必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.68.234.74 attackbots
Exploited Host.
2020-07-26 02:46:45
138.68.234.162 attackbotsspam
Jul 24 08:04:19 dev0-dcde-rnet sshd[5950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162
Jul 24 08:04:21 dev0-dcde-rnet sshd[5950]: Failed password for invalid user grigore from 138.68.234.162 port 34450 ssh2
Jul 24 08:09:13 dev0-dcde-rnet sshd[6073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162
2020-07-24 15:31:49
138.68.234.162 attackspam
Jul 13 23:04:22 gw1 sshd[19285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162
Jul 13 23:04:24 gw1 sshd[19285]: Failed password for invalid user burn from 138.68.234.162 port 50414 ssh2
...
2020-07-14 02:36:48
138.68.234.162 attackspam
2020-07-06T04:01:47.651167shield sshd\[7696\]: Invalid user katrina from 138.68.234.162 port 54344
2020-07-06T04:01:47.654712shield sshd\[7696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162
2020-07-06T04:01:49.763623shield sshd\[7696\]: Failed password for invalid user katrina from 138.68.234.162 port 54344 ssh2
2020-07-06T04:05:09.523656shield sshd\[9132\]: Invalid user dmt from 138.68.234.162 port 49014
2020-07-06T04:05:09.527327shield sshd\[9132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162
2020-07-06 15:49:42
138.68.234.162 attackbotsspam
2020-06-28T03:32:13.818915ionos.janbro.de sshd[46585]: Failed password for invalid user ashley from 138.68.234.162 port 49106 ssh2
2020-06-28T03:36:09.827754ionos.janbro.de sshd[46608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162  user=root
2020-06-28T03:36:12.076636ionos.janbro.de sshd[46608]: Failed password for root from 138.68.234.162 port 48918 ssh2
2020-06-28T03:40:00.279093ionos.janbro.de sshd[46629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162  user=root
2020-06-28T03:40:01.905765ionos.janbro.de sshd[46629]: Failed password for root from 138.68.234.162 port 48716 ssh2
2020-06-28T03:44:05.983738ionos.janbro.de sshd[46636]: Invalid user sys from 138.68.234.162 port 48518
2020-06-28T03:44:06.102796ionos.janbro.de sshd[46636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162
2020-06-28T03:44:05.983738ionos.janbro
...
2020-06-28 19:19:40
138.68.234.162 attackbots
2020-06-18T12:36:39.131282shield sshd\[16182\]: Invalid user kate from 138.68.234.162 port 37984
2020-06-18T12:36:39.135397shield sshd\[16182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162
2020-06-18T12:36:41.305483shield sshd\[16182\]: Failed password for invalid user kate from 138.68.234.162 port 37984 ssh2
2020-06-18T12:40:35.076637shield sshd\[16657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162  user=root
2020-06-18T12:40:36.983424shield sshd\[16657\]: Failed password for root from 138.68.234.162 port 37180 ssh2
2020-06-18 20:51:16
138.68.234.162 attackspambots
Invalid user unix from 138.68.234.162 port 36850
2020-06-11 12:03:25
138.68.234.162 attackspambots
2020-06-08T14:43:17.909096abusebot-6.cloudsearch.cf sshd[11536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162  user=root
2020-06-08T14:43:19.667291abusebot-6.cloudsearch.cf sshd[11536]: Failed password for root from 138.68.234.162 port 52188 ssh2
2020-06-08T14:46:59.610111abusebot-6.cloudsearch.cf sshd[11774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162  user=root
2020-06-08T14:47:01.512525abusebot-6.cloudsearch.cf sshd[11774]: Failed password for root from 138.68.234.162 port 38720 ssh2
2020-06-08T14:48:29.830978abusebot-6.cloudsearch.cf sshd[11856]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162  user=root
2020-06-08T14:48:31.754962abusebot-6.cloudsearch.cf sshd[11856]: Failed password for root from 138.68.234.162 port 57328 ssh2
2020-06-08T14:50:01.328825abusebot-6.cloudsearch.cf sshd[11934]: pam_unix(sshd:auth):
...
2020-06-08 23:04:13
138.68.234.162 attack
Jun  5 10:47:36 gw1 sshd[6108]: Failed password for root from 138.68.234.162 port 49578 ssh2
...
2020-06-05 14:11:40
138.68.234.162 attackspambots
Invalid user aman from 138.68.234.162 port 36240
2020-05-16 17:14:27
138.68.234.231 attack
138.68.234.231 - - \[06/May/2020:22:22:15 +0200\] "GET / HTTP/1.0" 444 0 "-" "masscan/1.0 \(https://github.com/robertdavidgraham/masscan\)"
...
2020-05-07 05:35:02
138.68.234.162 attackbotsspam
May  3 02:15:40 DAAP sshd[23307]: Invalid user win from 138.68.234.162 port 52348
May  3 02:15:40 DAAP sshd[23307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.234.162
May  3 02:15:40 DAAP sshd[23307]: Invalid user win from 138.68.234.162 port 52348
May  3 02:15:42 DAAP sshd[23307]: Failed password for invalid user win from 138.68.234.162 port 52348 ssh2
May  3 02:20:52 DAAP sshd[23686]: Invalid user yb from 138.68.234.162 port 35574
...
2020-05-03 08:45:10
138.68.234.162 attackspambots
SSH brute-force: detected 6 distinct usernames within a 24-hour window.
2020-04-15 18:38:13
138.68.234.162 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-04-13 05:08:57
138.68.234.162 attack
Apr 11 18:34:01 XXX sshd[32898]: Invalid user brady from 138.68.234.162 port 57982
2020-04-12 08:42:23
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.234.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.234.42.			IN	A

;; AUTHORITY SECTION:
.			325	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:52:35 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 42.234.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.234.68.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.30.112 attackspambots
Triggered by Fail2Ban at Ares web server
2020-04-18 13:33:36
14.141.64.119 attackspam
Unauthorized connection attempt detected from IP address 14.141.64.119 to port 1433
2020-04-18 13:17:06
185.234.219.23 attack
Apr 18 07:21:36 ns3042688 courier-pop3d: LOGIN FAILED, user=info@cesumin.info, ip=\[::ffff:185.234.219.23\]
...
2020-04-18 13:40:24
27.71.123.181 attack
Unauthorised access (Apr 18) SRC=27.71.123.181 LEN=52 TTL=105 ID=1117 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-18 13:20:14
123.31.32.150 attackbotsspam
Apr 18 07:13:03 vps sshd[340209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150  user=root
Apr 18 07:13:04 vps sshd[340209]: Failed password for root from 123.31.32.150 port 39272 ssh2
Apr 18 07:17:08 vps sshd[363058]: Invalid user test from 123.31.32.150 port 44410
Apr 18 07:17:08 vps sshd[363058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150
Apr 18 07:17:11 vps sshd[363058]: Failed password for invalid user test from 123.31.32.150 port 44410 ssh2
...
2020-04-18 13:29:50
222.186.15.114 attackbotsspam
Apr 18 07:11:32 plex sshd[1237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.114  user=root
Apr 18 07:11:35 plex sshd[1237]: Failed password for root from 222.186.15.114 port 14195 ssh2
2020-04-18 13:39:00
219.250.188.41 attackspam
Apr 18 05:47:14 ns392434 sshd[17980]: Invalid user postgres from 219.250.188.41 port 54984
Apr 18 05:47:14 ns392434 sshd[17980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.41
Apr 18 05:47:14 ns392434 sshd[17980]: Invalid user postgres from 219.250.188.41 port 54984
Apr 18 05:47:16 ns392434 sshd[17980]: Failed password for invalid user postgres from 219.250.188.41 port 54984 ssh2
Apr 18 05:53:44 ns392434 sshd[18186]: Invalid user qm from 219.250.188.41 port 45682
Apr 18 05:53:44 ns392434 sshd[18186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.250.188.41
Apr 18 05:53:44 ns392434 sshd[18186]: Invalid user qm from 219.250.188.41 port 45682
Apr 18 05:53:45 ns392434 sshd[18186]: Failed password for invalid user qm from 219.250.188.41 port 45682 ssh2
Apr 18 05:56:46 ns392434 sshd[18307]: Invalid user admin from 219.250.188.41 port 50634
2020-04-18 13:28:46
174.138.64.163 attackspam
Brute-force attempt banned
2020-04-18 13:37:50
14.186.180.49 attack
Email SMTP authentication failure
2020-04-18 13:19:17
106.13.73.210 attack
Apr 18 05:56:33 tuxlinux sshd[22312]: Invalid user mx from 106.13.73.210 port 60924
Apr 18 05:56:33 tuxlinux sshd[22312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.73.210 
Apr 18 05:56:33 tuxlinux sshd[22312]: Invalid user mx from 106.13.73.210 port 60924
Apr 18 05:56:33 tuxlinux sshd[22312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.73.210 
Apr 18 05:56:33 tuxlinux sshd[22312]: Invalid user mx from 106.13.73.210 port 60924
Apr 18 05:56:33 tuxlinux sshd[22312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.73.210 
Apr 18 05:56:35 tuxlinux sshd[22312]: Failed password for invalid user mx from 106.13.73.210 port 60924 ssh2
...
2020-04-18 13:35:55
102.130.118.84 attack
Apr 17 19:07:56 php1 sshd\[11238\]: Invalid user od from 102.130.118.84
Apr 17 19:07:56 php1 sshd\[11238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.130.118.84
Apr 17 19:07:58 php1 sshd\[11238\]: Failed password for invalid user od from 102.130.118.84 port 49872 ssh2
Apr 17 19:12:54 php1 sshd\[11779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.130.118.84  user=root
Apr 17 19:12:56 php1 sshd\[11779\]: Failed password for root from 102.130.118.84 port 60402 ssh2
2020-04-18 13:32:17
120.202.21.189 attackbots
$f2bV_matches
2020-04-18 13:50:36
211.159.150.41 attack
$f2bV_matches
2020-04-18 13:51:32
191.232.174.253 attackbotsspam
Apr 18 05:56:30 santamaria sshd\[17247\]: Invalid user iu from 191.232.174.253
Apr 18 05:56:30 santamaria sshd\[17247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.174.253
Apr 18 05:56:33 santamaria sshd\[17247\]: Failed password for invalid user iu from 191.232.174.253 port 37756 ssh2
...
2020-04-18 13:35:37
67.207.89.207 attackbotsspam
Invalid user eh from 67.207.89.207 port 46988
2020-04-18 13:21:38

最近上报的IP列表

138.68.234.232 138.68.234.138 138.68.233.185 138.68.233.214
138.68.233.247 138.68.233.46 138.68.234.134 138.68.233.164
118.182.187.52 138.68.234.243 80.244.18.199 138.68.235.1
138.68.234.48 138.68.234.62 138.68.235.8 138.68.235.137
138.68.235.145 118.182.204.82 138.68.236.124 138.68.235.173