Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.2.68.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.2.68.42.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:27:21 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 42.68.2.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.68.2.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.33.34.178 attackspambots
Automatic report - Port Scan Attack
2019-12-03 20:41:40
142.93.195.56 attack
SSH brutforce
2019-12-03 21:12:40
106.75.240.46 attack
Dec  3 12:36:23 vpn01 sshd[32468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.240.46
Dec  3 12:36:25 vpn01 sshd[32468]: Failed password for invalid user mafia from 106.75.240.46 port 53058 ssh2
...
2019-12-03 20:35:39
118.24.30.97 attackspam
Dec  3 13:09:06 localhost sshd\[8121\]: Invalid user gomm from 118.24.30.97 port 38314
Dec  3 13:09:06 localhost sshd\[8121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.30.97
Dec  3 13:09:07 localhost sshd\[8121\]: Failed password for invalid user gomm from 118.24.30.97 port 38314 ssh2
2019-12-03 20:36:26
124.156.116.72 attack
Dec  3 07:00:44 raspberrypi sshd\[4831\]: Failed password for root from 124.156.116.72 port 56690 ssh2Dec  3 07:13:15 raspberrypi sshd\[5052\]: Failed password for root from 124.156.116.72 port 35012 ssh2Dec  3 07:20:01 raspberrypi sshd\[5165\]: Invalid user us_admin from 124.156.116.72
...
2019-12-03 20:58:44
178.128.59.245 attackspam
Dec  3 08:33:58 ns381471 sshd[11237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.59.245
Dec  3 08:34:00 ns381471 sshd[11237]: Failed password for invalid user villacorte from 178.128.59.245 port 49434 ssh2
2019-12-03 21:00:15
139.155.26.91 attack
Dec  3 12:08:31 localhost sshd\[8035\]: Invalid user cimmie from 139.155.26.91 port 37054
Dec  3 12:08:31 localhost sshd\[8035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.91
Dec  3 12:08:33 localhost sshd\[8035\]: Failed password for invalid user cimmie from 139.155.26.91 port 37054 ssh2
Dec  3 12:16:06 localhost sshd\[8337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.26.91  user=root
Dec  3 12:16:07 localhost sshd\[8337\]: Failed password for root from 139.155.26.91 port 42546 ssh2
...
2019-12-03 20:43:47
110.56.18.91 attackbotsspam
Dec  3 12:50:40 liveconfig01 sshd[16919]: Invalid user mauseth from 110.56.18.91
Dec  3 12:50:40 liveconfig01 sshd[16919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.56.18.91
Dec  3 12:50:42 liveconfig01 sshd[16919]: Failed password for invalid user mauseth from 110.56.18.91 port 33836 ssh2
Dec  3 12:50:42 liveconfig01 sshd[16919]: Received disconnect from 110.56.18.91 port 33836:11: Bye Bye [preauth]
Dec  3 12:50:42 liveconfig01 sshd[16919]: Disconnected from 110.56.18.91 port 33836 [preauth]
Dec  3 13:13:57 liveconfig01 sshd[18032]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.56.18.91  user=mysql
Dec  3 13:13:59 liveconfig01 sshd[18032]: Failed password for mysql from 110.56.18.91 port 53316 ssh2
Dec  3 13:14:00 liveconfig01 sshd[18032]: Received disconnect from 110.56.18.91 port 53316:11: Bye Bye [preauth]
Dec  3 13:14:00 liveconfig01 sshd[18032]: Disconnected from 110.56........
-------------------------------
2019-12-03 20:54:18
202.158.40.36 attackbotsspam
Dec  2 04:51:37 h2022099 sshd[17367]: reveeclipse mapping checking getaddrinfo for ip40-36.cbn.net.id [202.158.40.36] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  2 04:51:37 h2022099 sshd[17367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.40.36  user=r.r
Dec  2 04:51:40 h2022099 sshd[17367]: Failed password for r.r from 202.158.40.36 port 46762 ssh2
Dec  2 04:51:40 h2022099 sshd[17367]: Received disconnect from 202.158.40.36: 11: Bye Bye [preauth]
Dec  2 04:59:19 h2022099 sshd[18727]: reveeclipse mapping checking getaddrinfo for ip40-36.cbn.net.id [202.158.40.36] failed - POSSIBLE BREAK-IN ATTEMPT!
Dec  2 04:59:19 h2022099 sshd[18727]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.158.40.36  user=r.r
Dec  2 04:59:20 h2022099 sshd[18727]: Failed password for r.r from 202.158.40.36 port 58636 ssh2
Dec  2 04:59:21 h2022099 sshd[18727]: Received disconnect from 202.158.40.36: 11: ........
-------------------------------
2019-12-03 20:53:42
185.143.223.152 attackspam
2019-12-03T13:03:37.263522+01:00 lumpi kernel: [664574.340265] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.152 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=61672 PROTO=TCP SPT=59319 DPT=10681 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-12-03 20:35:57
51.38.232.93 attackbots
2019-12-03T12:45:50.221193shield sshd\[32105\]: Invalid user carter from 51.38.232.93 port 49216
2019-12-03T12:45:50.225781shield sshd\[32105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.ip-51-38-232.eu
2019-12-03T12:45:52.438002shield sshd\[32105\]: Failed password for invalid user carter from 51.38.232.93 port 49216 ssh2
2019-12-03T12:51:14.628808shield sshd\[32677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.ip-51-38-232.eu  user=root
2019-12-03T12:51:16.985708shield sshd\[32677\]: Failed password for root from 51.38.232.93 port 59830 ssh2
2019-12-03 20:57:54
210.16.187.206 attackbots
fail2ban
2019-12-03 20:59:57
61.175.121.76 attack
Dec  3 02:27:15 tdfoods sshd\[9042\]: Invalid user marg from 61.175.121.76
Dec  3 02:27:15 tdfoods sshd\[9042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.121.76
Dec  3 02:27:17 tdfoods sshd\[9042\]: Failed password for invalid user marg from 61.175.121.76 port 22356 ssh2
Dec  3 02:35:30 tdfoods sshd\[9807\]: Invalid user moores from 61.175.121.76
Dec  3 02:35:30 tdfoods sshd\[9807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.175.121.76
2019-12-03 20:37:00
61.161.236.202 attackspambots
2019-12-03T12:45:35.562832abusebot-4.cloudsearch.cf sshd\[24289\]: Invalid user nearftp from 61.161.236.202 port 63945
2019-12-03 21:07:48
106.13.140.110 attackspambots
Dec  3 11:11:08 game-panel sshd[3769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.140.110
Dec  3 11:11:10 game-panel sshd[3769]: Failed password for invalid user info from 106.13.140.110 port 46624 ssh2
Dec  3 11:17:48 game-panel sshd[4061]: Failed password for root from 106.13.140.110 port 45620 ssh2
2019-12-03 20:43:28

Recently Reported IPs

138.199.59.161 138.199.59.219 138.2.119.175 138.201.10.206
138.201.11.113 138.201.103.104 138.201.110.217 138.201.11.215
138.201.105.2 138.201.114.161 138.201.11.216 138.201.1.73
138.201.116.47 138.201.119.17 138.201.113.132 138.201.120.149
138.201.119.233 138.201.121.121 138.201.120.110 138.201.120.224