必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Santa Clara

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.68.134.188 attack
Invalid user peter from 138.68.134.188 port 52192
2020-07-19 02:24:51
138.68.134.188 attack
leo_www
2020-07-13 22:04:41
138.68.134.188 attackbots
Jul 13 00:03:37 PorscheCustomer sshd[9091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.134.188
Jul 13 00:03:40 PorscheCustomer sshd[9091]: Failed password for invalid user sergi from 138.68.134.188 port 58318 ssh2
Jul 13 00:06:49 PorscheCustomer sshd[9221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.134.188
...
2020-07-13 06:15:48
138.68.134.188 attackspambots
DATE:2020-07-11 06:11:54,IP:138.68.134.188,MATCHES:11,PORT:ssh
2020-07-11 12:32:39
138.68.134.188 attackbots
$f2bV_matches
2020-07-04 04:10:04
138.68.13.226 attackspam
Unauthorized connection attempt from IP address 138.68.13.226 on port 3389
2020-05-28 23:04:26
138.68.137.20 attack
Unauthorized connection attempt detected from IP address 138.68.137.20 to port 6765 [T]
2020-04-12 16:10:23
138.68.137.20 attackbots
Brute force attempt
2020-04-09 18:16:43
138.68.13.76 attackbots
Port 22 Scan, PTR: None
2020-04-08 02:35:46
138.68.137.20 attack
Apr  4 06:51:24 site3 sshd\[187581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.137.20  user=root
Apr  4 06:51:26 site3 sshd\[187581\]: Failed password for root from 138.68.137.20 port 55852 ssh2
Apr  4 06:52:29 site3 sshd\[187593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.137.20  user=root
Apr  4 06:52:32 site3 sshd\[187593\]: Failed password for root from 138.68.137.20 port 42846 ssh2
Apr  4 06:53:44 site3 sshd\[187603\]: Invalid user admin from 138.68.137.20
...
2020-04-04 17:59:15
138.68.136.152 attackbotsspam
$f2bV_matches
2020-03-18 13:00:56
138.68.136.152 attackbots
Wordpress login scanning
2020-03-18 01:18:28
138.68.13.73 attack
phpunit attack
2020-03-13 18:41:11
138.68.13.73 attackbotsspam
Digital Ocean - should be called Digital Cesspool
//vendor/phpunit/phpunit/phpunit.xsd
2020-03-13 04:51:54
138.68.13.73 attack
Web bot without proper user agent declaration scraping website pages
2020-03-11 12:41:24
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.13.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14350
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.13.52.			IN	A

;; AUTHORITY SECTION:
.			285	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023061400 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 14 23:02:41 CST 2023
;; MSG SIZE  rcvd: 105
HOST信息:
Host 52.13.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 52.13.68.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.185.77.129 attackspambots
Unauthorised access (Sep 25) SRC=222.185.77.129 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=59148 TCP DPT=8080 WINDOW=52682 SYN 
Unauthorised access (Sep 25) SRC=222.185.77.129 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=55457 TCP DPT=8080 WINDOW=52682 SYN
2019-09-26 01:40:38
80.103.163.66 attack
Sep 25 19:08:30 areeb-Workstation sshd[29653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.103.163.66
Sep 25 19:08:32 areeb-Workstation sshd[29653]: Failed password for invalid user pwc from 80.103.163.66 port 38902 ssh2
...
2019-09-26 02:04:56
106.12.132.81 attack
2019-09-25T11:26:27.2767121495-001 sshd\[64389\]: Failed password for invalid user nawira from 106.12.132.81 port 57596 ssh2
2019-09-25T11:40:08.2818421495-001 sshd\[65303\]: Invalid user millicent from 106.12.132.81 port 43808
2019-09-25T11:40:08.2890941495-001 sshd\[65303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.81
2019-09-25T11:40:10.6807801495-001 sshd\[65303\]: Failed password for invalid user millicent from 106.12.132.81 port 43808 ssh2
2019-09-25T11:44:45.3211671495-001 sshd\[363\]: Invalid user no from 106.12.132.81 port 58037
2019-09-25T11:44:45.3280781495-001 sshd\[363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.132.81
...
2019-09-26 01:52:43
37.59.37.69 attackspam
Sep 25 19:23:58 SilenceServices sshd[6931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.37.69
Sep 25 19:24:00 SilenceServices sshd[6931]: Failed password for invalid user teste from 37.59.37.69 port 37087 ssh2
Sep 25 19:28:34 SilenceServices sshd[8146]: Failed password for games from 37.59.37.69 port 57669 ssh2
2019-09-26 01:46:58
114.86.113.245 attackbots
445/tcp
[2019-09-25]1pkt
2019-09-26 01:34:54
50.239.143.6 attackbots
Sep 25 18:26:55 s64-1 sshd[29457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.6
Sep 25 18:26:56 s64-1 sshd[29457]: Failed password for invalid user winadmin from 50.239.143.6 port 49656 ssh2
Sep 25 18:30:40 s64-1 sshd[29506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.239.143.6
...
2019-09-26 01:58:07
164.68.97.202 attackbots
Sep 25 15:31:56 plex sshd[3956]: Invalid user qhsupport from 164.68.97.202 port 43110
2019-09-26 02:06:12
221.231.95.7 attack
Unauthorized SSH login attempts
2019-09-26 01:35:50
201.188.116.22 attackspambots
Brute force attempt
2019-09-26 02:14:15
112.85.42.185 attack
Sep 25 12:17:00 aat-srv002 sshd[16418]: Failed password for root from 112.85.42.185 port 11392 ssh2
Sep 25 12:32:31 aat-srv002 sshd[16725]: Failed password for root from 112.85.42.185 port 25367 ssh2
Sep 25 12:33:15 aat-srv002 sshd[16739]: Failed password for root from 112.85.42.185 port 16162 ssh2
...
2019-09-26 01:44:34
122.161.192.206 attackbotsspam
Sep 25 14:17:10 bouncer sshd\[6716\]: Invalid user cleopatra from 122.161.192.206 port 56382
Sep 25 14:17:10 bouncer sshd\[6716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.161.192.206 
Sep 25 14:17:13 bouncer sshd\[6716\]: Failed password for invalid user cleopatra from 122.161.192.206 port 56382 ssh2
...
2019-09-26 02:15:51
5.148.3.212 attack
Sep 25 03:54:09 hanapaa sshd\[4757\]: Invalid user 88888 from 5.148.3.212
Sep 25 03:54:09 hanapaa sshd\[4757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.148.3.212
Sep 25 03:54:11 hanapaa sshd\[4757\]: Failed password for invalid user 88888 from 5.148.3.212 port 56023 ssh2
Sep 25 03:58:24 hanapaa sshd\[5070\]: Invalid user sandoze from 5.148.3.212
Sep 25 03:58:24 hanapaa sshd\[5070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.148.3.212
2019-09-26 01:35:34
152.136.95.118 attack
Sep 25 07:14:44 hcbb sshd\[17040\]: Invalid user doubleT from 152.136.95.118
Sep 25 07:14:44 hcbb sshd\[17040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.95.118
Sep 25 07:14:46 hcbb sshd\[17040\]: Failed password for invalid user doubleT from 152.136.95.118 port 41688 ssh2
Sep 25 07:20:27 hcbb sshd\[17482\]: Invalid user chad from 152.136.95.118
Sep 25 07:20:27 hcbb sshd\[17482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.95.118
2019-09-26 01:33:02
92.246.17.5 attack
Sep 25 15:17:36 www sshd\[45794\]: Invalid user admin from 92.246.17.5
Sep 25 15:17:36 www sshd\[45794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.246.17.5
Sep 25 15:17:37 www sshd\[45794\]: Failed password for invalid user admin from 92.246.17.5 port 38942 ssh2
...
2019-09-26 01:56:53
88.247.250.200 attack
Sep 25 13:30:58 TORMINT sshd\[23169\]: Invalid user plugins from 88.247.250.200
Sep 25 13:30:58 TORMINT sshd\[23169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.247.250.200
Sep 25 13:31:00 TORMINT sshd\[23169\]: Failed password for invalid user plugins from 88.247.250.200 port 21214 ssh2
...
2019-09-26 01:36:54

最近上报的IP列表

1.219.251.129 194.26.135.118 178.214.220.106 15.230.152.57
118.179.129.113 209.148.57.170 166.49.246.110 131.72.69.133
34.201.15.254 47.184.184.187 137.205.89.216 67.254.191.150
15.188.60.30 45.226.193.75 46.162.7.153 68.183.203.199
200.175.5.139 39.131.145.167 87.98.167.145 87.98.167.242