必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.68.128.185 attackbotsspam
Automatic report generated by Wazuh
2020-09-19 20:38:31
138.68.128.185 attack
138.68.128.185 - - [19/Sep/2020:04:55:55 +0100] "POST /wp-login.php HTTP/1.1" 200 2265 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.128.185 - - [19/Sep/2020:04:56:06 +0100] "POST /wp-login.php HTTP/1.1" 200 2183 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.128.185 - - [19/Sep/2020:04:56:11 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-19 12:35:07
138.68.128.185 attack
SSH 2020-09-19 00:41:12	138.68.128.185	139.99.53.101	>	GET	www.materialhandling.web.id	/wp-login.php	HTTP/1.1	-	-
2020-09-19 00:41:18	138.68.128.185	139.99.53.101	>	POST	www.materialhandling.web.id	/wp-login.php	HTTP/1.1	-	-
2020-09-19 02:33:05	138.68.128.185	139.99.53.101	>	POST	karsagroup.co.id	/wp-login.php	HTTP/1.1	-	-
2020-09-19 04:12:14
138.68.128.164 attackbots
Wordpress malicious attack:[octablocked]
2020-04-20 12:18:59
138.68.128.80 attackspambots
2019-09-23T17:02:39.893960abusebot-7.cloudsearch.cf sshd\[31323\]: Invalid user 123456 from 138.68.128.80 port 49924
2019-09-24 01:03:07
138.68.128.80 attack
Sep 22 04:52:22 hpm sshd\[2647\]: Invalid user nt from 138.68.128.80
Sep 22 04:52:22 hpm sshd\[2647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.128.80
Sep 22 04:52:24 hpm sshd\[2647\]: Failed password for invalid user nt from 138.68.128.80 port 48258 ssh2
Sep 22 04:56:33 hpm sshd\[2975\]: Invalid user test from 138.68.128.80
Sep 22 04:56:33 hpm sshd\[2975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.128.80
2019-09-23 01:03:56
138.68.128.80 attack
Sep 17 13:52:08 webhost01 sshd[22153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.128.80
Sep 17 13:52:10 webhost01 sshd[22153]: Failed password for invalid user anon from 138.68.128.80 port 52078 ssh2
...
2019-09-17 15:08:48
138.68.128.80 attack
Sep 12 23:13:03 eventyay sshd[14993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.128.80
Sep 12 23:13:05 eventyay sshd[14993]: Failed password for invalid user 123321 from 138.68.128.80 port 56800 ssh2
Sep 12 23:18:30 eventyay sshd[15139]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.128.80
...
2019-09-13 05:22:46
138.68.128.80 attack
" "
2019-09-04 01:56:50
138.68.128.80 attackbots
Aug 31 15:16:59 plex sshd[16973]: Invalid user dattesh from 138.68.128.80 port 34686
2019-08-31 21:20:11
138.68.128.80 attackbots
Aug 31 13:40:58 plex sshd[14114]: Invalid user ankesh from 138.68.128.80 port 58948
2019-08-31 19:41:08
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.128.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17356
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.128.245.			IN	A

;; AUTHORITY SECTION:
.			5	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:51:10 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 245.128.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.128.68.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
94.102.49.7 attackspam
brute force
2020-09-07 18:07:28
164.52.24.177 attackbots
Port scan: Attack repeated for 24 hours
2020-09-07 18:20:43
119.28.238.101 attackspam
Sep  6 23:34:31 web9 sshd\[8237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.238.101  user=root
Sep  6 23:34:34 web9 sshd\[8237\]: Failed password for root from 119.28.238.101 port 55826 ssh2
Sep  6 23:37:15 web9 sshd\[8676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.238.101  user=root
Sep  6 23:37:17 web9 sshd\[8676\]: Failed password for root from 119.28.238.101 port 40746 ssh2
Sep  6 23:40:05 web9 sshd\[9073\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.238.101  user=root
2020-09-07 18:05:24
177.152.124.21 attackspambots
Sep  7 10:52:00 myvps sshd[12591]: Failed password for root from 177.152.124.21 port 39302 ssh2
Sep  7 10:58:55 myvps sshd[17026]: Failed password for root from 177.152.124.21 port 43616 ssh2
Sep  7 11:03:23 myvps sshd[28760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.152.124.21 
...
2020-09-07 18:07:11
46.105.29.160 attack
Sep  6 20:52:52 markkoudstaal sshd[21263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.160
Sep  6 20:52:54 markkoudstaal sshd[21263]: Failed password for invalid user amor from 46.105.29.160 port 33584 ssh2
Sep  6 20:54:50 markkoudstaal sshd[21771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.29.160
...
2020-09-07 18:18:00
167.99.49.115 attack
Sep  7 03:41:32 finn sshd[13964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.49.115  user=r.r
Sep  7 03:41:34 finn sshd[13964]: Failed password for r.r from 167.99.49.115 port 46086 ssh2
Sep  7 03:41:34 finn sshd[13964]: Received disconnect from 167.99.49.115 port 46086:11: Bye Bye [preauth]
Sep  7 03:41:34 finn sshd[13964]: Disconnected from 167.99.49.115 port 46086 [preauth]
Sep  7 03:46:34 finn sshd[15212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.49.115  user=r.r
Sep  7 03:46:35 finn sshd[15212]: Failed password for r.r from 167.99.49.115 port 39632 ssh2
Sep  7 03:46:35 finn sshd[15212]: Received disconnect from 167.99.49.115 port 39632:11: Bye Bye [preauth]
Sep  7 03:46:35 finn sshd[15212]: Disconnected from 167.99.49.115 port 39632 [preauth]
Sep  7 03:49:54 finn sshd[15259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhos........
-------------------------------
2020-09-07 18:10:29
178.138.195.166 attackbotsspam
1599410834 - 09/06/2020 18:47:14 Host: 178.138.195.166/178.138.195.166 Port: 445 TCP Blocked
2020-09-07 18:27:58
103.99.3.212 attack
MAIL: User Login Brute Force Attempt
2020-09-07 18:32:47
222.186.175.217 attack
2020-09-07T13:07:36.139625lavrinenko.info sshd[11825]: Failed password for root from 222.186.175.217 port 8700 ssh2
2020-09-07T13:07:39.168901lavrinenko.info sshd[11825]: Failed password for root from 222.186.175.217 port 8700 ssh2
2020-09-07T13:07:43.197437lavrinenko.info sshd[11825]: Failed password for root from 222.186.175.217 port 8700 ssh2
2020-09-07T13:07:47.972712lavrinenko.info sshd[11825]: Failed password for root from 222.186.175.217 port 8700 ssh2
2020-09-07T13:07:48.040408lavrinenko.info sshd[11825]: error: maximum authentication attempts exceeded for root from 222.186.175.217 port 8700 ssh2 [preauth]
...
2020-09-07 18:09:29
106.12.52.154 attackbots
Sep  7 04:55:15 Host-KEWR-E sshd[222553]: Disconnected from invalid user www-data 106.12.52.154 port 46276 [preauth]
...
2020-09-07 18:11:23
180.76.238.19 attack
Sep  7 10:07:47 mellenthin sshd[18877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.238.19  user=root
Sep  7 10:07:49 mellenthin sshd[18877]: Failed password for invalid user root from 180.76.238.19 port 37690 ssh2
2020-09-07 18:29:10
36.72.105.181 attackspam
1599410838 - 09/06/2020 18:47:18 Host: 36.72.105.181/36.72.105.181 Port: 445 TCP Blocked
2020-09-07 18:25:02
41.251.254.98 attackbots
Sep 07 03:08:19 askasleikir sshd[92403]: Failed password for root from 41.251.254.98 port 58206 ssh2
2020-09-07 18:33:18
75.140.174.122 attackspambots
prod8
...
2020-09-07 18:42:31
58.182.119.33 attack
Port 22 Scan, PTR: None
2020-09-07 18:14:26

最近上报的IP列表

10.179.237.108 138.68.128.113 138.68.128.94 138.68.13.78
138.68.129.167 138.68.129.219 118.179.36.123 138.68.130.246
138.68.130.69 138.68.131.161 138.68.132.156 138.68.131.205
138.68.132.167 138.68.132.43 138.68.132.250 138.68.131.209
138.68.131.163 138.68.130.35 138.68.131.188 138.68.133.169