必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): DigitalOcean LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.68.223.69 attack
20/tcp 27017/tcp 35025/tcp...
[2019-09-08/11]4pkt,3pt.(tcp),1pt.(udp)
2019-09-13 04:08:09
138.68.223.84 attackspambots
firewall-block, port(s): 6379/tcp
2019-09-12 00:20:11
138.68.223.70 attackbotsspam
Honeypot hit: misc
2019-09-10 12:10:30
138.68.223.45 attackspambots
Autoban   138.68.223.45 AUTH/CONNECT
2019-09-10 09:41:52
138.68.223.85 attackspambots
firewall-block, port(s): 64526/tcp
2019-09-09 00:37:40
138.68.223.69 attack
1434/udp
[2019-09-08]1pkt
2019-09-09 00:23:25
138.68.223.79 attackspam
port scan and connect, tcp 5432 (postgresql)
2019-09-07 12:08:32
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.223.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7559
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.68.223.146.			IN	A

;; AUTHORITY SECTION:
.			2889	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090800 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 09 07:23:34 CST 2019
;; MSG SIZE  rcvd: 118
HOST信息:
146.223.68.138.in-addr.arpa domain name pointer zg-0905b-106.stretchoid.com.
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
146.223.68.138.in-addr.arpa	name = zg-0905b-106.stretchoid.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
200.87.94.14 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:51.
2019-10-12 08:53:38
103.105.227.75 attack
Unauthorized connection attempt from IP address 103.105.227.75 on Port 445(SMB)
2019-10-12 08:51:07
179.182.81.74 attackbotsspam
Unauthorized connection attempt from IP address 179.182.81.74 on Port 445(SMB)
2019-10-12 08:27:07
36.65.14.121 attackspam
Unauthorized connection attempt from IP address 36.65.14.121 on Port 445(SMB)
2019-10-12 08:42:08
196.43.150.5 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:49.
2019-10-12 08:57:06
190.121.26.61 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:45.
2019-10-12 09:07:16
190.79.93.146 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:48.
2019-10-12 09:00:41
37.145.76.229 attack
Unauthorized connection attempt from IP address 37.145.76.229 on Port 445(SMB)
2019-10-12 08:52:29
222.186.175.155 attackbotsspam
Oct 12 02:29:34 herz-der-gamer sshd[9496]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.155  user=root
Oct 12 02:29:36 herz-der-gamer sshd[9496]: Failed password for root from 222.186.175.155 port 5604 ssh2
...
2019-10-12 08:31:19
187.217.173.242 attack
Unauthorized connection attempt from IP address 187.217.173.242 on Port 445(SMB)
2019-10-12 08:32:58
216.246.108.218 attack
\[2019-10-11 19:59:03\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-11T19:59:03.655-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="440146586739265",SessionID="0x7fc3ac0977e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/216.246.108.218/63935",ACLName="no_extension_match"
\[2019-10-11 20:03:56\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-11T20:03:56.855-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="450046586739265",SessionID="0x7fc3ac5226d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/216.246.108.218/56216",ACLName="no_extension_match"
\[2019-10-11 20:08:51\] SECURITY\[1898\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-11T20:08:51.409-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="450146586739265",SessionID="0x7fc3ad578188",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/216.246.108.218/57862",ACLName="
2019-10-12 08:25:46
49.145.135.102 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:58.
2019-10-12 08:42:58
222.186.173.238 attack
Oct 12 02:51:25 rotator sshd\[24090\]: Failed password for root from 222.186.173.238 port 16450 ssh2Oct 12 02:51:29 rotator sshd\[24090\]: Failed password for root from 222.186.173.238 port 16450 ssh2Oct 12 02:51:33 rotator sshd\[24090\]: Failed password for root from 222.186.173.238 port 16450 ssh2Oct 12 02:51:37 rotator sshd\[24090\]: Failed password for root from 222.186.173.238 port 16450 ssh2Oct 12 02:51:41 rotator sshd\[24090\]: Failed password for root from 222.186.173.238 port 16450 ssh2Oct 12 02:51:50 rotator sshd\[24098\]: Failed password for root from 222.186.173.238 port 33324 ssh2
...
2019-10-12 08:55:43
36.74.3.51 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-10-2019 20:00:56.
2019-10-12 08:45:33
74.82.47.53 attackbotsspam
SMB Server BruteForce Attack
2019-10-12 08:47:22

最近上报的IP列表

37.135.115.42 180.207.219.61 103.38.175.61 112.50.27.43
212.64.151.26 77.130.149.39 230.191.227.240 154.94.122.100
73.164.12.188 187.151.84.198 111.191.45.157 249.169.30.30
200.54.111.18 195.9.20.102 219.99.1.181 180.247.149.106
176.237.181.3 202.77.206.191 67.165.205.42 78.128.84.241