Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.50.205.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32687
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.50.205.68.			IN	A

;; AUTHORITY SECTION:
.			349	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 00:44:11 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b'Host 68.205.50.138.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 138.50.205.68.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
162.243.59.16 attack
2019-12-21T14:35:50.412552  sshd[13393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.59.16  user=root
2019-12-21T14:35:53.003382  sshd[13393]: Failed password for root from 162.243.59.16 port 53522 ssh2
2019-12-21T14:41:13.849892  sshd[13504]: Invalid user server from 162.243.59.16 port 58446
2019-12-21T14:41:13.864785  sshd[13504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.59.16
2019-12-21T14:41:13.849892  sshd[13504]: Invalid user server from 162.243.59.16 port 58446
2019-12-21T14:41:15.466582  sshd[13504]: Failed password for invalid user server from 162.243.59.16 port 58446 ssh2
...
2019-12-21 22:08:39
222.114.164.211 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-21 21:44:37
218.56.61.103 attackspambots
Dec 21 08:12:36 pi sshd\[7478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.61.103  user=root
Dec 21 08:12:38 pi sshd\[7478\]: Failed password for root from 218.56.61.103 port 56752 ssh2
Dec 21 08:18:28 pi sshd\[7696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.56.61.103  user=root
Dec 21 08:18:30 pi sshd\[7696\]: Failed password for root from 218.56.61.103 port 46137 ssh2
Dec 21 08:24:54 pi sshd\[7930\]: Invalid user info from 218.56.61.103 port 26032
...
2019-12-21 21:31:03
78.128.112.114 attack
12/21/2019-07:25:18.311198 78.128.112.114 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-21 21:45:44
88.124.45.49 attackspam
Dec 21 06:22:39 shared-1 sshd\[10577\]: Invalid user admin from 88.124.45.49Dec 21 06:22:45 shared-1 sshd\[10579\]: Invalid user ubuntu from 88.124.45.49
...
2019-12-21 21:50:41
218.25.130.220 attackbots
[Aegis] @ 2019-12-21 11:43:42  0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-12-21 21:44:57
180.101.221.152 attack
Unauthorized connection attempt detected from IP address 180.101.221.152 to port 22
2019-12-21 22:04:46
218.92.0.145 attackspambots
Dec 21 14:09:20 legacy sshd[1518]: Failed password for root from 218.92.0.145 port 26648 ssh2
Dec 21 14:09:23 legacy sshd[1518]: Failed password for root from 218.92.0.145 port 26648 ssh2
Dec 21 14:09:26 legacy sshd[1518]: Failed password for root from 218.92.0.145 port 26648 ssh2
Dec 21 14:09:30 legacy sshd[1518]: Failed password for root from 218.92.0.145 port 26648 ssh2
...
2019-12-21 21:34:20
206.189.93.108 attack
Invalid user test from 206.189.93.108 port 59975
2019-12-21 21:47:20
74.141.132.233 attackbotsspam
Invalid user pascal from 74.141.132.233 port 60988
2019-12-21 21:52:45
106.75.21.242 attack
Dec 21 14:38:25 localhost sshd\[29068\]: Invalid user wern from 106.75.21.242 port 39802
Dec 21 14:38:25 localhost sshd\[29068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.21.242
Dec 21 14:38:28 localhost sshd\[29068\]: Failed password for invalid user wern from 106.75.21.242 port 39802 ssh2
2019-12-21 21:56:50
182.61.46.191 attackbotsspam
ssh failed login
2019-12-21 21:32:10
124.105.116.54 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-21 21:40:07
190.98.228.54 attackbots
Invalid user felino from 190.98.228.54 port 1657
2019-12-21 21:41:29
61.8.75.5 attackspam
Invalid user fitcadftp from 61.8.75.5 port 33486
2019-12-21 21:51:11

Recently Reported IPs

177.109.231.240 135.59.165.231 62.241.166.14 115.53.245.87
130.56.120.62 133.35.223.225 2403:6200:8988:33c:c545:3802:2546:df4c 165.152.37.140
104.155.232.62 174.113.83.31 113.141.129.255 16.63.160.126
124.22.119.63 153.236.178.160 173.252.120.33 57.251.71.126
105.30.147.46 174.164.222.9 232.57.42.34 182.48.146.193