必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Santa Clara

省份(region): California

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.68.16.40 attackspam
invalid login attempt (elasticsearch)
2020-05-07 06:10:25
138.68.16.40 attackbots
5x Failed Password
2020-04-30 06:41:12
138.68.16.40 attackspambots
$f2bV_matches
2020-04-26 12:28:35
138.68.16.40 attack
DATE:2020-04-24 19:34:45, IP:138.68.16.40, PORT:ssh SSH brute force auth (docker-dc)
2020-04-25 02:25:43
138.68.16.40 attackspam
Invalid user sql from 138.68.16.40 port 53650
2020-04-18 08:00:40
138.68.16.40 attack
Invalid user asimov from 138.68.16.40 port 52156
2020-04-12 02:16:26
138.68.168.137 attackspambots
2020-03-24T18:24:04.338629shield sshd\[1720\]: Invalid user testuser from 138.68.168.137 port 41348
2020-03-24T18:24:04.342343shield sshd\[1720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-24T18:24:06.326852shield sshd\[1720\]: Failed password for invalid user testuser from 138.68.168.137 port 41348 ssh2
2020-03-24T18:31:58.513381shield sshd\[3346\]: Invalid user jeanie from 138.68.168.137 port 59402
2020-03-24T18:31:58.516640shield sshd\[3346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-25 02:52:35
138.68.168.137 attackspambots
2020-03-24T18:07:52.907199shield sshd\[30137\]: Invalid user gy from 138.68.168.137 port 33476
2020-03-24T18:07:52.913682shield sshd\[30137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-24T18:07:55.128671shield sshd\[30137\]: Failed password for invalid user gy from 138.68.168.137 port 33476 ssh2
2020-03-24T18:11:50.402980shield sshd\[31146\]: Invalid user office from 138.68.168.137 port 42502
2020-03-24T18:11:50.410060shield sshd\[31146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-25 02:18:32
138.68.168.137 attackbotsspam
2020-03-23T15:38:43.121143abusebot-7.cloudsearch.cf sshd[19459]: Invalid user newsletter from 138.68.168.137 port 35472
2020-03-23T15:38:43.126340abusebot-7.cloudsearch.cf sshd[19459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-23T15:38:43.121143abusebot-7.cloudsearch.cf sshd[19459]: Invalid user newsletter from 138.68.168.137 port 35472
2020-03-23T15:38:44.916504abusebot-7.cloudsearch.cf sshd[19459]: Failed password for invalid user newsletter from 138.68.168.137 port 35472 ssh2
2020-03-23T15:47:18.433090abusebot-7.cloudsearch.cf sshd[20039]: Invalid user vix from 138.68.168.137 port 51306
2020-03-23T15:47:18.438580abusebot-7.cloudsearch.cf sshd[20039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-23T15:47:18.433090abusebot-7.cloudsearch.cf sshd[20039]: Invalid user vix from 138.68.168.137 port 51306
2020-03-23T15:47:20.595192abusebot-7.cloudsearch.cf s
...
2020-03-24 02:02:33
138.68.16.40 attack
Invalid user genedimen from 138.68.16.40 port 33510
2020-03-18 07:54:51
138.68.16.40 attackbotsspam
SSH brute-force attempt
2020-03-17 04:25:31
138.68.168.137 attack
Mar 12 16:58:35 lanister sshd[28250]: Failed password for invalid user paul from 138.68.168.137 port 37160 ssh2
Mar 12 17:11:50 lanister sshd[28520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137  user=root
Mar 12 17:11:53 lanister sshd[28520]: Failed password for root from 138.68.168.137 port 39500 ssh2
Mar 12 17:16:49 lanister sshd[28595]: Invalid user jira from 138.68.168.137
2020-03-13 05:41:53
138.68.16.40 attackspambots
(sshd) Failed SSH login from 138.68.16.40 (US/United States/-): 10 in the last 3600 secs
2020-03-13 04:40:23
138.68.16.40 attackbotsspam
Mar 11 00:18:30 firewall sshd[28892]: Invalid user P4sswOrd from 138.68.16.40
Mar 11 00:18:33 firewall sshd[28892]: Failed password for invalid user P4sswOrd from 138.68.16.40 port 36674 ssh2
Mar 11 00:22:41 firewall sshd[28968]: Invalid user password from 138.68.16.40
...
2020-03-11 11:28:14
138.68.168.137 attackbots
Mar  4 17:26:34 hcbbdb sshd\[8947\]: Invalid user plegrand from 138.68.168.137
Mar  4 17:26:34 hcbbdb sshd\[8947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
Mar  4 17:26:37 hcbbdb sshd\[8947\]: Failed password for invalid user plegrand from 138.68.168.137 port 53114 ssh2
Mar  4 17:35:44 hcbbdb sshd\[9933\]: Invalid user sshvpn from 138.68.168.137
Mar  4 17:35:44 hcbbdb sshd\[9933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-05 01:43:06
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.16.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44554
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.68.16.111.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020120801 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 09 19:36:51 CST 2020
;; MSG SIZE  rcvd: 117
HOST信息:
111.16.68.138.in-addr.arpa domain name pointer ac14953.odcmed-mautic.
NSLOOKUP信息:
Server:		183.60.82.98
Address:	183.60.82.98#53

Non-authoritative answer:
111.16.68.138.in-addr.arpa	name = ac14953.odcmed-mautic.

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
35.196.37.206 attackbotsspam
xmlrpc attack
2020-08-11 23:06:45
208.109.12.104 attackbots
Aug 11 04:19:20 php1 sshd\[20272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.12.104  user=root
Aug 11 04:19:21 php1 sshd\[20272\]: Failed password for root from 208.109.12.104 port 39572 ssh2
Aug 11 04:22:57 php1 sshd\[20501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.12.104  user=root
Aug 11 04:22:59 php1 sshd\[20501\]: Failed password for root from 208.109.12.104 port 51988 ssh2
Aug 11 04:27:02 php1 sshd\[20802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=208.109.12.104  user=root
2020-08-11 22:54:32
35.185.112.216 attackbots
Aug  9 18:53:03 host sshd[18693]: Failed password for r.r from 35.185.112.216 port 47574 ssh2
Aug  9 18:53:03 host sshd[18693]: Received disconnect from 35.185.112.216: 11: Bye Bye [preauth]
Aug  9 18:59:28 host sshd[6274]: Failed password for r.r from 35.185.112.216 port 38778 ssh2
Aug  9 18:59:28 host sshd[6274]: Received disconnect from 35.185.112.216: 11: Bye Bye [preauth]
Aug  9 19:01:38 host sshd[15292]: Failed password for r.r from 35.185.112.216 port 59170 ssh2
Aug  9 19:01:38 host sshd[15292]: Received disconnect from 35.185.112.216: 11: Bye Bye [preauth]
Aug  9 19:03:42 host sshd[23338]: Failed password for r.r from 35.185.112.216 port 51380 ssh2
Aug  9 19:03:43 host sshd[23338]: Received disconnect from 35.185.112.216: 11: Bye Bye [preauth]
Aug  9 19:05:52 host sshd[30827]: Failed password for r.r from 35.185.112.216 port 43588 ssh2
Aug  9 19:05:52 host sshd[30827]: Received disconnect from 35.185.112.216: 11: Bye Bye [preauth]
Aug  9 19:08:02 host sshd[5413]........
-------------------------------
2020-08-11 23:08:44
61.132.52.29 attackbotsspam
(sshd) Failed SSH login from 61.132.52.29 (CN/China/-): 5 in the last 3600 secs
2020-08-11 23:01:42
181.115.156.59 attackspambots
SSH auth scanning - multiple failed logins
2020-08-11 23:03:56
103.66.16.18 attackbotsspam
Aug 11 16:11:48 myvps sshd[7146]: Failed password for root from 103.66.16.18 port 55572 ssh2
Aug 11 16:18:29 myvps sshd[11356]: Failed password for root from 103.66.16.18 port 58958 ssh2
...
2020-08-11 23:25:48
122.51.188.20 attackbotsspam
Aug 11 16:12:20 journals sshd\[67076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.188.20  user=root
Aug 11 16:12:22 journals sshd\[67076\]: Failed password for root from 122.51.188.20 port 55168 ssh2
Aug 11 16:16:00 journals sshd\[67418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.188.20  user=root
Aug 11 16:16:01 journals sshd\[67418\]: Failed password for root from 122.51.188.20 port 35424 ssh2
Aug 11 16:19:41 journals sshd\[67754\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.188.20  user=root
...
2020-08-11 23:21:02
195.154.189.186 attackbotsspam
195.154.189.186 - - [11/Aug/2020:16:30:45 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
195.154.189.186 - - [11/Aug/2020:16:30:46 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
195.154.189.186 - - [11/Aug/2020:16:30:47 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-11 22:42:20
106.75.74.225 attackspam
[Tue Aug 11 13:25:59 2020] - DDoS Attack From IP: 106.75.74.225 Port: 58914
2020-08-11 22:50:18
45.155.125.149 attackspambots
TCP src-port=34258   dst-port=25   Listed on   spamcop zen-spamhaus spam-sorbs       (Project Honey Pot rated Suspicious)   (74)
2020-08-11 22:52:32
50.100.113.207 attackspam
2020-08-11T17:06:27.823043cyberdyne sshd[443760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.100.113.207  user=root
2020-08-11T17:06:29.841881cyberdyne sshd[443760]: Failed password for root from 50.100.113.207 port 60838 ssh2
2020-08-11T17:08:26.503500cyberdyne sshd[443800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.100.113.207  user=root
2020-08-11T17:08:29.192920cyberdyne sshd[443800]: Failed password for root from 50.100.113.207 port 34746 ssh2
...
2020-08-11 23:14:14
169.149.228.105 attackbots
1597147910 - 08/11/2020 14:11:50 Host: 169.149.228.105/169.149.228.105 Port: 445 TCP Blocked
2020-08-11 22:43:27
178.131.149.53 attackbots
1597147864 - 08/11/2020 14:11:04 Host: 178.131.149.53/178.131.149.53 Port: 445 TCP Blocked
2020-08-11 23:17:06
192.99.13.186 attackbots
log:/webring/hasard.php?time=1486482054
2020-08-11 23:10:01
181.143.11.100 attackspambots
Unauthorized connection attempt from IP address 181.143.11.100 on Port 445(SMB)
2020-08-11 23:23:27

最近上报的IP列表

172.69.10.160 183.171.100.60 86.154.78.102 171.76.205.249
1.82.198.224 105.155.199.202 143.137.148.112 152.243.187.232
164.90.153.200 167.249.102.139 177.45.227.240 18.188.47.126
187.213.107.121 211.21.37.216 42.234.85.180 45.5.202.39
49.83.201.190 93.109.240.250 59.99.140.115 59.99.140.91