必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): unknown

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.68.253.149 attackspambots
$f2bV_matches
2020-10-02 03:21:08
138.68.253.149 attackspambots
Time:     Thu Oct  1 10:55:46 2020 +0000
IP:       138.68.253.149 (US/United States/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Oct  1 10:51:54 29-1 sshd[18268]: Invalid user hari from 138.68.253.149 port 58058
Oct  1 10:51:55 29-1 sshd[18268]: Failed password for invalid user hari from 138.68.253.149 port 58058 ssh2
Oct  1 10:54:06 29-1 sshd[18607]: Invalid user www from 138.68.253.149 port 37444
Oct  1 10:54:08 29-1 sshd[18607]: Failed password for invalid user www from 138.68.253.149 port 37444 ssh2
Oct  1 10:55:45 29-1 sshd[18854]: Invalid user ubuntu from 138.68.253.149 port 39752
2020-10-01 19:33:33
138.68.253.149 attackspam
k+ssh-bruteforce
2020-09-19 20:41:34
138.68.253.149 attack
$f2bV_matches
2020-09-19 12:38:17
138.68.253.149 attackbotsspam
Sep 18 16:15:07 firewall sshd[1687]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.253.149
Sep 18 16:15:07 firewall sshd[1687]: Invalid user postgres from 138.68.253.149
Sep 18 16:15:08 firewall sshd[1687]: Failed password for invalid user postgres from 138.68.253.149 port 45956 ssh2
...
2020-09-19 04:15:11
138.68.253.149 attackbotsspam
2020-09-13T21:40:20.298077server.mjenks.net sshd[1070025]: Failed password for root from 138.68.253.149 port 58496 ssh2
2020-09-13T21:43:47.149651server.mjenks.net sshd[1070422]: Invalid user admin from 138.68.253.149 port 36496
2020-09-13T21:43:47.156741server.mjenks.net sshd[1070422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.253.149
2020-09-13T21:43:47.149651server.mjenks.net sshd[1070422]: Invalid user admin from 138.68.253.149 port 36496
2020-09-13T21:43:49.517610server.mjenks.net sshd[1070422]: Failed password for invalid user admin from 138.68.253.149 port 36496 ssh2
...
2020-09-14 22:06:56
138.68.253.149 attack
2020-09-13T21:40:20.298077server.mjenks.net sshd[1070025]: Failed password for root from 138.68.253.149 port 58496 ssh2
2020-09-13T21:43:47.149651server.mjenks.net sshd[1070422]: Invalid user admin from 138.68.253.149 port 36496
2020-09-13T21:43:47.156741server.mjenks.net sshd[1070422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.253.149
2020-09-13T21:43:47.149651server.mjenks.net sshd[1070422]: Invalid user admin from 138.68.253.149 port 36496
2020-09-13T21:43:49.517610server.mjenks.net sshd[1070422]: Failed password for invalid user admin from 138.68.253.149 port 36496 ssh2
...
2020-09-14 13:59:52
138.68.253.149 attackspambots
Sep 13 21:36:24 ip-172-31-16-56 sshd\[14588\]: Failed password for root from 138.68.253.149 port 39628 ssh2\
Sep 13 21:38:45 ip-172-31-16-56 sshd\[14612\]: Failed password for root from 138.68.253.149 port 53224 ssh2\
Sep 13 21:41:10 ip-172-31-16-56 sshd\[14723\]: Failed password for root from 138.68.253.149 port 38588 ssh2\
Sep 13 21:43:30 ip-172-31-16-56 sshd\[14750\]: Invalid user koeso from 138.68.253.149\
Sep 13 21:43:31 ip-172-31-16-56 sshd\[14750\]: Failed password for invalid user koeso from 138.68.253.149 port 52192 ssh2\
2020-09-14 05:57:38
138.68.253.149 attackspambots
Aug 30 08:06:00 ns381471 sshd[21651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.253.149
Aug 30 08:06:02 ns381471 sshd[21651]: Failed password for invalid user francesco from 138.68.253.149 port 41998 ssh2
2020-08-30 18:07:41
138.68.253.149 attackspam
Aug 24 18:32:30 root sshd[24489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.253.149 
Aug 24 18:32:32 root sshd[24489]: Failed password for invalid user owen from 138.68.253.149 port 59400 ssh2
Aug 24 18:42:56 root sshd[26012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.253.149 
...
2020-08-25 00:44:15
138.68.253.149 attackbotsspam
Aug 14 22:35:58 myvps sshd[11407]: Failed password for root from 138.68.253.149 port 52616 ssh2
Aug 14 22:44:51 myvps sshd[16915]: Failed password for root from 138.68.253.149 port 37468 ssh2
...
2020-08-15 05:16:47
138.68.253.149 attackbots
Aug  6 07:55:46 hell sshd[9487]: Failed password for root from 138.68.253.149 port 51536 ssh2
...
2020-08-06 16:33:28
138.68.253.149 attackspambots
Aug  4 20:46:03 mout sshd[18045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.253.149  user=root
Aug  4 20:46:05 mout sshd[18045]: Failed password for root from 138.68.253.149 port 56116 ssh2
2020-08-05 02:56:05
138.68.253.149 attack
Aug  3 09:43:59 minden010 sshd[3547]: Failed password for root from 138.68.253.149 port 45694 ssh2
Aug  3 09:46:59 minden010 sshd[4562]: Failed password for root from 138.68.253.149 port 41960 ssh2
...
2020-08-03 16:23:29
138.68.253.149 attackbots
Invalid user wac from 138.68.253.149 port 39262
2020-08-01 14:14:24
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.253.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7667
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.253.139.			IN	A

;; AUTHORITY SECTION:
.			38	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:52:57 CST 2022
;; MSG SIZE  rcvd: 107
HOST信息:
139.253.68.138.in-addr.arpa domain name pointer 568645.cloudwaysapps.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.253.68.138.in-addr.arpa	name = 568645.cloudwaysapps.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
114.38.173.178 attackspambots
:
2019-08-17 11:19:21
139.198.5.79 attackbots
Aug 16 20:31:08 TORMINT sshd\[25612\]: Invalid user admin from 139.198.5.79
Aug 16 20:31:08 TORMINT sshd\[25612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.5.79
Aug 16 20:31:10 TORMINT sshd\[25612\]: Failed password for invalid user admin from 139.198.5.79 port 58968 ssh2
...
2019-08-17 11:29:48
176.95.135.3 attack
Aug 17 04:43:41 host sshd\[55286\]: Invalid user ubnt from 176.95.135.3 port 35960
Aug 17 04:43:43 host sshd\[55286\]: Failed password for invalid user ubnt from 176.95.135.3 port 35960 ssh2
...
2019-08-17 11:03:17
23.129.64.191 attackbotsspam
2019-08-17T04:23:12.0313091240 sshd\[11079\]: Invalid user admin from 23.129.64.191 port 55318
2019-08-17T04:23:12.0345171240 sshd\[11079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.191
2019-08-17T04:23:13.7260541240 sshd\[11079\]: Failed password for invalid user admin from 23.129.64.191 port 55318 ssh2
...
2019-08-17 11:15:40
195.154.223.226 attackspam
Multiple SSH auth failures recorded by fail2ban
2019-08-17 11:25:46
68.183.83.214 attack
2019-08-17T04:44:44.633171  sshd[17961]: Invalid user nate from 68.183.83.214 port 43384
2019-08-17T04:44:44.648700  sshd[17961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.83.214
2019-08-17T04:44:44.633171  sshd[17961]: Invalid user nate from 68.183.83.214 port 43384
2019-08-17T04:44:46.711683  sshd[17961]: Failed password for invalid user nate from 68.183.83.214 port 43384 ssh2
2019-08-17T04:49:55.152197  sshd[18042]: Invalid user vgorder from 68.183.83.214 port 35828
...
2019-08-17 10:57:37
142.93.237.140 attackspambots
Aug 16 14:52:02 php2 sshd\[16284\]: Invalid user byu123 from 142.93.237.140
Aug 16 14:52:02 php2 sshd\[16284\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.237.140
Aug 16 14:52:04 php2 sshd\[16284\]: Failed password for invalid user byu123 from 142.93.237.140 port 56344 ssh2
Aug 16 14:56:17 php2 sshd\[17003\]: Invalid user torr1ent from 142.93.237.140
Aug 16 14:56:17 php2 sshd\[17003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.237.140
2019-08-17 11:11:23
167.86.96.137 attackspambots
WordPress wp-login brute force :: 167.86.96.137 0.188 BYPASS [17/Aug/2019:12:54:04  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-17 11:08:41
117.221.70.6 attackbotsspam
Aug 16 21:08:26 XXX sshd[25216]: Invalid user messagebus from 117.221.70.6 port 53290
2019-08-17 11:27:41
190.64.68.180 attack
Automatic report - Banned IP Access
2019-08-17 11:20:55
156.96.97.2 attackbots
156.96.97.2 - - [17/Aug/2019:04:11:09 +0200] "POST /wp-login.php HTTP/1.1" 403 1595 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 0177b05b15cdfa3290cddacd3c01c14c United States US California Encino 
156.96.97.2 - - [17/Aug/2019:04:11:10 +0200] "POST /xmlrpc.php HTTP/1.1" 403 240 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 8b4494b59c5912537478433f1401cda0 United States US California Encino
2019-08-17 11:16:36
178.62.82.35 attackspambots
fail2ban honeypot
2019-08-17 11:05:41
51.83.99.95 attackbotsspam
Aug 17 00:04:55 vps01 sshd[22121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.99.95
Aug 17 00:04:57 vps01 sshd[22121]: Failed password for invalid user tanja from 51.83.99.95 port 37526 ssh2
2019-08-17 11:09:52
162.213.159.158 attackbots
WordPress brute force
2019-08-17 11:13:10
1.209.171.64 attackspambots
Aug 16 23:05:25 spiceship sshd\[941\]: Invalid user test from 1.209.171.64
Aug 16 23:05:25 spiceship sshd\[941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.209.171.64
...
2019-08-17 11:06:12

最近上报的IP列表

118.183.123.80 138.68.253.23 138.68.254.180 138.68.254.114
138.68.254.198 138.68.254.245 138.68.254.242 138.68.254.240
138.68.254.209 118.183.129.144 118.183.148.147 118.183.149.27
118.183.189.14 118.183.233.199 118.183.247.98 118.183.34.226
138.68.54.119 138.68.54.0 138.68.53.89 138.68.54.110