必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America

运营商(isp): Oracle Public Cloud

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackspambots
404 NOT FOUND
2020-06-22 12:52:30
attackbots
Lines containing failures of 168.138.14.139
May  5 07:22:51 nexus sshd[15918]: Invalid user elastic from 168.138.14.139 port 52324
May  5 07:22:51 nexus sshd[15918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.14.139
May  5 07:22:53 nexus sshd[15918]: Failed password for invalid user elastic from 168.138.14.139 port 52324 ssh2
May  5 07:22:54 nexus sshd[15918]: Connection closed by 168.138.14.139 port 52324 [preauth]
May  5 09:16:45 nexus sshd[17826]: Invalid user regwag2003 from 168.138.14.139 port 47954
May  5 09:16:45 nexus sshd[17826]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.14.139


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=168.138.14.139
2020-05-07 23:24:39
相同子网IP讨论:
IP 类型 评论内容 时间
168.138.140.50 attack
DATE:2020-09-30 22:37:31, IP:168.138.140.50, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-10-02 05:55:23
168.138.140.50 attackspambots
DATE:2020-09-30 22:37:31, IP:168.138.140.50, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-10-01 22:18:06
168.138.140.50 attackbots
DATE:2020-09-30 22:37:31, IP:168.138.140.50, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-10-01 14:37:16
168.138.145.173 attackspambots
Unauthorized connection attempt detected from IP address 168.138.145.173 to port 445 [T]
2020-07-22 02:32:41
168.138.144.172 attackspam
phpMyAdmin_Attack
2020-05-15 15:58:04
168.138.144.172 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-05-14 08:54:19
168.138.147.95 attack
May  5 20:10:51 inter-technics sshd[5375]: Invalid user daniel from 168.138.147.95 port 40858
May  5 20:10:51 inter-technics sshd[5375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.147.95
May  5 20:10:51 inter-technics sshd[5375]: Invalid user daniel from 168.138.147.95 port 40858
May  5 20:10:54 inter-technics sshd[5375]: Failed password for invalid user daniel from 168.138.147.95 port 40858 ssh2
May  5 20:17:35 inter-technics sshd[8505]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.147.95  user=root
May  5 20:17:37 inter-technics sshd[8505]: Failed password for root from 168.138.147.95 port 47372 ssh2
...
2020-05-06 02:53:18
168.138.144.172 attackspambots
Hacking
2020-05-04 08:21:01
168.138.147.95 attackspam
Invalid user ts4 from 168.138.147.95 port 40946
2020-05-01 12:08:34
168.138.147.95 attackbots
Apr 27 15:03:44 ArkNodeAT sshd\[23003\]: Invalid user mall from 168.138.147.95
Apr 27 15:03:44 ArkNodeAT sshd\[23003\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.147.95
Apr 27 15:03:46 ArkNodeAT sshd\[23003\]: Failed password for invalid user mall from 168.138.147.95 port 47106 ssh2
2020-04-28 00:23:51
168.138.147.95 attack
Apr 21 14:22:41 ns382633 sshd\[32632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.147.95  user=root
Apr 21 14:22:43 ns382633 sshd\[32632\]: Failed password for root from 168.138.147.95 port 58264 ssh2
Apr 21 14:33:14 ns382633 sshd\[2542\]: Invalid user testftp from 168.138.147.95 port 46414
Apr 21 14:33:14 ns382633 sshd\[2542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.147.95
Apr 21 14:33:17 ns382633 sshd\[2542\]: Failed password for invalid user testftp from 168.138.147.95 port 46414 ssh2
2020-04-21 20:35:39
168.138.147.95 attackbotsspam
2020-04-11T22:42:26.380453ns386461 sshd\[6771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.147.95  user=root
2020-04-11T22:42:28.623859ns386461 sshd\[6771\]: Failed password for root from 168.138.147.95 port 39768 ssh2
2020-04-11T22:51:16.278747ns386461 sshd\[14589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.147.95  user=root
2020-04-11T22:51:18.282557ns386461 sshd\[14589\]: Failed password for root from 168.138.147.95 port 33900 ssh2
2020-04-11T22:56:59.951658ns386461 sshd\[19994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.138.147.95  user=root
...
2020-04-12 05:27:01
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.138.14.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25224
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;168.138.14.139.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050700 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 07 23:24:34 CST 2020
;; MSG SIZE  rcvd: 118
HOST信息:
Host 139.14.138.168.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 139.14.138.168.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.13.18.86 attackspam
Oct  3 16:42:25 meumeu sshd[5435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86 
Oct  3 16:42:27 meumeu sshd[5435]: Failed password for invalid user mp from 106.13.18.86 port 42604 ssh2
Oct  3 16:47:02 meumeu sshd[6098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86 
...
2019-10-04 02:15:15
41.43.0.198 attackspam
Chat Spam
2019-10-04 01:51:20
149.202.164.82 attackspam
Feb 14 17:24:41 vtv3 sshd\[31302\]: Invalid user informix from 149.202.164.82 port 58748
Feb 14 17:24:41 vtv3 sshd\[31302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82
Feb 14 17:24:43 vtv3 sshd\[31302\]: Failed password for invalid user informix from 149.202.164.82 port 58748 ssh2
Feb 14 17:29:30 vtv3 sshd\[32689\]: Invalid user demo from 149.202.164.82 port 48734
Feb 14 17:29:30 vtv3 sshd\[32689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82
Feb 18 18:24:02 vtv3 sshd\[22972\]: Invalid user karen from 149.202.164.82 port 43866
Feb 18 18:24:02 vtv3 sshd\[22972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82
Feb 18 18:24:04 vtv3 sshd\[22972\]: Failed password for invalid user karen from 149.202.164.82 port 43866 ssh2
Feb 18 18:29:05 vtv3 sshd\[24378\]: Invalid user jenkins from 149.202.164.82 port 33836
Feb 18 18:29:05 vtv3 sshd
2019-10-04 02:02:43
178.128.93.125 attackspambots
detected by Fail2Ban
2019-10-04 02:02:19
188.226.226.82 attackspambots
Oct  3 15:59:19 meumeu sshd[31294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.226.82 
Oct  3 15:59:21 meumeu sshd[31294]: Failed password for invalid user svnroot from 188.226.226.82 port 39304 ssh2
Oct  3 16:03:36 meumeu sshd[32199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.226.82 
...
2019-10-04 02:10:07
95.58.194.148 attackspam
Oct  3 15:41:32 vps01 sshd[13668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.58.194.148
Oct  3 15:41:34 vps01 sshd[13668]: Failed password for invalid user bremen from 95.58.194.148 port 46888 ssh2
2019-10-04 02:11:45
51.79.71.142 attackbots
Oct  3 19:30:58 MK-Soft-Root1 sshd[31118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.71.142 
Oct  3 19:31:00 MK-Soft-Root1 sshd[31118]: Failed password for invalid user com from 51.79.71.142 port 36590 ssh2
...
2019-10-04 02:12:07
103.11.201.134 attackspam
ICMP MP Probe, Scan -
2019-10-04 02:23:19
118.77.238.179 attackbots
Unauthorised access (Oct  3) SRC=118.77.238.179 LEN=40 TTL=49 ID=36126 TCP DPT=8080 WINDOW=39417 SYN
2019-10-04 01:46:02
117.70.44.225 attackbots
Unauthorised access (Oct  3) SRC=117.70.44.225 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=8528 TCP DPT=8080 WINDOW=1371 SYN 
Unauthorised access (Oct  3) SRC=117.70.44.225 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=58752 TCP DPT=8080 WINDOW=14839 SYN 
Unauthorised access (Oct  2) SRC=117.70.44.225 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=58645 TCP DPT=8080 WINDOW=32863 SYN 
Unauthorised access (Oct  2) SRC=117.70.44.225 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=23494 TCP DPT=8080 WINDOW=32863 SYN
2019-10-04 02:13:11
103.6.87.101 attackbots
ICMP MP Probe, Scan -
2019-10-04 01:50:34
84.39.179.119 attackspam
Automated reporting of SSH Vulnerability scanning
2019-10-04 02:06:24
193.202.110.21 attackspam
ATTACK TYPE :- SQL Injection
2019-10-04 02:24:11
110.35.79.23 attackspam
Oct  3 20:12:22 MK-Soft-VM7 sshd[8670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.79.23 
Oct  3 20:12:24 MK-Soft-VM7 sshd[8670]: Failed password for invalid user zr from 110.35.79.23 port 47884 ssh2
...
2019-10-04 02:22:32
182.254.172.159 attackspambots
" "
2019-10-04 01:49:57

最近上报的IP列表

210.21.36.182 97.87.51.228 83.196.98.96 187.177.183.18
148.105.11.43 145.239.90.198 216.41.205.1 91.148.138.116
94.21.40.231 210.211.117.41 78.180.38.127 5.253.206.142
89.34.18.94 67.70.142.247 87.251.74.173 76.238.219.68
121.156.122.97 2.86.246.211 183.11.235.24 90.189.197.237