城市(city): Slough
省份(region): England
国家(country): United Kingdom
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
138.68.139.104 | attackspambots | Dec 21 01:50:39 ns381471 sshd[27143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.139.104 Dec 21 01:50:41 ns381471 sshd[27143]: Failed password for invalid user rpc from 138.68.139.104 port 40058 ssh2 |
2019-12-21 09:19:53 |
138.68.139.104 | attackbots | Dec 12 23:17:46 marvibiene sshd[61748]: Invalid user herlaug from 138.68.139.104 port 32932 Dec 12 23:17:46 marvibiene sshd[61748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.139.104 Dec 12 23:17:46 marvibiene sshd[61748]: Invalid user herlaug from 138.68.139.104 port 32932 Dec 12 23:17:48 marvibiene sshd[61748]: Failed password for invalid user herlaug from 138.68.139.104 port 32932 ssh2 ... |
2019-12-13 08:55:24 |
138.68.139.104 | attack | Dec 11 06:10:38 OPSO sshd\[16932\]: Invalid user yukio from 138.68.139.104 port 48776 Dec 11 06:10:38 OPSO sshd\[16932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.139.104 Dec 11 06:10:41 OPSO sshd\[16932\]: Failed password for invalid user yukio from 138.68.139.104 port 48776 ssh2 Dec 11 06:18:43 OPSO sshd\[19044\]: Invalid user lincoln from 138.68.139.104 port 57796 Dec 11 06:18:43 OPSO sshd\[19044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.139.104 |
2019-12-11 13:23:11 |
138.68.139.104 | attackbotsspam | Dec 8 23:59:52 ns37 sshd[6758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.139.104 |
2019-12-09 07:16:45 |
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 138.68.0.0 - 138.68.255.255
CIDR: 138.68.0.0/16
NetName: DIGITALOCEAN-138-68-0-0
NetHandle: NET-138-68-0-0-1
Parent: NET138 (NET-138-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: DigitalOcean, LLC (DO-13)
RegDate: 2016-01-26
Updated: 2025-03-01
Comment: Routing and Peering Policy can be found at https://www.as14061.net
Comment:
Comment: Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref: https://rdap.arin.net/registry/ip/138.68.0.0
OrgName: DigitalOcean, LLC
OrgId: DO-13
Address: 105 Edgeview Drive, Suite 425
City: Broomfield
StateProv: CO
PostalCode: 80021
Country: US
RegDate: 2012-05-14
Updated: 2025-04-11
Ref: https://rdap.arin.net/registry/entity/DO-13
OrgNOCHandle: NOC32014-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-646-827-4366
OrgNOCEmail: noc@digitalocean.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName: DigitalOcean Abuse
OrgAbusePhone: +1-646-827-4366
OrgAbuseEmail: abuse@digitalocean.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/DIGIT19-ARIN
OrgTechHandle: NOC32014-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-646-827-4366
OrgTechEmail: noc@digitalocean.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC32014-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.139.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26968
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.68.139.206. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025101400 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 14 14:00:52 CST 2025
;; MSG SIZE rcvd: 107
Host 206.139.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 206.139.68.138.in-addr.arpa: NXDOMAIN
IP | 类型 | 评论内容 | 时间 |
---|---|---|---|
216.218.15.48 | attack | VNC brute force attack detected by fail2ban |
2020-07-06 20:06:10 |
103.109.209.227 | attack | 2020-07-06T11:45:40.914318shield sshd\[14715\]: Invalid user infa from 103.109.209.227 port 50146 2020-07-06T11:45:40.918113shield sshd\[14715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.109.209.227 2020-07-06T11:45:43.013575shield sshd\[14715\]: Failed password for invalid user infa from 103.109.209.227 port 50146 ssh2 2020-07-06T11:49:18.377396shield sshd\[16792\]: Invalid user rcesd from 103.109.209.227 port 47678 2020-07-06T11:49:18.381542shield sshd\[16792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.109.209.227 |
2020-07-06 19:58:23 |
79.137.77.131 | attackspambots | Jul 6 13:49:16 mout sshd[1171]: Invalid user catadmin from 79.137.77.131 port 45276 |
2020-07-06 19:56:47 |
5.14.176.2 | attack | Attempted connection to port 9530. |
2020-07-06 20:27:55 |
125.224.60.67 | attack | Unauthorized connection attempt from IP address 125.224.60.67 on Port 445(SMB) |
2020-07-06 20:44:03 |
154.85.38.237 | attackbots | no |
2020-07-06 20:13:30 |
198.12.84.221 | attackspambots | 2020-07-06T05:30:21.1843051495-001 sshd[28992]: Invalid user aac from 198.12.84.221 port 37628 2020-07-06T05:30:22.6868041495-001 sshd[28992]: Failed password for invalid user aac from 198.12.84.221 port 37628 ssh2 2020-07-06T05:32:31.1438101495-001 sshd[29087]: Invalid user zookeeper from 198.12.84.221 port 47520 2020-07-06T05:32:31.1506811495-001 sshd[29087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.12.84.221 2020-07-06T05:32:31.1438101495-001 sshd[29087]: Invalid user zookeeper from 198.12.84.221 port 47520 2020-07-06T05:32:32.8306501495-001 sshd[29087]: Failed password for invalid user zookeeper from 198.12.84.221 port 47520 ssh2 ... |
2020-07-06 19:57:49 |
177.152.124.23 | attackspambots | 1530/tcp 28151/tcp 31428/tcp... [2020-06-22/07-06]35pkt,13pt.(tcp) |
2020-07-06 20:08:56 |
172.104.112.228 | attack | 25589/tcp 19535/tcp 23835/tcp... [2020-06-22/07-06]48pkt,16pt.(tcp) |
2020-07-06 20:04:37 |
210.183.237.222 | attackspam | Attempted connection to port 5555. |
2020-07-06 20:33:01 |
49.235.46.18 | attack | 2020-07-06T12:39:41.027833ks3355764 sshd[31081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.46.18 user=root 2020-07-06T12:39:42.817902ks3355764 sshd[31081]: Failed password for root from 49.235.46.18 port 41346 ssh2 ... |
2020-07-06 20:38:44 |
59.126.115.86 | attackspambots | Attempted connection to port 80. |
2020-07-06 20:27:23 |
212.216.215.148 | attackbotsspam | Unauthorized connection attempt detected from IP address 212.216.215.148 to port 80 |
2020-07-06 19:58:48 |
114.34.17.35 | attack | From CCTV User Interface Log ...::ffff:114.34.17.35 - - [05/Jul/2020:23:46:59 +0000] "GET / HTTP/1.1" 200 960 ... |
2020-07-06 20:23:31 |
13.79.165.124 | attackbots | Attempted connection to port 3389. |
2020-07-06 19:57:16 |