必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.68.146.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15957
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.68.146.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 07:47:51 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
138.146.68.199.in-addr.arpa domain name pointer aw-138-146-68-199.appalachianwireless.com.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.146.68.199.in-addr.arpa	name = aw-138-146-68-199.appalachianwireless.com.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
13.229.51.54 attackbots
Scanning
2020-08-27 04:07:30
51.145.242.1 attack
Aug 24 09:56:38 vlre-nyc-1 sshd\[10357\]: Invalid user forum from 51.145.242.1
Aug 24 09:56:38 vlre-nyc-1 sshd\[10357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.145.242.1
Aug 24 09:56:40 vlre-nyc-1 sshd\[10357\]: Failed password for invalid user forum from 51.145.242.1 port 57302 ssh2
Aug 24 10:00:56 vlre-nyc-1 sshd\[10574\]: Invalid user r00t from 51.145.242.1
Aug 24 10:00:56 vlre-nyc-1 sshd\[10574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.145.242.1
Aug 24 10:00:58 vlre-nyc-1 sshd\[10574\]: Failed password for invalid user r00t from 51.145.242.1 port 35210 ssh2
Aug 24 10:03:40 vlre-nyc-1 sshd\[10695\]: Invalid user yjl from 51.145.242.1
Aug 24 10:03:40 vlre-nyc-1 sshd\[10695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.145.242.1
Aug 24 10:03:42 vlre-nyc-1 sshd\[10695\]: Failed password for invalid user yjl from 51.145.242.1 po
...
2020-08-27 03:44:50
139.99.98.248 attack
2020-08-26T17:55:03.136961ks3355764 sshd[22117]: Failed password for invalid user joshua from 139.99.98.248 port 37534 ssh2
2020-08-26T19:55:48.057031ks3355764 sshd[23954]: Invalid user dante from 139.99.98.248 port 56122
...
2020-08-27 03:54:57
94.102.50.146 attackspam
firewall-block, port(s): 6443/tcp
2020-08-27 04:13:30
207.154.235.23 attackbotsspam
Aug 26 21:42:28 server sshd[20568]: Failed password for invalid user norberto from 207.154.235.23 port 36322 ssh2
Aug 26 21:46:52 server sshd[26274]: Failed password for invalid user test2 from 207.154.235.23 port 46358 ssh2
Aug 26 21:51:14 server sshd[32069]: Failed password for root from 207.154.235.23 port 56392 ssh2
2020-08-27 04:12:28
101.89.145.133 attack
Failed password for invalid user george from 101.89.145.133 port 40086 ssh2
2020-08-27 03:58:05
190.128.231.2 attack
2020-08-26T20:25:31.558338+02:00  sshd[21595]: Failed password for invalid user acc from 190.128.231.2 port 53238 ssh2
2020-08-27 03:54:45
68.183.129.49 attackbotsspam
Lines containing failures of 68.183.129.49
Aug 25 18:00:37 shared11 sshd[1205]: Invalid user elsearch from 68.183.129.49 port 48876
Aug 25 18:00:37 shared11 sshd[1205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.129.49
Aug 25 18:00:39 shared11 sshd[1205]: Failed password for invalid user elsearch from 68.183.129.49 port 48876 ssh2
Aug 25 18:00:39 shared11 sshd[1205]: Received disconnect from 68.183.129.49 port 48876:11: Bye Bye [preauth]
Aug 25 18:00:39 shared11 sshd[1205]: Disconnected from invalid user elsearch 68.183.129.49 port 48876 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=68.183.129.49
2020-08-27 03:47:47
152.136.54.77 attackspam
Aug 26 22:40:52 pkdns2 sshd\[45486\]: Failed password for root from 152.136.54.77 port 51962 ssh2Aug 26 22:43:00 pkdns2 sshd\[45566\]: Failed password for root from 152.136.54.77 port 48440 ssh2Aug 26 22:45:13 pkdns2 sshd\[45705\]: Invalid user test from 152.136.54.77Aug 26 22:45:16 pkdns2 sshd\[45705\]: Failed password for invalid user test from 152.136.54.77 port 44926 ssh2Aug 26 22:47:26 pkdns2 sshd\[45782\]: Invalid user ljs from 152.136.54.77Aug 26 22:47:28 pkdns2 sshd\[45782\]: Failed password for invalid user ljs from 152.136.54.77 port 41420 ssh2
...
2020-08-27 03:57:10
35.202.197.27 attackspambots
port 23
2020-08-27 03:49:50
103.133.105.65 attack
2020-08-26 dovecot_login authenticator failed for \(User\) \[103.133.105.65\]: 535 Incorrect authentication data \(set_id=user@**REMOVED**\)
2020-08-26 dovecot_login authenticator failed for \(User\) \[103.133.105.65\]: 535 Incorrect authentication data \(set_id=user@**REMOVED**\)
2020-08-26 dovecot_login authenticator failed for \(User\) \[103.133.105.65\]: 535 Incorrect authentication data \(set_id=user@**REMOVED**\)
2020-08-27 03:57:50
171.101.94.190 attack
Automatic report - XMLRPC Attack
2020-08-27 03:37:08
124.239.218.188 attackspambots
2020-08-26T12:28:41.087422abusebot.cloudsearch.cf sshd[15457]: Invalid user zy from 124.239.218.188 port 59078
2020-08-26T12:28:41.092334abusebot.cloudsearch.cf sshd[15457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.218.188
2020-08-26T12:28:41.087422abusebot.cloudsearch.cf sshd[15457]: Invalid user zy from 124.239.218.188 port 59078
2020-08-26T12:28:42.491524abusebot.cloudsearch.cf sshd[15457]: Failed password for invalid user zy from 124.239.218.188 port 59078 ssh2
2020-08-26T12:33:47.062299abusebot.cloudsearch.cf sshd[15540]: Invalid user greg from 124.239.218.188 port 25066
2020-08-26T12:33:47.079127abusebot.cloudsearch.cf sshd[15540]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.218.188
2020-08-26T12:33:47.062299abusebot.cloudsearch.cf sshd[15540]: Invalid user greg from 124.239.218.188 port 25066
2020-08-26T12:33:49.818380abusebot.cloudsearch.cf sshd[15540]: Failed password for
...
2020-08-27 03:37:39
95.167.225.85 attackbotsspam
Failed password for invalid user deploy from 95.167.225.85 port 39604 ssh2
2020-08-27 03:39:37
222.186.173.154 attackbots
Aug 26 21:46:23 sshgateway sshd\[20515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Aug 26 21:46:25 sshgateway sshd\[20515\]: Failed password for root from 222.186.173.154 port 60896 ssh2
Aug 26 21:46:39 sshgateway sshd\[20515\]: error: maximum authentication attempts exceeded for root from 222.186.173.154 port 60896 ssh2 \[preauth\]
2020-08-27 03:51:19

最近上报的IP列表

29.232.43.238 123.113.99.116 217.246.183.216 123.33.227.48
65.171.101.85 95.177.104.124 66.122.64.12 97.85.134.86
206.69.88.92 166.187.136.106 86.14.94.239 128.21.167.78
75.69.118.235 52.224.5.149 221.86.167.100 253.230.67.219
251.26.58.154 82.64.44.65 15.183.65.109 184.98.56.66