必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
138.68.93.14 attackspam
Jun 22 17:35:03 dhoomketu sshd[957426]: Invalid user testuser from 138.68.93.14 port 43460
Jun 22 17:35:03 dhoomketu sshd[957426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14 
Jun 22 17:35:03 dhoomketu sshd[957426]: Invalid user testuser from 138.68.93.14 port 43460
Jun 22 17:35:05 dhoomketu sshd[957426]: Failed password for invalid user testuser from 138.68.93.14 port 43460 ssh2
Jun 22 17:38:09 dhoomketu sshd[957482]: Invalid user guest from 138.68.93.14 port 42018
...
2020-06-22 20:24:23
138.68.93.14 attack
Jun 20 01:08:18 pve1 sshd[11480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14 
Jun 20 01:08:20 pve1 sshd[11480]: Failed password for invalid user enrique from 138.68.93.14 port 46350 ssh2
...
2020-06-20 08:12:03
138.68.93.14 attack
$f2bV_matches
2020-06-12 17:40:20
138.68.93.14 attackbotsspam
2020-05-25T12:00:46.806176abusebot-6.cloudsearch.cf sshd[14934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14  user=root
2020-05-25T12:00:48.912815abusebot-6.cloudsearch.cf sshd[14934]: Failed password for root from 138.68.93.14 port 60650 ssh2
2020-05-25T12:01:48.440306abusebot-6.cloudsearch.cf sshd[14999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14  user=root
2020-05-25T12:01:50.719748abusebot-6.cloudsearch.cf sshd[14999]: Failed password for root from 138.68.93.14 port 45102 ssh2
2020-05-25T12:02:31.386576abusebot-6.cloudsearch.cf sshd[15039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14  user=root
2020-05-25T12:02:33.570394abusebot-6.cloudsearch.cf sshd[15039]: Failed password for root from 138.68.93.14 port 54828 ssh2
2020-05-25T12:03:14.483180abusebot-6.cloudsearch.cf sshd[15078]: pam_unix(sshd:auth): authenticat
...
2020-05-25 21:19:38
138.68.93.14 attack
2020-05-15T05:59:10.955674mail.thespaminator.com sshd[10583]: Invalid user postgres from 138.68.93.14 port 47240
2020-05-15T05:59:12.981041mail.thespaminator.com sshd[10583]: Failed password for invalid user postgres from 138.68.93.14 port 47240 ssh2
...
2020-05-15 18:53:07
138.68.93.14 attackspambots
May 13 17:31:23 prox sshd[26864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14 
May 13 17:31:25 prox sshd[26864]: Failed password for invalid user vlado from 138.68.93.14 port 49494 ssh2
2020-05-13 23:50:36
138.68.93.14 attack
May  4 03:03:34 ws24vmsma01 sshd[103752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14
May  4 03:03:37 ws24vmsma01 sshd[103752]: Failed password for invalid user oracle from 138.68.93.14 port 35478 ssh2
...
2020-05-04 15:00:47
138.68.93.14 attackbotsspam
k+ssh-bruteforce
2020-04-26 20:02:15
138.68.93.14 attack
distributed sshd attacks
2020-04-17 15:19:17
138.68.93.14 attack
SSH/22 MH Probe, BF, Hack -
2020-04-14 03:49:35
138.68.93.14 attackbotsspam
$f2bV_matches
2020-04-11 17:12:49
138.68.93.14 attackspam
Apr  3 14:35:04 webhost01 sshd[8556]: Failed password for root from 138.68.93.14 port 56610 ssh2
...
2020-04-03 17:11:14
138.68.93.14 attackspambots
Apr  1 17:00:54 host01 sshd[12086]: Failed password for root from 138.68.93.14 port 40022 ssh2
Apr  1 17:05:05 host01 sshd[12680]: Failed password for root from 138.68.93.14 port 53740 ssh2
...
2020-04-02 02:56:47
138.68.93.14 attackspam
$f2bV_matches
2020-03-26 22:35:56
138.68.93.14 attack
5x Failed Password
2020-03-25 06:34:33
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.93.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52680
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.93.13.			IN	A

;; AUTHORITY SECTION:
.			333	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:34:53 CST 2022
;; MSG SIZE  rcvd: 105
HOST信息:
Host 13.93.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.93.68.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
77.247.181.165 attackbotsspam
10/17/2019-20:42:03.775139 77.247.181.165 Protocol: 6 ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 79
2019-10-18 02:47:21
81.134.41.100 attackspambots
Oct 17 20:08:32 MK-Soft-VM6 sshd[26315]: Failed password for root from 81.134.41.100 port 38612 ssh2
...
2019-10-18 03:09:51
34.67.60.75 attackspam
$f2bV_matches
2019-10-18 03:05:44
87.118.122.30 attack
GET (not exists) posting.php-spambot
2019-10-18 02:45:03
95.107.98.115 attack
Spambot-get old address of contact form
2019-10-18 02:44:03
45.136.109.253 attack
Multiport scan : 87 ports scanned 1190 1616 2010 2125 2185 2281 2301 2332 2500 2540 2550 2598 2929 3001 3105 3115 3140 3185 3232 3520 3580 3838 4105 4110 4540 4590 5151 5656 6030 6045 6065 6085 6464 7050 7065 7530 7575 7755 8035 8045 8065 8484 8520 8787 9025 9085 9292 9966 10120 10160 10175 10195 10265 10295 10325 10335 10350 10355 10415 10460 10475 10480 10520 10570 10625 10685 10760 10920 10925 10945 10950 10975 10980 11011 11211 .....
2019-10-18 03:10:33
77.104.154.195 attackspambots
Wordpress hacking
2019-10-18 03:02:27
41.45.60.33 attack
19/10/17@07:35:27: FAIL: Alarm-Intrusion address from=41.45.60.33
19/10/17@07:35:27: FAIL: Alarm-Intrusion address from=41.45.60.33
...
2019-10-18 03:22:53
50.21.182.207 attackbots
Invalid user brady from 50.21.182.207 port 34212
2019-10-18 03:08:04
39.137.69.10 attackspambots
Spambot-get old address of contact form
2019-10-18 03:05:28
200.228.86.78 attack
Spambot-get old address of contact form
2019-10-18 02:52:50
190.233.223.109 attackbots
GET admin panel
2019-10-18 02:54:50
198.71.228.60 attackbots
Wordpress hacking
2019-10-18 02:53:32
41.227.18.113 attack
Oct 17 16:01:49 cp sshd[3260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.227.18.113
2019-10-18 03:19:18
86.105.53.166 attackbotsspam
Invalid user nkinyanjui from 86.105.53.166 port 43755
2019-10-18 03:15:38

最近上报的IP列表

217.196.141.203 222.253.45.141 178.237.217.62 181.36.225.237
77.28.179.204 46.70.190.119 42.114.184.85 221.157.125.4
35.131.64.98 62.135.17.165 116.16.150.229 27.156.80.193
27.47.121.232 120.238.187.112 82.151.125.141 116.26.129.150
45.79.131.34 223.149.253.74 178.139.19.3 113.170.97.109