必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.68.168.137 attackspambots
2020-03-24T18:24:04.338629shield sshd\[1720\]: Invalid user testuser from 138.68.168.137 port 41348
2020-03-24T18:24:04.342343shield sshd\[1720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-24T18:24:06.326852shield sshd\[1720\]: Failed password for invalid user testuser from 138.68.168.137 port 41348 ssh2
2020-03-24T18:31:58.513381shield sshd\[3346\]: Invalid user jeanie from 138.68.168.137 port 59402
2020-03-24T18:31:58.516640shield sshd\[3346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-25 02:52:35
138.68.168.137 attackspambots
2020-03-24T18:07:52.907199shield sshd\[30137\]: Invalid user gy from 138.68.168.137 port 33476
2020-03-24T18:07:52.913682shield sshd\[30137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-24T18:07:55.128671shield sshd\[30137\]: Failed password for invalid user gy from 138.68.168.137 port 33476 ssh2
2020-03-24T18:11:50.402980shield sshd\[31146\]: Invalid user office from 138.68.168.137 port 42502
2020-03-24T18:11:50.410060shield sshd\[31146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-25 02:18:32
138.68.168.137 attackbotsspam
2020-03-23T15:38:43.121143abusebot-7.cloudsearch.cf sshd[19459]: Invalid user newsletter from 138.68.168.137 port 35472
2020-03-23T15:38:43.126340abusebot-7.cloudsearch.cf sshd[19459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-23T15:38:43.121143abusebot-7.cloudsearch.cf sshd[19459]: Invalid user newsletter from 138.68.168.137 port 35472
2020-03-23T15:38:44.916504abusebot-7.cloudsearch.cf sshd[19459]: Failed password for invalid user newsletter from 138.68.168.137 port 35472 ssh2
2020-03-23T15:47:18.433090abusebot-7.cloudsearch.cf sshd[20039]: Invalid user vix from 138.68.168.137 port 51306
2020-03-23T15:47:18.438580abusebot-7.cloudsearch.cf sshd[20039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-23T15:47:18.433090abusebot-7.cloudsearch.cf sshd[20039]: Invalid user vix from 138.68.168.137 port 51306
2020-03-23T15:47:20.595192abusebot-7.cloudsearch.cf s
...
2020-03-24 02:02:33
138.68.168.137 attack
Mar 12 16:58:35 lanister sshd[28250]: Failed password for invalid user paul from 138.68.168.137 port 37160 ssh2
Mar 12 17:11:50 lanister sshd[28520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137  user=root
Mar 12 17:11:53 lanister sshd[28520]: Failed password for root from 138.68.168.137 port 39500 ssh2
Mar 12 17:16:49 lanister sshd[28595]: Invalid user jira from 138.68.168.137
2020-03-13 05:41:53
138.68.168.137 attackbots
Mar  4 17:26:34 hcbbdb sshd\[8947\]: Invalid user plegrand from 138.68.168.137
Mar  4 17:26:34 hcbbdb sshd\[8947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
Mar  4 17:26:37 hcbbdb sshd\[8947\]: Failed password for invalid user plegrand from 138.68.168.137 port 53114 ssh2
Mar  4 17:35:44 hcbbdb sshd\[9933\]: Invalid user sshvpn from 138.68.168.137
Mar  4 17:35:44 hcbbdb sshd\[9933\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-03-05 01:43:06
138.68.168.137 attackspam
Feb 28 23:37:06 ns381471 sshd[5202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
Feb 28 23:37:08 ns381471 sshd[5202]: Failed password for invalid user php from 138.68.168.137 port 39826 ssh2
2020-02-29 06:46:39
138.68.168.137 attack
Feb 27 19:10:22 web1 sshd\[15937\]: Invalid user deployer from 138.68.168.137
Feb 27 19:10:22 web1 sshd\[15937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
Feb 27 19:10:24 web1 sshd\[15937\]: Failed password for invalid user deployer from 138.68.168.137 port 38600 ssh2
Feb 27 19:17:16 web1 sshd\[16908\]: Invalid user wangxue from 138.68.168.137
Feb 27 19:17:16 web1 sshd\[16908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-02-28 13:29:17
138.68.168.137 attackspambots
Feb 11 14:48:11 nextcloud sshd\[20955\]: Invalid user sqn from 138.68.168.137
Feb 11 14:48:11 nextcloud sshd\[20955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
Feb 11 14:48:13 nextcloud sshd\[20955\]: Failed password for invalid user sqn from 138.68.168.137 port 37670 ssh2
2020-02-11 22:39:50
138.68.168.137 attack
Invalid user vidushi from 138.68.168.137 port 50096
2020-02-02 15:32:13
138.68.168.137 attackspam
Dec 19 03:24:30 dallas01 sshd[28204]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
Dec 19 03:24:32 dallas01 sshd[28204]: Failed password for invalid user guenter from 138.68.168.137 port 60208 ssh2
Dec 19 03:29:37 dallas01 sshd[31708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
2020-01-28 04:14:22
138.68.168.137 attackspam
Jan 24 05:52:15 vps691689 sshd[23745]: Failed password for root from 138.68.168.137 port 55866 ssh2
Jan 24 05:55:04 vps691689 sshd[23888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137
...
2020-01-24 13:08:12
138.68.168.137 attack
Dec 27 21:42:07 cavern sshd[31147]: Failed password for root from 138.68.168.137 port 50310 ssh2
2019-12-28 05:11:14
138.68.168.137 attackbots
Dec 22 20:00:47 server sshd\[5095\]: Invalid user traub from 138.68.168.137
Dec 22 20:00:47 server sshd\[5095\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137 
Dec 22 20:00:49 server sshd\[5095\]: Failed password for invalid user traub from 138.68.168.137 port 44168 ssh2
Dec 22 20:06:59 server sshd\[6636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.168.137  user=ftp
Dec 22 20:07:01 server sshd\[6636\]: Failed password for ftp from 138.68.168.137 port 36478 ssh2
...
2019-12-23 01:07:16
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.168.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.168.147.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:51:55 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
Host 147.168.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 147.168.68.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
151.80.45.126 attackspambots
Dec 22 07:48:20 meumeu sshd[10392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.45.126 
Dec 22 07:48:22 meumeu sshd[10392]: Failed password for invalid user test from 151.80.45.126 port 39246 ssh2
Dec 22 07:53:39 meumeu sshd[11041]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=151.80.45.126 
...
2019-12-22 15:04:29
58.52.245.223 attackbots
FTP/21 MH Probe, BF, Hack -
2019-12-22 15:13:35
200.35.83.230 attack
DATE:2019-12-22 07:29:59, IP:200.35.83.230, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-12-22 15:23:06
157.122.61.124 attack
Dec 21 23:28:48 home sshd[26363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.122.61.124  user=lp
Dec 21 23:28:50 home sshd[26363]: Failed password for lp from 157.122.61.124 port 41899 ssh2
Dec 21 23:48:00 home sshd[26512]: Invalid user admin from 157.122.61.124 port 35315
Dec 21 23:48:00 home sshd[26512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.122.61.124
Dec 21 23:48:00 home sshd[26512]: Invalid user admin from 157.122.61.124 port 35315
Dec 21 23:48:02 home sshd[26512]: Failed password for invalid user admin from 157.122.61.124 port 35315 ssh2
Dec 21 23:54:49 home sshd[26550]: Invalid user lucy from 157.122.61.124 port 20444
Dec 21 23:54:49 home sshd[26550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.122.61.124
Dec 21 23:54:49 home sshd[26550]: Invalid user lucy from 157.122.61.124 port 20444
Dec 21 23:54:50 home sshd[26550]: Failed password for invalid user l
2019-12-22 15:17:44
121.46.4.222 attackspambots
2019-12-22T06:23:12.334825abusebot-2.cloudsearch.cf sshd[3517]: Invalid user www-data from 121.46.4.222 port 39705
2019-12-22T06:23:12.338991abusebot-2.cloudsearch.cf sshd[3517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.4.222
2019-12-22T06:23:12.334825abusebot-2.cloudsearch.cf sshd[3517]: Invalid user www-data from 121.46.4.222 port 39705
2019-12-22T06:23:13.897329abusebot-2.cloudsearch.cf sshd[3517]: Failed password for invalid user www-data from 121.46.4.222 port 39705 ssh2
2019-12-22T06:29:57.576827abusebot-2.cloudsearch.cf sshd[3619]: Invalid user pretenders from 121.46.4.222 port 36096
2019-12-22T06:29:57.583797abusebot-2.cloudsearch.cf sshd[3619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.4.222
2019-12-22T06:29:57.576827abusebot-2.cloudsearch.cf sshd[3619]: Invalid user pretenders from 121.46.4.222 port 36096
2019-12-22T06:29:59.740381abusebot-2.cloudsearch.cf sshd[3619]: Fa
...
2019-12-22 15:22:06
13.82.186.251 attackspam
Dec 22 06:59:07 hcbbdb sshd\[25720\]: Invalid user sysadmin from 13.82.186.251
Dec 22 06:59:07 hcbbdb sshd\[25720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.186.251
Dec 22 06:59:10 hcbbdb sshd\[25720\]: Failed password for invalid user sysadmin from 13.82.186.251 port 60038 ssh2
Dec 22 07:05:52 hcbbdb sshd\[26461\]: Invalid user ritmo from 13.82.186.251
Dec 22 07:05:52 hcbbdb sshd\[26461\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.82.186.251
2019-12-22 15:17:32
148.70.210.77 attackbots
Dec 22 07:06:52 game-panel sshd[7053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.210.77
Dec 22 07:06:54 game-panel sshd[7053]: Failed password for invalid user nazar from 148.70.210.77 port 51244 ssh2
Dec 22 07:14:21 game-panel sshd[7510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.210.77
2019-12-22 15:25:11
114.67.80.209 attack
Dec 22 07:02:09 pi sshd\[14289\]: Failed password for invalid user pcap from 114.67.80.209 port 54080 ssh2
Dec 22 07:08:34 pi sshd\[14584\]: Invalid user administrador from 114.67.80.209 port 48760
Dec 22 07:08:34 pi sshd\[14584\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.80.209
Dec 22 07:08:36 pi sshd\[14584\]: Failed password for invalid user administrador from 114.67.80.209 port 48760 ssh2
Dec 22 07:14:45 pi sshd\[14986\]: Invalid user yuanwd from 114.67.80.209 port 43442
...
2019-12-22 15:19:58
218.92.0.212 attack
Dec 22 01:53:51 linuxvps sshd\[15116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Dec 22 01:53:53 linuxvps sshd\[15116\]: Failed password for root from 218.92.0.212 port 25804 ssh2
Dec 22 01:53:56 linuxvps sshd\[15116\]: Failed password for root from 218.92.0.212 port 25804 ssh2
Dec 22 01:53:59 linuxvps sshd\[15116\]: Failed password for root from 218.92.0.212 port 25804 ssh2
Dec 22 01:54:12 linuxvps sshd\[15423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
2019-12-22 14:58:42
37.187.17.45 attack
Dec 22 09:27:44 hosting sshd[22462]: Invalid user sancho from 37.187.17.45 port 44706
Dec 22 09:27:44 hosting sshd[22462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ks3352506.kimsufi.com
Dec 22 09:27:44 hosting sshd[22462]: Invalid user sancho from 37.187.17.45 port 44706
Dec 22 09:27:47 hosting sshd[22462]: Failed password for invalid user sancho from 37.187.17.45 port 44706 ssh2
Dec 22 09:49:12 hosting sshd[24063]: Invalid user wwwadmin from 37.187.17.45 port 58504
...
2019-12-22 15:27:14
218.92.0.171 attack
Dec 22 08:24:13 markkoudstaal sshd[21770]: Failed password for root from 218.92.0.171 port 20874 ssh2
Dec 22 08:24:27 markkoudstaal sshd[21770]: error: maximum authentication attempts exceeded for root from 218.92.0.171 port 20874 ssh2 [preauth]
Dec 22 08:24:33 markkoudstaal sshd[21793]: Failed password for root from 218.92.0.171 port 53175 ssh2
2019-12-22 15:34:24
91.192.40.69 attackspam
SpamReport
2019-12-22 15:12:15
107.173.53.251 attackspambots
(From freestoneed@gmail.com) Hello,

Are you currently pleased with the number of sales your website is able to make? Is it getting enough visits from potential clients?I'm a freelance SEO specialist and I saw the potential of your website. I'm offering to help you boost the amount of traffic generated by your site so you can get more sales.

If you'd like, I'll send you case studies from my previous work, so you can have an idea of what it's like before and after a website has been optimized for web searches. My services come at a cheap price that even small businesses can afford them. Please reply let me know if you're interested. Talk to you soon!

Best regards,
Ed Freestone
2019-12-22 15:09:35
167.114.24.179 attackbotsspam
Port Scan
2019-12-22 15:33:21
109.242.13.223 attack
Dec 22 06:29:53 hermescis postfix/smtpd[7639]: NOQUEUE: reject: RCPT from adsl-223.109.242.13.tellas.gr[109.242.13.223]: 550 5.1.1 : Recipient address rejected:* from= to= proto=ESMTP helo=
2019-12-22 15:20:30

最近上报的IP列表

118.179.45.190 138.68.168.224 138.68.168.121 138.68.168.185
138.68.168.211 138.68.168.7 138.68.168.149 138.68.168.99
138.68.168.136 138.68.168.85 138.68.168.60 138.68.168.64
118.179.45.61 138.68.169.112 138.68.169.200 138.68.169.53
138.68.169.18 138.68.169.118 138.68.169.192 138.68.169.232