Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
$f2bV_matches
2020-10-08 05:54:27
attackbots
Oct  7 06:27:06 mail sshd[12463]: Failed password for root from 138.197.66.68 port 41183 ssh2
2020-10-07 14:11:34
attackspambots
Sep 30 17:13:29 rocket sshd[14643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
Sep 30 17:13:31 rocket sshd[14643]: Failed password for invalid user account from 138.197.66.68 port 43793 ssh2
...
2020-10-01 02:07:16
attackbotsspam
Invalid user deploy from 138.197.66.68 port 36829
2020-09-30 18:17:20
attackspambots
$f2bV_matches
2020-09-30 08:29:21
attackspambots
Invalid user deploy from 138.197.66.68 port 36829
2020-09-30 01:16:24
attack
Sep 28 17:31:47 NPSTNNYC01T sshd[1700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
Sep 28 17:31:49 NPSTNNYC01T sshd[1700]: Failed password for invalid user mysql from 138.197.66.68 port 42160 ssh2
Sep 28 17:35:40 NPSTNNYC01T sshd[1982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
...
2020-09-29 05:38:45
attackbots
Sep 28 11:12:14 *** sshd[19206]: Invalid user victor from 138.197.66.68
2020-09-28 22:00:56
attackbots
Sep 28 01:51:45 NPSTNNYC01T sshd[28420]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
Sep 28 01:51:47 NPSTNNYC01T sshd[28420]: Failed password for invalid user ww from 138.197.66.68 port 39393 ssh2
Sep 28 01:55:31 NPSTNNYC01T sshd[28759]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
...
2020-09-28 14:07:29
attack
Automatic report - Banned IP Access
2020-09-15 22:04:12
attackspambots
$f2bV_matches
2020-09-15 14:00:36
attack
$f2bV_matches
2020-09-15 06:11:29
attackspambots
IP blocked
2020-09-12 22:37:18
attackbotsspam
...
2020-09-12 14:41:26
attackbotsspam
Sep 11 20:49:42 sshgateway sshd\[9939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68  user=root
Sep 11 20:49:44 sshgateway sshd\[9939\]: Failed password for root from 138.197.66.68 port 44138 ssh2
Sep 11 20:54:47 sshgateway sshd\[10560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68  user=root
2020-09-12 06:29:34
attack
Aug 25 12:14:34 onepixel sshd[3561061]: Failed password for root from 138.197.66.68 port 33424 ssh2
Aug 25 12:18:17 onepixel sshd[3561698]: Invalid user idc from 138.197.66.68 port 35069
Aug 25 12:18:17 onepixel sshd[3561698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68 
Aug 25 12:18:17 onepixel sshd[3561698]: Invalid user idc from 138.197.66.68 port 35069
Aug 25 12:18:19 onepixel sshd[3561698]: Failed password for invalid user idc from 138.197.66.68 port 35069 ssh2
2020-08-25 20:35:22
attackspam
$f2bV_matches
2020-08-14 13:28:55
attack
2020-08-11T09:34:55.795765sorsha.thespaminator.com sshd[19373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68  user=root
2020-08-11T09:34:57.860369sorsha.thespaminator.com sshd[19373]: Failed password for root from 138.197.66.68 port 34332 ssh2
...
2020-08-12 02:17:23
attack
SSH invalid-user multiple login try
2020-08-11 18:13:31
attackbots
Jul 31 23:26:55 OPSO sshd\[7770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68  user=root
Jul 31 23:26:57 OPSO sshd\[7770\]: Failed password for root from 138.197.66.68 port 46258 ssh2
Jul 31 23:31:06 OPSO sshd\[9084\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68  user=root
Jul 31 23:31:08 OPSO sshd\[9084\]: Failed password for root from 138.197.66.68 port 52072 ssh2
Jul 31 23:35:15 OPSO sshd\[10523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68  user=root
2020-08-01 05:43:12
attackspambots
Invalid user diradmin from 138.197.66.68 port 48159
2020-07-29 07:04:24
attackbots
*Port Scan* detected from 138.197.66.68 (US/United States/New Jersey/Clifton/-). 4 hits in the last 265 seconds
2020-07-18 02:33:05
attack
Bruteforce detected by fail2ban
2020-07-17 04:35:46
attack
2020-07-11T05:53:47+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-07-11 15:37:18
attackbotsspam
2020-07-09T05:57:38.001772ks3355764 sshd[7541]: Invalid user jiayan from 138.197.66.68 port 51089
2020-07-09T05:57:39.924996ks3355764 sshd[7541]: Failed password for invalid user jiayan from 138.197.66.68 port 51089 ssh2
...
2020-07-09 12:51:25
attackbotsspam
2020-07-08T13:02:48.344205mail.csmailer.org sshd[17990]: Invalid user luz from 138.197.66.68 port 48014
2020-07-08T13:02:48.347775mail.csmailer.org sshd[17990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
2020-07-08T13:02:48.344205mail.csmailer.org sshd[17990]: Invalid user luz from 138.197.66.68 port 48014
2020-07-08T13:02:49.884482mail.csmailer.org sshd[17990]: Failed password for invalid user luz from 138.197.66.68 port 48014 ssh2
2020-07-08T13:06:04.309908mail.csmailer.org sshd[18192]: Invalid user takagi from 138.197.66.68 port 47147
...
2020-07-08 22:20:09
attack
Jun 27 07:54:04 plex sshd[12214]: Invalid user mama from 138.197.66.68 port 32792
2020-06-27 14:13:00
attack
Invalid user vlad from 138.197.66.68 port 49675
2020-06-27 00:48:10
attack
Jun 22 05:52:26 OPSO sshd\[29174\]: Invalid user anne from 138.197.66.68 port 33601
Jun 22 05:52:26 OPSO sshd\[29174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68
Jun 22 05:52:28 OPSO sshd\[29174\]: Failed password for invalid user anne from 138.197.66.68 port 33601 ssh2
Jun 22 05:55:46 OPSO sshd\[29744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.68  user=root
Jun 22 05:55:48 OPSO sshd\[29744\]: Failed password for root from 138.197.66.68 port 32906 ssh2
2020-06-22 12:06:20
attackspambots
Invalid user gbase from 138.197.66.68 port 39511
2020-06-21 16:49:28
Comments on same subnet:
IP Type Details Datetime
138.197.66.124 attack
Oct 12 18:19:11 dev0-dcde-rnet sshd[24191]: Failed password for root from 138.197.66.124 port 46600 ssh2
Oct 12 18:31:05 dev0-dcde-rnet sshd[24290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.124
Oct 12 18:31:07 dev0-dcde-rnet sshd[24290]: Failed password for invalid user olivia from 138.197.66.124 port 53074 ssh2
2020-10-13 01:19:57
138.197.66.124 attack
Oct 12 18:26:52 web1 sshd[20108]: Invalid user hall from 138.197.66.124 port 34488
Oct 12 18:26:52 web1 sshd[20108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.124
Oct 12 18:26:52 web1 sshd[20108]: Invalid user hall from 138.197.66.124 port 34488
Oct 12 18:26:54 web1 sshd[20108]: Failed password for invalid user hall from 138.197.66.124 port 34488 ssh2
Oct 12 18:31:26 web1 sshd[21619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.124  user=root
Oct 12 18:31:28 web1 sshd[21619]: Failed password for root from 138.197.66.124 port 52078 ssh2
Oct 12 18:34:41 web1 sshd[22607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.124  user=root
Oct 12 18:34:43 web1 sshd[22607]: Failed password for root from 138.197.66.124 port 55486 ssh2
Oct 12 18:37:54 web1 sshd[23706]: Invalid user lilli from 138.197.66.124 port 58900
...
2020-10-12 16:42:28
138.197.66.184 attack
Exploited Host.
2020-07-26 02:56:06
138.197.66.192 attack
2020-03-30T02:05:56.505333whonock.onlinehub.pt sshd[27683]: Invalid user bbk from 138.197.66.192 port 36284
2020-03-30T02:05:56.509461whonock.onlinehub.pt sshd[27683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.192
2020-03-30T02:05:56.505333whonock.onlinehub.pt sshd[27683]: Invalid user bbk from 138.197.66.192 port 36284
2020-03-30T02:05:58.728906whonock.onlinehub.pt sshd[27683]: Failed password for invalid user bbk from 138.197.66.192 port 36284 ssh2
2020-03-30T02:11:03.263151whonock.onlinehub.pt sshd[27930]: Invalid user uyh from 138.197.66.192 port 36656
2020-03-30T02:11:03.267196whonock.onlinehub.pt sshd[27930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.192
2020-03-30T02:11:03.263151whonock.onlinehub.pt sshd[27930]: Invalid user uyh from 138.197.66.192 port 36656
2020-03-30T02:11:05.632067whonock.onlinehub.pt sshd[27930]: Failed password for invalid user uyh from 138.197
...
2020-03-30 09:34:37
138.197.66.192 attackspambots
Mar 25 21:18:24 zulu1842 sshd[30770]: Invalid user hedya from 138.197.66.192
Mar 25 21:18:24 zulu1842 sshd[30770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.192 
Mar 25 21:18:26 zulu1842 sshd[30770]: Failed password for invalid user hedya from 138.197.66.192 port 56062 ssh2
Mar 25 21:18:26 zulu1842 sshd[30770]: Received disconnect from 138.197.66.192: 11: Bye Bye [preauth]
Mar 25 21:23:33 zulu1842 sshd[31168]: Invalid user mandriva from 138.197.66.192
Mar 25 21:23:33 zulu1842 sshd[31168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.66.192 
Mar 25 21:23:35 zulu1842 sshd[31168]: Failed password for invalid user mandriva from 138.197.66.192 port 44988 ssh2
Mar 25 21:23:35 zulu1842 sshd[31168]: Received disconnect from 138.197.66.192: 11: Bye Bye [preauth]
Mar 25 21:26:42 zulu1842 sshd[31372]: Invalid user www from 138.197.66.192
Mar 25 21:26:42 zulu1842 sshd[31372]:........
-------------------------------
2020-03-27 05:17:58
138.197.66.171 attackbotsspam
138.197.66.171 - - \[01/Jan/2020:05:57:41 +0100\] "GET / HTTP/1.0" 301 178 "-" "Mozilla/5.0 \(compatible\; NetcraftSurveyAgent/1.0\; +info@netcraft.com\)"
...
2020-01-01 13:38:39
138.197.66.204 attack
Telnet/23 MH Probe, BF, Hack -
2019-06-30 08:47:45
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.197.66.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57762
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.197.66.68.			IN	A

;; AUTHORITY SECTION:
.			592	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040500 1800 900 604800 86400

;; Query time: 93 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 05 19:57:59 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 68.66.197.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.66.197.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.174.26.169 attack
Honeypot attack, port: 23, PTR: 1-174-26-169.dynamic-ip.hinet.net.
2019-08-19 03:52:14
49.85.243.46 attackbotsspam
ylmf-pc
2019-08-19 03:50:28
106.12.76.97 attack
Aug 18 17:17:59 server sshd\[12041\]: Invalid user doughty from 106.12.76.97 port 33320
Aug 18 17:17:59 server sshd\[12041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.76.97
Aug 18 17:18:01 server sshd\[12041\]: Failed password for invalid user doughty from 106.12.76.97 port 33320 ssh2
Aug 18 17:23:18 server sshd\[29779\]: Invalid user sysop123 from 106.12.76.97 port 45386
Aug 18 17:23:18 server sshd\[29779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.76.97
2019-08-19 04:28:38
117.53.45.44 attackspambots
Aug 18 22:03:54 lnxmail61 sshd[18788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.53.45.44
2019-08-19 04:27:55
177.92.16.186 attack
Aug 18 21:31:47 andromeda sshd\[24379\]: Invalid user fe from 177.92.16.186 port 24947
Aug 18 21:31:47 andromeda sshd\[24379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.92.16.186
Aug 18 21:31:49 andromeda sshd\[24379\]: Failed password for invalid user fe from 177.92.16.186 port 24947 ssh2
2019-08-19 03:49:17
45.40.199.54 attackspambots
Aug 18 19:39:29 server sshd\[18378\]: Invalid user tester from 45.40.199.54 port 32990
Aug 18 19:39:29 server sshd\[18378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.54
Aug 18 19:39:32 server sshd\[18378\]: Failed password for invalid user tester from 45.40.199.54 port 32990 ssh2
Aug 18 19:45:03 server sshd\[16579\]: Invalid user mickey from 45.40.199.54 port 45716
Aug 18 19:45:03 server sshd\[16579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.199.54
2019-08-19 04:21:13
183.82.121.34 attackspambots
Aug 18 13:25:49 *** sshd[26325]: Failed password for invalid user test from 183.82.121.34 port 20730 ssh2
Aug 18 13:39:29 *** sshd[26536]: Failed password for invalid user fw from 183.82.121.34 port 24080 ssh2
Aug 18 13:44:07 *** sshd[26654]: Failed password for invalid user dylan from 183.82.121.34 port 46586 ssh2
Aug 18 13:48:38 *** sshd[26727]: Failed password for invalid user vi from 183.82.121.34 port 13071 ssh2
Aug 18 13:57:59 *** sshd[26839]: Failed password for invalid user user from 183.82.121.34 port 58057 ssh2
Aug 18 14:02:39 *** sshd[26933]: Failed password for invalid user anglais from 183.82.121.34 port 24575 ssh2
Aug 18 14:07:19 *** sshd[27028]: Failed password for invalid user lex from 183.82.121.34 port 47086 ssh2
Aug 18 14:12:01 *** sshd[27144]: Failed password for invalid user ghost from 183.82.121.34 port 13546 ssh2
Aug 18 14:16:46 *** sshd[27204]: Failed password for invalid user studen from 183.82.121.34 port 36052 ssh2
Aug 18 14:30:59 *** sshd[27463]: Failed password for invalid user mo
2019-08-19 04:10:16
141.98.9.205 attackbotsspam
Aug 18 19:03:50 relay postfix/smtpd\[13856\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 19:04:28 relay postfix/smtpd\[25531\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 19:04:52 relay postfix/smtpd\[29689\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 19:05:30 relay postfix/smtpd\[2979\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 18 19:05:54 relay postfix/smtpd\[13858\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-19 03:58:40
185.33.144.70 attackbotsspam
Honeypot attack, port: 23, PTR: 70.144.forpsi.net.
2019-08-19 04:30:47
113.140.10.30 attackspam
Reported by AbuseIPDB proxy server.
2019-08-19 04:31:02
180.76.176.113 attackbotsspam
Aug 18 19:15:08 MK-Soft-VM7 sshd\[32550\]: Invalid user jordi from 180.76.176.113 port 50458
Aug 18 19:15:08 MK-Soft-VM7 sshd\[32550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.113
Aug 18 19:15:11 MK-Soft-VM7 sshd\[32550\]: Failed password for invalid user jordi from 180.76.176.113 port 50458 ssh2
...
2019-08-19 04:02:33
112.85.42.189 attackspambots
2019-08-18T15:40:26.876224abusebot-4.cloudsearch.cf sshd\[14357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.189  user=root
2019-08-19 04:35:20
196.250.57.85 attackbots
Aug 18 18:08:06 v22018053744266470 sshd[6386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.250.57.85
Aug 18 18:08:08 v22018053744266470 sshd[6386]: Failed password for invalid user test1 from 196.250.57.85 port 51556 ssh2
Aug 18 18:14:04 v22018053744266470 sshd[6749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.250.57.85
...
2019-08-19 03:58:13
176.31.191.61 attackbots
Aug 18 14:54:08 SilenceServices sshd[7946]: Failed password for root from 176.31.191.61 port 53294 ssh2
Aug 18 14:58:15 SilenceServices sshd[10469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.191.61
Aug 18 14:58:17 SilenceServices sshd[10469]: Failed password for invalid user amdsa from 176.31.191.61 port 42538 ssh2
2019-08-19 04:26:19
121.204.148.98 attackbotsspam
Aug 18 05:17:22 sachi sshd\[21660\]: Invalid user caps from 121.204.148.98
Aug 18 05:17:22 sachi sshd\[21660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.148.98
Aug 18 05:17:24 sachi sshd\[21660\]: Failed password for invalid user caps from 121.204.148.98 port 41864 ssh2
Aug 18 05:23:18 sachi sshd\[22243\]: Invalid user cron from 121.204.148.98
Aug 18 05:23:18 sachi sshd\[22243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.148.98
2019-08-19 04:27:05

Recently Reported IPs

95.66.237.254 37.152.135.168 159.89.52.25 180.242.223.5
59.80.30.174 116.100.117.66 59.31.61.106 69.64.37.10
35.233.145.97 182.70.106.30 218.53.80.53 124.156.102.182
122.246.68.202 94.23.116.177 47.105.161.162 224.63.51.158
182.61.187.60 35.67.28.114 150.134.215.102 121.54.109.247