam_unix(sshd:auth): authentication failure; lognam........
-------------------------------
2019-10-18 07:15:20
103.138.148.63 attackbots
Oct 15 16:35:00 h2034429 sshd[1397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.63  user=r.r
Oct 15 16:35:02 h2034429 sshd[1397]: Failed password for r.r from 103.138.148.63 port 46628 ssh2
Oct 15 16:35:02 h2034429 sshd[1397]: Received disconnect from 103.138.148.63 port 46628:11: Bye Bye [preauth]
Oct 15 16:35:02 h2034429 sshd[1397]: Disconnected from 103.138.148.63 port 46628 [preauth]
Oct 15 16:47:51 h2034429 sshd[1647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.138.148.63  user=r.r
Oct 15 16:47:53 h2034429 sshd[1647]: Failed password for r.r from 103.138.148.63 port 42968 ssh2
Oct 15 16:47:53 h2034429 sshd[1647]: Received disconnect from 103.138.148.63 port 42968:11: Bye Bye [preauth]
Oct 15 16:47:53 h2034429 sshd[1647]: Disconnected from 103.138.148.63 port 42968 [preauth]
Oct 15 16:52:02 h2034429 sshd[1700]: pam_unix(sshd:auth): authentication failure; lognam........
-------------------------------
2019-10-16 23:46:50
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.138.14.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62435
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.138.14.43.			IN	A

;; AUTHORITY SECTION:
.			63	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051902 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 20 09:28:59 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
43.14.138.103.in-addr.arpa domain name pointer 43-14-138-103.wiz.net.id.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
43.14.138.103.in-addr.arpa	name = 43-14-138-103.wiz.net.id.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
195.206.105.217 attack
2019-08-17T08:17:11.966014abusebot-4.cloudsearch.cf sshd\[8313\]: Invalid user admin1 from 195.206.105.217 port 57904
2019-08-17 16:20:48
45.70.167.248 attackbots
Aug 17 07:49:42 web8 sshd\[23828\]: Invalid user farah from 45.70.167.248
Aug 17 07:49:42 web8 sshd\[23828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.167.248
Aug 17 07:49:44 web8 sshd\[23828\]: Failed password for invalid user farah from 45.70.167.248 port 56414 ssh2
Aug 17 07:54:48 web8 sshd\[26357\]: Invalid user admin from 45.70.167.248
Aug 17 07:54:48 web8 sshd\[26357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.70.167.248
2019-08-17 16:07:13
178.128.98.134 attackbots
Aug 17 10:57:35 www2 sshd\[2445\]: Invalid user alexhack from 178.128.98.134Aug 17 10:57:37 www2 sshd\[2445\]: Failed password for invalid user alexhack from 178.128.98.134 port 50302 ssh2Aug 17 11:03:46 www2 sshd\[3047\]: Invalid user sanjay12$ from 178.128.98.134
...
2019-08-17 16:11:12
217.182.77.186 attackspam
Aug 17 04:13:08 ny01 sshd[3912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.77.186
Aug 17 04:13:10 ny01 sshd[3912]: Failed password for invalid user submit from 217.182.77.186 port 45504 ssh2
Aug 17 04:17:15 ny01 sshd[4289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.77.186
2019-08-17 16:27:12
218.92.0.203 attackbots
Aug 17 10:20:52 eventyay sshd[5034]: Failed password for root from 218.92.0.203 port 45715 ssh2
Aug 17 10:20:55 eventyay sshd[5034]: Failed password for root from 218.92.0.203 port 45715 ssh2
Aug 17 10:21:24 eventyay sshd[5290]: Failed password for root from 218.92.0.203 port 51618 ssh2
...
2019-08-17 16:37:50
92.222.36.216 attack
Aug 16 21:34:16 aiointranet sshd\[3205\]: Invalid user cvsroot from 92.222.36.216
Aug 16 21:34:16 aiointranet sshd\[3205\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.ip-92-222-36.eu
Aug 16 21:34:18 aiointranet sshd\[3205\]: Failed password for invalid user cvsroot from 92.222.36.216 port 36968 ssh2
Aug 16 21:39:44 aiointranet sshd\[3770\]: Invalid user appldisc from 92.222.36.216
Aug 16 21:39:44 aiointranet sshd\[3770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.ip-92-222-36.eu
2019-08-17 15:53:33
200.108.130.50 attackspambots
Aug 17 09:17:26 h2177944 sshd\[17587\]: Invalid user test1 from 200.108.130.50 port 54582
Aug 17 09:17:26 h2177944 sshd\[17587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.130.50
Aug 17 09:17:27 h2177944 sshd\[17587\]: Failed password for invalid user test1 from 200.108.130.50 port 54582 ssh2
Aug 17 09:23:28 h2177944 sshd\[17739\]: Invalid user wm from 200.108.130.50 port 47080
Aug 17 09:23:28 h2177944 sshd\[17739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.130.50
...
2019-08-17 16:01:44
118.69.32.167 attackspam
Aug 17 04:22:49 ny01 sshd[4785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.32.167
Aug 17 04:22:52 ny01 sshd[4785]: Failed password for invalid user import from 118.69.32.167 port 49968 ssh2
Aug 17 04:28:11 ny01 sshd[5286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.69.32.167
2019-08-17 16:34:41
95.177.164.106 attackbots
Aug 17 08:17:05 hb sshd\[434\]: Invalid user dtogroup.com from 95.177.164.106
Aug 17 08:17:05 hb sshd\[434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.177.164.106
Aug 17 08:17:07 hb sshd\[434\]: Failed password for invalid user dtogroup.com from 95.177.164.106 port 58220 ssh2
Aug 17 08:22:05 hb sshd\[876\]: Invalid user com from 95.177.164.106
Aug 17 08:22:05 hb sshd\[876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.177.164.106
2019-08-17 16:28:27
123.143.203.67 attack
Aug 16 21:57:36 wbs sshd\[12524\]: Invalid user castis from 123.143.203.67
Aug 16 21:57:36 wbs sshd\[12524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.143.203.67
Aug 16 21:57:38 wbs sshd\[12524\]: Failed password for invalid user castis from 123.143.203.67 port 37728 ssh2
Aug 16 22:02:38 wbs sshd\[12989\]: Invalid user os from 123.143.203.67
Aug 16 22:02:38 wbs sshd\[12989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.143.203.67
2019-08-17 16:13:40
106.244.232.198 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-08-17 16:06:29
72.221.232.138 attack
IMAP brute force
...
2019-08-17 16:46:36
61.239.33.228 attackbotsspam
Aug 17 09:56:53 lnxmysql61 sshd[5831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.239.33.228
Aug 17 09:56:53 lnxmysql61 sshd[5831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.239.33.228
2019-08-17 16:01:23
81.183.213.222 attackbotsspam
Aug 17 09:54:58 eventyay sshd[30976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.213.222
Aug 17 09:55:01 eventyay sshd[30976]: Failed password for invalid user forrest from 81.183.213.222 port 5729 ssh2
Aug 17 09:59:28 eventyay sshd[32037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.213.222
...
2019-08-17 16:05:01
139.198.2.196 attackbotsspam
Aug 17 09:56:05 rpi sshd[21105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.2.196 
Aug 17 09:56:07 rpi sshd[21105]: Failed password for invalid user oscar from 139.198.2.196 port 52086 ssh2
2019-08-17 16:27:50

最近上报的IP列表

103.137.69.245 103.138.233.36 103.138.88.64 103.139.102.5
103.139.48.118 103.139.48.134 103.139.48.16 103.139.48.187
103.139.48.19 63.247.85.141 103.139.48.226 103.144.102.100
103.144.127.228 103.144.132.1 103.144.132.10 103.144.132.102
103.144.132.109 103.144.132.111 103.144.132.112 103.144.132.123