必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Spain

运营商(isp): OVH SAS

主机名(hostname): unknown

机构(organization): OVH SAS

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
Dec  3 06:44:02 firewall sshd[12627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137
Dec  3 06:44:02 firewall sshd[12627]: Invalid user rimey from 164.132.80.137
Dec  3 06:44:04 firewall sshd[12627]: Failed password for invalid user rimey from 164.132.80.137 port 36346 ssh2
...
2019-12-03 21:57:54
attack
2019-12-01T07:27:28.395976vps751288.ovh.net sshd\[19049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137  user=root
2019-12-01T07:27:29.912009vps751288.ovh.net sshd\[19049\]: Failed password for root from 164.132.80.137 port 36804 ssh2
2019-12-01T07:30:09.069957vps751288.ovh.net sshd\[19057\]: Invalid user ethereal from 164.132.80.137 port 43384
2019-12-01T07:30:09.077325vps751288.ovh.net sshd\[19057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137
2019-12-01T07:30:11.029688vps751288.ovh.net sshd\[19057\]: Failed password for invalid user ethereal from 164.132.80.137 port 43384 ssh2
2019-12-01 15:18:17
attack
Nov 25 12:54:50 TORMINT sshd\[31221\]: Invalid user Passw0rd1 from 164.132.80.137
Nov 25 12:54:50 TORMINT sshd\[31221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137
Nov 25 12:54:52 TORMINT sshd\[31221\]: Failed password for invalid user Passw0rd1 from 164.132.80.137 port 49534 ssh2
...
2019-11-26 02:10:43
attack
Nov 24 12:47:59 vibhu-HP-Z238-Microtower-Workstation sshd\[13585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137  user=news
Nov 24 12:48:01 vibhu-HP-Z238-Microtower-Workstation sshd\[13585\]: Failed password for news from 164.132.80.137 port 52522 ssh2
Nov 24 12:54:19 vibhu-HP-Z238-Microtower-Workstation sshd\[13782\]: Invalid user francis from 164.132.80.137
Nov 24 12:54:19 vibhu-HP-Z238-Microtower-Workstation sshd\[13782\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137
Nov 24 12:54:21 vibhu-HP-Z238-Microtower-Workstation sshd\[13782\]: Failed password for invalid user francis from 164.132.80.137 port 60544 ssh2
...
2019-11-24 15:40:19
attackspambots
May 10 19:38:23 server sshd\[68647\]: Invalid user fv from 164.132.80.137
May 10 19:38:23 server sshd\[68647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137
May 10 19:38:25 server sshd\[68647\]: Failed password for invalid user fv from 164.132.80.137 port 54106 ssh2
...
2019-10-09 15:23:14
attackbotsspam
2019-07-28T16:10:55.424337abusebot-2.cloudsearch.cf sshd\[28677\]: Invalid user william123 from 164.132.80.137 port 44970
2019-07-29 04:23:02
attack
Jul 25 14:37:32 pornomens sshd\[1145\]: Invalid user joerg from 164.132.80.137 port 57164
Jul 25 14:37:32 pornomens sshd\[1145\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137
Jul 25 14:37:34 pornomens sshd\[1145\]: Failed password for invalid user joerg from 164.132.80.137 port 57164 ssh2
...
2019-07-25 23:52:02
attack
Mar 20 18:27:53 vpn sshd[31897]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137
Mar 20 18:27:55 vpn sshd[31897]: Failed password for invalid user brian from 164.132.80.137 port 60224 ssh2
Mar 20 18:36:00 vpn sshd[31903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137
2019-07-19 11:42:21
attackspam
Jun 24 19:59:51 TORMINT sshd\[3129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137  user=root
Jun 24 19:59:53 TORMINT sshd\[3129\]: Failed password for root from 164.132.80.137 port 48150 ssh2
Jun 24 20:01:20 TORMINT sshd\[3242\]: Invalid user balance from 164.132.80.137
Jun 24 20:01:20 TORMINT sshd\[3242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.137
...
2019-06-25 13:37:57
相同子网IP讨论:
IP 类型 评论内容 时间
164.132.80.139 attack
$f2bV_matches
2020-02-22 09:02:47
164.132.80.139 attackspambots
$f2bV_matches
2020-02-17 13:02:30
164.132.80.139 attack
Feb  9 05:04:12 marvibiene sshd[55276]: Invalid user rng from 164.132.80.139 port 33488
Feb  9 05:04:12 marvibiene sshd[55276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139
Feb  9 05:04:12 marvibiene sshd[55276]: Invalid user rng from 164.132.80.139 port 33488
Feb  9 05:04:14 marvibiene sshd[55276]: Failed password for invalid user rng from 164.132.80.139 port 33488 ssh2
...
2020-02-09 19:35:54
164.132.80.139 attack
Unauthorized connection attempt detected from IP address 164.132.80.139 to port 2220 [J]
2020-02-06 08:30:57
164.132.80.139 attackspam
SSH Brute Force
2020-02-04 08:11:34
164.132.80.139 attackbotsspam
Jan 18 18:27:38 dedicated sshd[6877]: Invalid user webmaster from 164.132.80.139 port 34350
2020-01-19 01:40:37
164.132.80.139 attackspambots
Jan 17 19:16:33 ns382633 sshd\[27008\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139  user=root
Jan 17 19:16:36 ns382633 sshd\[27008\]: Failed password for root from 164.132.80.139 port 38592 ssh2
Jan 17 19:25:10 ns382633 sshd\[28633\]: Invalid user sftp from 164.132.80.139 port 35608
Jan 17 19:25:10 ns382633 sshd\[28633\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139
Jan 17 19:25:12 ns382633 sshd\[28633\]: Failed password for invalid user sftp from 164.132.80.139 port 35608 ssh2
2020-01-18 04:27:21
164.132.80.139 attackbots
Unauthorized connection attempt detected from IP address 164.132.80.139 to port 2220 [J]
2020-01-17 03:14:44
164.132.80.139 attackspam
Jan 13 23:48:16 vps691689 sshd[29100]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139
Jan 13 23:48:18 vps691689 sshd[29100]: Failed password for invalid user hosting from 164.132.80.139 port 46700 ssh2
...
2020-01-14 06:53:23
164.132.80.139 attackspam
Unauthorized connection attempt detected from IP address 164.132.80.139 to port 2220 [J]
2020-01-08 04:44:03
164.132.80.139 attack
Aug 18 20:11:25 server sshd\[148991\]: Invalid user sss from 164.132.80.139
Aug 18 20:11:25 server sshd\[148991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139
Aug 18 20:11:27 server sshd\[148991\]: Failed password for invalid user sss from 164.132.80.139 port 32862 ssh2
...
2019-10-09 15:22:22
164.132.80.139 attackbotsspam
Automated report - ssh fail2ban:
Sep 3 08:23:35 authentication failure 
Sep 3 08:23:36 wrong password, user=betyortodontia, port=47500, ssh2
Sep 3 08:27:29 authentication failure
2019-09-03 14:46:57
164.132.80.139 attack
Sep  1 19:42:23 MK-Soft-VM5 sshd\[27287\]: Invalid user ht from 164.132.80.139 port 44810
Sep  1 19:42:23 MK-Soft-VM5 sshd\[27287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139
Sep  1 19:42:25 MK-Soft-VM5 sshd\[27287\]: Failed password for invalid user ht from 164.132.80.139 port 44810 ssh2
...
2019-09-02 04:23:30
164.132.80.139 attackbotsspam
Aug 29 22:03:33 kapalua sshd\[27333\]: Invalid user filter from 164.132.80.139
Aug 29 22:03:33 kapalua sshd\[27333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139
Aug 29 22:03:35 kapalua sshd\[27333\]: Failed password for invalid user filter from 164.132.80.139 port 35492 ssh2
Aug 29 22:07:21 kapalua sshd\[27687\]: Invalid user bz from 164.132.80.139
Aug 29 22:07:21 kapalua sshd\[27687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139
2019-08-30 17:30:03
164.132.80.139 attackbotsspam
Aug 28 09:49:43 dallas01 sshd[20591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.80.139
Aug 28 09:49:45 dallas01 sshd[20591]: Failed password for invalid user nan from 164.132.80.139 port 37716 ssh2
Aug 28 09:53:35 dallas01 sshd[21368]: Failed password for root from 164.132.80.139 port 53682 ssh2
2019-08-28 22:53:55
WHOIS信息:
b
DIG信息:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.132.80.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32668
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;164.132.80.137.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041201 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 13 10:21:29 +08 2019
;; MSG SIZE  rcvd: 118

HOST信息:
137.80.132.164.in-addr.arpa has no PTR record
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 137.80.132.164.in-addr.arpa.: No answer

Authoritative answers can be found from:

相关IP信息:
最新评论:
IP 类型 评论内容 时间
27.193.173.150 attackbotsspam
[H1] Blocked by UFW
2020-10-06 03:51:29
67.79.13.65 attack
67.79.13.65 (US/United States/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  5 07:45:21 server4 sshd[1448]: Failed password for root from 95.169.22.100 port 11594 ssh2
Oct  5 07:44:25 server4 sshd[1419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.79.13.65  user=root
Oct  5 07:44:09 server4 sshd[1080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.130.218  user=root
Oct  5 07:44:10 server4 sshd[1080]: Failed password for root from 152.136.130.218 port 54430 ssh2
Oct  5 07:44:28 server4 sshd[1419]: Failed password for root from 67.79.13.65 port 39692 ssh2
Oct  5 07:46:49 server4 sshd[2681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.208.168  user=root

IP Addresses Blocked:

95.169.22.100 (US/United States/-)
2020-10-06 03:49:54
141.101.105.132 attackbots
srv02 DDoS Malware Target(80:http) ..
2020-10-06 03:53:16
212.58.120.232 attack
1601843601 - 10/04/2020 22:33:21 Host: 212.58.120.232/212.58.120.232 Port: 445 TCP Blocked
2020-10-06 03:55:01
68.38.175.3 attack
SSH Bruteforce Attempt on Honeypot
2020-10-06 03:55:58
152.136.34.52 attackspam
$f2bV_matches
2020-10-06 03:31:39
51.178.17.63 attackbots
(sshd) Failed SSH login from 51.178.17.63 (FR/France/63.ip-51-178-17.eu): 5 in the last 3600 secs
2020-10-06 03:47:58
121.182.177.160 attackspambots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=58666  .  dstport=23 Telnet  .     (3490)
2020-10-06 03:23:33
96.126.103.73 attackbotsspam
port scan and connect, tcp 80 (http)
2020-10-06 03:52:34
35.188.169.123 attackspam
Oct  5 10:03:29 s1 sshd\[29624\]: User root from 35.188.169.123 not allowed because not listed in AllowUsers
Oct  5 10:03:29 s1 sshd\[29624\]: Failed password for invalid user root from 35.188.169.123 port 43572 ssh2
Oct  5 10:08:36 s1 sshd\[3806\]: User root from 35.188.169.123 not allowed because not listed in AllowUsers
Oct  5 10:08:36 s1 sshd\[3806\]: Failed password for invalid user root from 35.188.169.123 port 50504 ssh2
Oct  5 10:13:50 s1 sshd\[12131\]: User root from 35.188.169.123 not allowed because not listed in AllowUsers
Oct  5 10:13:50 s1 sshd\[12131\]: Failed password for invalid user root from 35.188.169.123 port 57540 ssh2
...
2020-10-06 03:58:21
68.183.236.92 attack
5x Failed Password
2020-10-06 03:49:23
91.121.184.52 attackbotsspam
Trolling for resource vulnerabilities
2020-10-06 03:24:31
106.54.255.57 attackbots
SSH login attempts.
2020-10-06 03:59:55
49.233.180.165 attackspam
$f2bV_matches
2020-10-06 03:48:25
190.144.14.170 attackspambots
leo_www
2020-10-06 04:02:14

最近上报的IP列表

81.22.45.219 107.170.237.161 128.199.196.155 89.251.47.186
200.77.186.195 203.205.34.228 139.0.9.163 94.249.62.59
89.38.150.236 51.68.171.195 177.1.241.154 101.236.29.126
77.42.101.115 200.72.209.66 187.189.109.138 180.252.17.21
202.28.16.8 61.184.247.4 190.64.68.178 147.202.26.150