Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.204.68.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54209
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.204.68.42.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 01:56:45 CST 2022
;; MSG SIZE  rcvd: 106
Host info
42.68.204.138.in-addr.arpa domain name pointer 138-204-68-42.wantel.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.68.204.138.in-addr.arpa	name = 138-204-68-42.wantel.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.152.193.12 attackspam
Received: from 5112.niebieski.net ([94.152.193.12] helo=smtp.5112.niebieski.net)
Subject: Uitnodiging voor het onderzoek | Reservering van de Voucher nr.173/457/5722JB/2019 is actief
From: "Afdeling Toeristisch Onderzoek" 
X-Filter-Label: newsletter
X-SpamExperts-Class: spam
X-SpamExperts-Evidence: dnsbl/se-reputation (spam)
2019-08-28 19:59:20
107.175.56.203 attackbotsspam
Aug 28 12:54:34 srv206 sshd[11939]: Invalid user johannes from 107.175.56.203
...
2019-08-28 19:41:25
128.199.95.163 attackspambots
Aug 28 08:52:12 dedicated sshd[9981]: Invalid user andriy from 128.199.95.163 port 50814
2019-08-28 20:14:33
200.111.137.132 attackbots
Automatic report - Banned IP Access
2019-08-28 19:49:05
113.199.40.202 attack
Aug 28 13:05:38 MainVPS sshd[32352]: Invalid user test from 113.199.40.202 port 40682
Aug 28 13:05:38 MainVPS sshd[32352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.199.40.202
Aug 28 13:05:38 MainVPS sshd[32352]: Invalid user test from 113.199.40.202 port 40682
Aug 28 13:05:40 MainVPS sshd[32352]: Failed password for invalid user test from 113.199.40.202 port 40682 ssh2
Aug 28 13:10:18 MainVPS sshd[32762]: Invalid user hellen from 113.199.40.202 port 34915
...
2019-08-28 19:32:31
46.105.227.206 attackbots
Aug 26 12:38:03 itv-usvr-01 sshd[9713]: Invalid user liu from 46.105.227.206
Aug 26 12:38:03 itv-usvr-01 sshd[9713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.227.206
Aug 26 12:38:03 itv-usvr-01 sshd[9713]: Invalid user liu from 46.105.227.206
Aug 26 12:38:05 itv-usvr-01 sshd[9713]: Failed password for invalid user liu from 46.105.227.206 port 46248 ssh2
Aug 26 12:41:51 itv-usvr-01 sshd[9952]: Invalid user yh from 46.105.227.206
2019-08-28 19:24:15
71.6.199.23 attackbotsspam
08/28/2019-04:43:38.075474 71.6.199.23 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 71
2019-08-28 20:04:29
138.197.166.233 attackspambots
Aug 27 20:48:15 hanapaa sshd\[18086\]: Invalid user ftpaccess from 138.197.166.233
Aug 27 20:48:15 hanapaa sshd\[18086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.166.233
Aug 27 20:48:17 hanapaa sshd\[18086\]: Failed password for invalid user ftpaccess from 138.197.166.233 port 37588 ssh2
Aug 27 20:52:27 hanapaa sshd\[18487\]: Invalid user lulu from 138.197.166.233
Aug 27 20:52:27 hanapaa sshd\[18487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.166.233
2019-08-28 19:51:46
144.217.5.73 attackspambots
Aug 28 12:27:18 SilenceServices sshd[15130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.5.73
Aug 28 12:27:20 SilenceServices sshd[15130]: Failed password for invalid user keystone from 144.217.5.73 port 50254 ssh2
Aug 28 12:31:07 SilenceServices sshd[16530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.5.73
2019-08-28 19:40:02
129.204.40.157 attackspambots
Aug 28 06:32:35 aat-srv002 sshd[9152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.40.157
Aug 28 06:32:37 aat-srv002 sshd[9152]: Failed password for invalid user elastic from 129.204.40.157 port 56292 ssh2
Aug 28 06:37:44 aat-srv002 sshd[9283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.40.157
Aug 28 06:37:47 aat-srv002 sshd[9283]: Failed password for invalid user rp from 129.204.40.157 port 44054 ssh2
...
2019-08-28 19:42:48
198.108.67.100 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-28 20:08:11
213.203.173.179 attackspambots
Aug 28 13:04:40 localhost sshd[5410]: Invalid user ttest from 213.203.173.179 port 43714
...
2019-08-28 20:00:17
180.109.136.67 attackspambots
Aug 28 06:20:13 ks10 sshd[21980]: Failed password for root from 180.109.136.67 port 46172 ssh2
Aug 28 06:20:14 ks10 sshd[21980]: error: Received disconnect from 180.109.136.67 port 46172:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
...
2019-08-28 20:13:53
62.234.97.45 attack
Aug 28 01:54:55 hiderm sshd\[6350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.97.45  user=root
Aug 28 01:54:57 hiderm sshd\[6350\]: Failed password for root from 62.234.97.45 port 57297 ssh2
Aug 28 01:58:36 hiderm sshd\[6710\]: Invalid user waterboy from 62.234.97.45
Aug 28 01:58:36 hiderm sshd\[6710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.97.45
Aug 28 01:58:38 hiderm sshd\[6710\]: Failed password for invalid user waterboy from 62.234.97.45 port 45028 ssh2
2019-08-28 19:59:03
51.75.52.195 attackbots
Aug 28 01:58:30 lcdev sshd\[27117\]: Invalid user hopewell from 51.75.52.195
Aug 28 01:58:30 lcdev sshd\[27117\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3133228.ip-51-75-52.eu
Aug 28 01:58:32 lcdev sshd\[27117\]: Failed password for invalid user hopewell from 51.75.52.195 port 53554 ssh2
Aug 28 02:02:40 lcdev sshd\[27449\]: Invalid user log from 51.75.52.195
Aug 28 02:02:40 lcdev sshd\[27449\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3133228.ip-51-75-52.eu
2019-08-28 20:12:42

Recently Reported IPs

189.208.25.219 153.37.53.228 217.19.155.204 91.222.239.147
14.241.159.154 195.246.120.52 103.204.168.253 113.108.79.56
42.225.0.122 27.38.156.220 103.77.188.32 81.91.158.146
170.106.152.175 103.107.87.5 113.191.7.186 183.234.161.107
52.140.32.190 223.84.147.58 61.137.131.132 201.62.66.121