必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Germany

运营商(isp): OVH SAS

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attack
Oct  5 01:08:17 jane sshd[20024]: Failed password for root from 51.75.66.142 port 46248 ssh2
...
2020-10-05 07:28:23
attackspam
Oct  4 16:56:44 marvibiene sshd[24851]: Failed password for root from 51.75.66.142 port 37736 ssh2
Oct  4 16:58:50 marvibiene sshd[24999]: Failed password for root from 51.75.66.142 port 42420 ssh2
2020-10-04 23:43:44
attackbots
Oct  3 17:31:23 george sshd[6804]: Failed password for invalid user ashish from 51.75.66.142 port 36620 ssh2
Oct  3 17:35:16 george sshd[6836]: Invalid user student8 from 51.75.66.142 port 45300
Oct  3 17:35:16 george sshd[6836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142 
Oct  3 17:35:18 george sshd[6836]: Failed password for invalid user student8 from 51.75.66.142 port 45300 ssh2
Oct  3 17:39:29 george sshd[6975]: Invalid user sga from 51.75.66.142 port 53978
...
2020-10-04 15:27:17
attackbotsspam
Sep 25 11:11:10 inter-technics sshd[19371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142  user=root
Sep 25 11:11:12 inter-technics sshd[19371]: Failed password for root from 51.75.66.142 port 60242 ssh2
Sep 25 11:15:16 inter-technics sshd[19666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142  user=postgres
Sep 25 11:15:18 inter-technics sshd[19666]: Failed password for postgres from 51.75.66.142 port 40512 ssh2
Sep 25 11:19:28 inter-technics sshd[19892]: Invalid user alejandro from 51.75.66.142 port 49032
...
2020-09-25 19:32:17
attack
Aug 29 12:33:17 plex-server sshd[381285]: Invalid user q3server from 51.75.66.142 port 34144
Aug 29 12:33:17 plex-server sshd[381285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142 
Aug 29 12:33:17 plex-server sshd[381285]: Invalid user q3server from 51.75.66.142 port 34144
Aug 29 12:33:19 plex-server sshd[381285]: Failed password for invalid user q3server from 51.75.66.142 port 34144 ssh2
Aug 29 12:37:20 plex-server sshd[383089]: Invalid user caro from 51.75.66.142 port 42208
...
2020-08-30 02:14:40
attackspam
Time:     Fri Aug 28 07:27:41 2020 +0000
IP:       51.75.66.142 (142.ip-51-75-66.eu)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 28 07:09:08 ca-16-ede1 sshd[4563]: Invalid user lb from 51.75.66.142 port 59166
Aug 28 07:09:10 ca-16-ede1 sshd[4563]: Failed password for invalid user lb from 51.75.66.142 port 59166 ssh2
Aug 28 07:23:13 ca-16-ede1 sshd[6437]: Invalid user deploy from 51.75.66.142 port 34476
Aug 28 07:23:15 ca-16-ede1 sshd[6437]: Failed password for invalid user deploy from 51.75.66.142 port 34476 ssh2
Aug 28 07:27:36 ca-16-ede1 sshd[7140]: Failed password for root from 51.75.66.142 port 41230 ssh2
2020-08-28 17:36:32
attackbots
Aug 26 13:16:49 vps-51d81928 sshd[2266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142 
Aug 26 13:16:49 vps-51d81928 sshd[2266]: Invalid user rogerio from 51.75.66.142 port 35302
Aug 26 13:16:51 vps-51d81928 sshd[2266]: Failed password for invalid user rogerio from 51.75.66.142 port 35302 ssh2
Aug 26 13:20:40 vps-51d81928 sshd[2406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142  user=root
Aug 26 13:20:42 vps-51d81928 sshd[2406]: Failed password for root from 51.75.66.142 port 43822 ssh2
...
2020-08-26 21:24:16
attack
Aug 18 04:26:14 game-panel sshd[7924]: Failed password for root from 51.75.66.142 port 35824 ssh2
Aug 18 04:30:21 game-panel sshd[8096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
Aug 18 04:30:23 game-panel sshd[8096]: Failed password for invalid user nvidia from 51.75.66.142 port 46826 ssh2
2020-08-18 12:33:19
attackspambots
Jul 18 16:05:57 ns382633 sshd\[14689\]: Invalid user xguest from 51.75.66.142 port 46150
Jul 18 16:05:57 ns382633 sshd\[14689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
Jul 18 16:05:59 ns382633 sshd\[14689\]: Failed password for invalid user xguest from 51.75.66.142 port 46150 ssh2
Jul 18 16:14:47 ns382633 sshd\[15958\]: Invalid user admin from 51.75.66.142 port 55958
Jul 18 16:14:47 ns382633 sshd\[15958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
2020-07-19 00:08:05
attackbots
Jul 11 12:01:56 ws26vmsma01 sshd[25564]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
Jul 11 12:01:59 ws26vmsma01 sshd[25564]: Failed password for invalid user hejiyang from 51.75.66.142 port 46044 ssh2
...
2020-07-11 20:23:05
attackbots
Automatic Fail2ban report - Trying login SSH
2020-07-04 15:48:03
attack
k+ssh-bruteforce
2020-06-30 20:24:32
attackbots
Jun 14 03:51:50 ip-172-31-61-156 sshd[31860]: Failed password for root from 51.75.66.142 port 38450 ssh2
Jun 14 03:55:18 ip-172-31-61-156 sshd[32021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142  user=root
Jun 14 03:55:20 ip-172-31-61-156 sshd[32021]: Failed password for root from 51.75.66.142 port 40602 ssh2
Jun 14 03:55:18 ip-172-31-61-156 sshd[32021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142  user=root
Jun 14 03:55:20 ip-172-31-61-156 sshd[32021]: Failed password for root from 51.75.66.142 port 40602 ssh2
...
2020-06-14 12:58:54
attackbots
Jun  6 09:18:17 DAAP sshd[12980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142  user=root
Jun  6 09:18:19 DAAP sshd[12980]: Failed password for root from 51.75.66.142 port 48340 ssh2
Jun  6 09:22:34 DAAP sshd[13034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142  user=root
Jun  6 09:22:36 DAAP sshd[13034]: Failed password for root from 51.75.66.142 port 55824 ssh2
Jun  6 09:26:24 DAAP sshd[13069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142  user=root
Jun  6 09:26:26 DAAP sshd[13069]: Failed password for root from 51.75.66.142 port 59942 ssh2
...
2020-06-06 17:07:06
attackspambots
Jun  4 06:03:14 jumpserver sshd[69371]: Failed password for root from 51.75.66.142 port 47702 ssh2
Jun  4 06:06:47 jumpserver sshd[69461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142  user=root
Jun  4 06:06:51 jumpserver sshd[69461]: Failed password for root from 51.75.66.142 port 51660 ssh2
...
2020-06-04 15:40:14
attackbotsspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-01 23:40:09
attackbots
$f2bV_matches
2020-06-01 16:04:17
attackspam
May 30 22:42:42 piServer sshd[12597]: Failed password for root from 51.75.66.142 port 44222 ssh2
May 30 22:46:12 piServer sshd[12936]: Failed password for root from 51.75.66.142 port 50200 ssh2
...
2020-05-31 04:56:43
attackbots
Auto Fail2Ban report, multiple SSH login attempts.
2020-05-28 12:56:02
attack
May 11 10:35:01 NPSTNNYC01T sshd[2521]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
May 11 10:35:03 NPSTNNYC01T sshd[2521]: Failed password for invalid user cola from 51.75.66.142 port 51730 ssh2
May 11 10:38:57 NPSTNNYC01T sshd[2923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
...
2020-05-12 00:14:27
attack
May  8 16:14:10 ns3164893 sshd[27042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
May  8 16:14:12 ns3164893 sshd[27042]: Failed password for invalid user faris from 51.75.66.142 port 53038 ssh2
...
2020-05-09 00:03:20
attack
2020-05-01 UTC: (50x) - aa,arnab,deborah,docker,driver,elisabetta,ernesto,guest,huanglu,lee,lifan,lucky,mariadb,n,nproc(9x),pricing,root(9x),sdx,sip,student,suo,test(2x),testu,toor,tq,ubuntu(2x),um,user0,user1,weblogic,zl,zli
2020-05-02 18:23:54
attackspam
Invalid user samba1 from 51.75.66.142 port 43386
2020-04-30 20:12:45
attack
2020-04-26T15:01:34.036340vps773228.ovh.net sshd[26034]: Failed password for invalid user dev2 from 51.75.66.142 port 58120 ssh2
2020-04-26T15:05:44.440702vps773228.ovh.net sshd[26048]: Invalid user zack from 51.75.66.142 port 41040
2020-04-26T15:05:44.462131vps773228.ovh.net sshd[26048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.ip-51-75-66.eu
2020-04-26T15:05:44.440702vps773228.ovh.net sshd[26048]: Invalid user zack from 51.75.66.142 port 41040
2020-04-26T15:05:46.129270vps773228.ovh.net sshd[26048]: Failed password for invalid user zack from 51.75.66.142 port 41040 ssh2
...
2020-04-27 02:05:15
attack
Apr 20 16:18:47 lukav-desktop sshd\[23603\]: Invalid user testmail from 51.75.66.142
Apr 20 16:18:47 lukav-desktop sshd\[23603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142
Apr 20 16:18:49 lukav-desktop sshd\[23603\]: Failed password for invalid user testmail from 51.75.66.142 port 47024 ssh2
Apr 20 16:23:08 lukav-desktop sshd\[23834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.142  user=root
Apr 20 16:23:10 lukav-desktop sshd\[23834\]: Failed password for root from 51.75.66.142 port 34300 ssh2
2020-04-21 00:53:57
attackbotsspam
Invalid user cass from 51.75.66.142 port 58072
2020-04-12 15:47:28
attackspambots
Brute-force attempt banned
2020-04-10 03:43:24
attackbotsspam
$f2bV_matches
2020-04-05 22:21:40
attack
SSH Brute Force
2020-04-03 14:27:08
attackspambots
20 attempts against mh-ssh on echoip
2020-03-31 09:14:22
相同子网IP讨论:
IP 类型 评论内容 时间
51.75.66.92 attackbotsspam
Oct 10 18:35:30 PorscheCustomer sshd[22168]: Failed password for root from 51.75.66.92 port 32794 ssh2
Oct 10 18:39:07 PorscheCustomer sshd[22266]: Failed password for man from 51.75.66.92 port 38578 ssh2
...
2020-10-11 00:58:14
51.75.66.92 attack
Oct  9 19:41:58 auw2 sshd\[16730\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.92  user=root
Oct  9 19:42:01 auw2 sshd\[16730\]: Failed password for root from 51.75.66.92 port 57860 ssh2
Oct  9 19:45:40 auw2 sshd\[17011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.92  user=root
Oct  9 19:45:42 auw2 sshd\[17011\]: Failed password for root from 51.75.66.92 port 35460 ssh2
Oct  9 19:49:29 auw2 sshd\[17313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.92  user=root
2020-10-10 16:47:41
51.75.66.92 attackbots
Invalid user guest from 51.75.66.92 port 33062
2020-10-03 03:23:24
51.75.66.92 attackspambots
Invalid user guest from 51.75.66.92 port 33062
2020-10-03 02:13:26
51.75.66.92 attackspambots
Invalid user guest from 51.75.66.92 port 33062
2020-10-02 22:42:03
51.75.66.92 attackspam
Oct  2 10:53:26 scw-gallant-ride sshd[18125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.92
2020-10-02 19:13:23
51.75.66.92 attackspambots
Oct  2 09:36:49 santamaria sshd\[3039\]: Invalid user hello from 51.75.66.92
Oct  2 09:36:49 santamaria sshd\[3039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.92
Oct  2 09:36:51 santamaria sshd\[3039\]: Failed password for invalid user hello from 51.75.66.92 port 45274 ssh2
...
2020-10-02 15:48:55
51.75.66.92 attack
Time:     Fri Oct  2 04:22:37 2020 +0200
IP:       51.75.66.92 (DE/Germany/92.ip-51-75-66.eu)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Oct  2 04:03:52 mail-03 sshd[19495]: Invalid user dario from 51.75.66.92 port 37520
Oct  2 04:03:53 mail-03 sshd[19495]: Failed password for invalid user dario from 51.75.66.92 port 37520 ssh2
Oct  2 04:18:57 mail-03 sshd[19695]: Invalid user cvs from 51.75.66.92 port 53204
Oct  2 04:18:59 mail-03 sshd[19695]: Failed password for invalid user cvs from 51.75.66.92 port 53204 ssh2
Oct  2 04:22:32 mail-03 sshd[19751]: Failed password for root from 51.75.66.92 port 33780 ssh2
2020-10-02 12:03:52
51.75.66.92 attackspambots
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-20 00:30:47
51.75.66.92 attack
Sep 19 08:04:19 game-panel sshd[11840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.92
Sep 19 08:04:21 game-panel sshd[11840]: Failed password for invalid user server from 51.75.66.92 port 50844 ssh2
Sep 19 08:08:19 game-panel sshd[11994]: Failed password for root from 51.75.66.92 port 34552 ssh2
2020-09-19 16:17:06
51.75.66.92 attackbots
SSH Invalid Login
2020-09-19 07:52:16
51.75.66.92 attackspambots
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-06 04:34:42
51.75.66.92 attack
Jul 24 19:51:10 sachi sshd\[4928\]: Invalid user postmaster from 51.75.66.92
Jul 24 19:51:10 sachi sshd\[4928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.92
Jul 24 19:51:11 sachi sshd\[4928\]: Failed password for invalid user postmaster from 51.75.66.92 port 47248 ssh2
Jul 24 19:55:12 sachi sshd\[5375\]: Invalid user qyl from 51.75.66.92
Jul 24 19:55:12 sachi sshd\[5375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.92
2020-07-25 14:40:20
51.75.66.92 attackspam
Jul 23 17:27:04 gw1 sshd[7750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.92
Jul 23 17:27:07 gw1 sshd[7750]: Failed password for invalid user aku from 51.75.66.92 port 44044 ssh2
...
2020-07-23 20:43:16
51.75.66.92 attack
Jul 22 21:50:47 server1 sshd\[18398\]: Failed password for invalid user artur from 51.75.66.92 port 59046 ssh2
Jul 22 21:54:57 server1 sshd\[19446\]: Invalid user vmail from 51.75.66.92
Jul 22 21:54:57 server1 sshd\[19446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.92 
Jul 22 21:54:59 server1 sshd\[19446\]: Failed password for invalid user vmail from 51.75.66.92 port 46578 ssh2
Jul 22 21:59:14 server1 sshd\[20582\]: Invalid user user from 51.75.66.92
...
2020-07-23 12:20:33
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.75.66.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23076
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;51.75.66.142.			IN	A

;; AUTHORITY SECTION:
.			286	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022701 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 02:58:46 CST 2020
;; MSG SIZE  rcvd: 116
HOST信息:
142.66.75.51.in-addr.arpa domain name pointer 142.ip-51-75-66.eu.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.66.75.51.in-addr.arpa	name = 142.ip-51-75-66.eu.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
151.80.168.236 attackspam
2020-07-13 03:24:25 server sshd[51960]: Failed password for invalid user exx from 151.80.168.236 port 57940 ssh2
2020-07-14 00:18:25
1.34.199.125 attackspam
Port scan denied
2020-07-14 00:16:08
85.105.202.59 attack
Port scan denied
2020-07-14 00:07:24
134.209.169.202 attack
Port scan denied
2020-07-14 00:29:09
92.17.2.176 attackspambots
Port scan denied
2020-07-14 00:23:47
45.5.209.144 attackspam
Automatic report - Port Scan Attack
2020-07-14 00:24:52
222.186.180.17 attackspambots
Jul 13 17:40:07 santamaria sshd\[10560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Jul 13 17:40:09 santamaria sshd\[10560\]: Failed password for root from 222.186.180.17 port 27476 ssh2
Jul 13 17:40:28 santamaria sshd\[10563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
...
2020-07-14 00:27:48
222.186.175.183 attackbotsspam
Jul 13 17:54:52 nextcloud sshd\[28740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.183  user=root
Jul 13 17:54:54 nextcloud sshd\[28740\]: Failed password for root from 222.186.175.183 port 16180 ssh2
Jul 13 17:55:05 nextcloud sshd\[28740\]: Failed password for root from 222.186.175.183 port 16180 ssh2
2020-07-13 23:56:14
142.93.46.172 attackspam
142.93.46.172 - - [13/Jul/2020:14:21:24 +0200] "GET /wp-login.php HTTP/1.1" 200 6060 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.46.172 - - [13/Jul/2020:14:21:25 +0200] "POST /wp-login.php HTTP/1.1" 200 6311 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.46.172 - - [13/Jul/2020:14:21:27 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-14 00:28:25
76.231.147.191 attackspambots
Port scan denied
2020-07-13 23:55:05
115.236.100.114 attack
Jul 13 08:21:45 logopedia-1vcpu-1gb-nyc1-01 sshd[48695]: Invalid user queen from 115.236.100.114 port 5250
...
2020-07-13 23:55:53
114.34.56.230 attackbots
Port scan denied
2020-07-14 00:14:05
185.233.186.240 attackspam
1594642909 - 07/13/2020 19:21:49 Host: 185.233.186.240/185.233.186.240 Port: 23 TCP Blocked
...
2020-07-13 23:50:45
49.234.176.247 attackspambots
Port scan denied
2020-07-14 00:14:25
211.241.177.69 attack
Invalid user nagios from 211.241.177.69 port 13555
2020-07-14 00:35:01

最近上报的IP列表

125.224.24.167 114.250.189.63 194.87.237.105 178.159.37.13
203.200.141.15 113.162.150.152 111.42.67.72 92.223.192.5
91.65.94.95 140.143.94.220 14.235.174.116 78.188.62.196
241.74.63.17 218.56.161.69 107.158.44.141 78.141.60.215
124.94.255.221 49.233.90.200 172.104.127.183 174.219.147.241