必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America

运营商(isp): DigitalOcean LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspam
Sep 14 15:50:46 ws12vmsma01 sshd[44246]: Failed password for invalid user chandra from 138.68.221.125 port 51050 ssh2
Sep 14 15:55:14 ws12vmsma01 sshd[44941]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.221.125  user=root
Sep 14 15:55:16 ws12vmsma01 sshd[44941]: Failed password for root from 138.68.221.125 port 43254 ssh2
...
2020-09-15 03:34:19
attackspambots
Sep 14 15:59:07 gw1 sshd[22982]: Failed password for root from 138.68.221.125 port 38184 ssh2
...
2020-09-14 19:30:01
attack
$lgm
2020-09-01 05:12:23
attack
<6 unauthorized SSH connections
2020-08-28 16:16:56
attack
Invalid user vimal from 138.68.221.125 port 50792
2020-08-23 18:50:38
attackbotsspam
2020-08-20T12:36:47.747281vps-d63064a2 sshd[4303]: Invalid user webapp from 138.68.221.125 port 58738
2020-08-20T12:36:49.917369vps-d63064a2 sshd[4303]: Failed password for invalid user webapp from 138.68.221.125 port 58738 ssh2
2020-08-20T12:40:34.439328vps-d63064a2 sshd[4356]: User root from 138.68.221.125 not allowed because not listed in AllowUsers
2020-08-20T12:40:34.457321vps-d63064a2 sshd[4356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.221.125  user=root
2020-08-20T12:40:34.439328vps-d63064a2 sshd[4356]: User root from 138.68.221.125 not allowed because not listed in AllowUsers
2020-08-20T12:40:36.111770vps-d63064a2 sshd[4356]: Failed password for invalid user root from 138.68.221.125 port 40020 ssh2
...
2020-08-20 23:06:21
attackbots
Aug  6 15:25:01 rancher-0 sshd[844998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.221.125  user=root
Aug  6 15:25:03 rancher-0 sshd[844998]: Failed password for root from 138.68.221.125 port 34710 ssh2
...
2020-08-06 23:11:36
attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-08-04 04:29:57
attack
Jul 31 01:09:32 root sshd[21974]: Failed password for root from 138.68.221.125 port 33480 ssh2
Jul 31 01:18:04 root sshd[23103]: Failed password for root from 138.68.221.125 port 49456 ssh2
...
2020-07-31 07:45:00
attackbotsspam
Jul 23 18:55:43 ns382633 sshd\[27921\]: Invalid user edmond from 138.68.221.125 port 48400
Jul 23 18:55:43 ns382633 sshd\[27921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.221.125
Jul 23 18:55:45 ns382633 sshd\[27921\]: Failed password for invalid user edmond from 138.68.221.125 port 48400 ssh2
Jul 23 19:00:51 ns382633 sshd\[28870\]: Invalid user student from 138.68.221.125 port 41082
Jul 23 19:00:51 ns382633 sshd\[28870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.221.125
2020-07-24 02:51:19
attackbotsspam
2020-07-17T12:21:56+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-07-17 20:24:37
attackbotsspam
Jul 16 19:20:10 vps-51d81928 sshd[1236]: Invalid user valentin from 138.68.221.125 port 38034
Jul 16 19:20:10 vps-51d81928 sshd[1236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.221.125 
Jul 16 19:20:10 vps-51d81928 sshd[1236]: Invalid user valentin from 138.68.221.125 port 38034
Jul 16 19:20:12 vps-51d81928 sshd[1236]: Failed password for invalid user valentin from 138.68.221.125 port 38034 ssh2
Jul 16 19:24:19 vps-51d81928 sshd[1341]: Invalid user data from 138.68.221.125 port 55650
...
2020-07-17 04:12:47
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.221.125
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26409
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.68.221.125.			IN	A

;; AUTHORITY SECTION:
.			426	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071603 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 17 04:12:44 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 125.221.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 125.221.68.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
110.54.242.130 attackbots
Logged in to my netflix account without me giving a password.
Batangas (PH) - 110.54.242.130
Last Used: 13/01/2020, 11:04:44 PM GMT+8
2020-01-16 20:53:34
92.50.151.170 attackbots
Unauthorized connection attempt detected from IP address 92.50.151.170 to port 2220 [J]
2020-01-16 21:04:08
198.71.228.14 attack
Automatic report - XMLRPC Attack
2020-01-16 20:47:06
113.177.113.81 attackbotsspam
Unauthorized IMAP connection attempt
2020-01-16 21:16:43
14.190.29.93 attackbotsspam
Unauthorized connection attempt detected from IP address 14.190.29.93 to port 1433
2020-01-16 21:22:48
107.174.66.201 attackbots
Trying ports that it shouldn't be.
2020-01-16 20:54:25
111.63.21.98 attackbotsspam
Unauthorized connection attempt detected from IP address 111.63.21.98 to port 1433 [J]
2020-01-16 21:08:19
177.34.125.113 attack
Jan 16 14:05:20 vmanager6029 sshd\[18601\]: Invalid user jira from 177.34.125.113 port 37121
Jan 16 14:05:20 vmanager6029 sshd\[18601\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.34.125.113
Jan 16 14:05:22 vmanager6029 sshd\[18601\]: Failed password for invalid user jira from 177.34.125.113 port 37121 ssh2
2020-01-16 21:19:41
139.199.124.119 attack
Automatic report - SSH Brute-Force Attack
2020-01-16 21:21:34
42.118.127.88 attackspam
Unauthorized connection attempt detected from IP address 42.118.127.88 to port 23 [J]
2020-01-16 20:45:33
69.17.158.101 attack
Jan 16 14:02:14 meumeu sshd[15210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.17.158.101 
Jan 16 14:02:16 meumeu sshd[15210]: Failed password for invalid user sr from 69.17.158.101 port 51968 ssh2
Jan 16 14:05:20 meumeu sshd[15624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.17.158.101 
...
2020-01-16 21:23:38
167.86.112.234 attack
Automatic report - XMLRPC Attack
2020-01-16 20:46:17
94.20.65.14 attack
(imapd) Failed IMAP login from 94.20.65.14 (AZ/Azerbaijan/-): 1 in the last 3600 secs
2020-01-16 21:10:26
175.174.97.35 attackbots
Unauthorised access (Jan 16) SRC=175.174.97.35 LEN=40 TTL=49 ID=25111 TCP DPT=23 WINDOW=12425 SYN
2020-01-16 21:27:22
42.112.203.142 attack
20/1/15@23:43:38: FAIL: Alarm-Network address from=42.112.203.142
20/1/15@23:43:38: FAIL: Alarm-Network address from=42.112.203.142
...
2020-01-16 20:55:33

最近上报的IP列表

173.252.127.118 38.242.16.3 215.208.211.111 234.20.117.176
97.189.154.70 211.54.165.29 166.175.188.185 170.83.35.94
45.148.232.249 7.80.209.255 185.188.128.189 50.39.241.119
224.242.56.39 163.169.92.249 104.78.246.61 113.164.46.132
178.224.65.161 220.191.56.57 11.2.42.149 155.143.147.225