Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.116.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.116.103.			IN	A

;; AUTHORITY SECTION:
.			487	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022601 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 12:30:54 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 103.116.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 103.116.68.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.148.3.212 attackbotsspam
Nov 22 22:20:15 server sshd\[3308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.148.3.212  user=root
Nov 22 22:20:17 server sshd\[3308\]: Failed password for root from 5.148.3.212 port 45730 ssh2
Nov 22 22:28:14 server sshd\[5152\]: Invalid user yosool from 5.148.3.212
Nov 22 22:28:14 server sshd\[5152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.148.3.212 
Nov 22 22:28:16 server sshd\[5152\]: Failed password for invalid user yosool from 5.148.3.212 port 44664 ssh2
...
2019-11-23 06:28:01
167.99.74.119 attack
167.99.74.119 - - \[22/Nov/2019:15:43:38 +0100\] "POST /wp-login.php HTTP/1.0" 200 4474 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
167.99.74.119 - - \[22/Nov/2019:15:43:41 +0100\] "POST /wp-login.php HTTP/1.0" 200 4287 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
167.99.74.119 - - \[22/Nov/2019:15:43:43 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-23 06:30:15
104.236.63.99 attack
Nov 22 12:41:03 web1 sshd\[28574\]: Invalid user furmaniak from 104.236.63.99
Nov 22 12:41:03 web1 sshd\[28574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.63.99
Nov 22 12:41:05 web1 sshd\[28574\]: Failed password for invalid user furmaniak from 104.236.63.99 port 53716 ssh2
Nov 22 12:44:16 web1 sshd\[28877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.63.99  user=news
Nov 22 12:44:18 web1 sshd\[28877\]: Failed password for news from 104.236.63.99 port 32906 ssh2
2019-11-23 06:57:31
193.70.0.93 attackspambots
Nov 22 23:47:10 SilenceServices sshd[24145]: Failed password for root from 193.70.0.93 port 45694 ssh2
Nov 22 23:53:14 SilenceServices sshd[28154]: Failed password for root from 193.70.0.93 port 37478 ssh2
2019-11-23 07:01:46
1.28.253.72 attack
badbot
2019-11-23 06:55:23
66.70.206.215 attackbots
Invalid user 0 from 66.70.206.215 port 45916
2019-11-23 06:31:34
217.119.32.144 attack
Nov 22 15:07:15 askasleikir sshd[93313]: Failed password for invalid user sysadmin from 217.119.32.144 port 9224 ssh2
2019-11-23 06:20:49
49.51.12.221 attack
port scan and connect, tcp 23 (telnet)
2019-11-23 06:21:47
147.135.211.127 attackspam
fail2ban honeypot
2019-11-23 06:31:59
121.1.38.228 attackbots
Automatic report - Banned IP Access
2019-11-23 06:40:19
212.30.52.243 attackbots
Nov 22 19:54:56 amit sshd\[8001\]: Invalid user madelyne from 212.30.52.243
Nov 22 19:54:56 amit sshd\[8001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.30.52.243
Nov 22 19:54:57 amit sshd\[8001\]: Failed password for invalid user madelyne from 212.30.52.243 port 53236 ssh2
...
2019-11-23 06:27:02
18.197.145.12 attack
Nov 22 14:43:26 localhost sshd\[2857\]: Invalid user garrington from 18.197.145.12 port 33112
Nov 22 14:43:26 localhost sshd\[2857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.197.145.12
Nov 22 14:43:28 localhost sshd\[2857\]: Failed password for invalid user garrington from 18.197.145.12 port 33112 ssh2
...
2019-11-23 06:42:04
91.214.179.39 attack
SpamReport
2019-11-23 06:24:34
190.117.62.241 attackspambots
Nov 22 16:22:23 ArkNodeAT sshd\[13131\]: Invalid user jyu from 190.117.62.241
Nov 22 16:22:23 ArkNodeAT sshd\[13131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.117.62.241
Nov 22 16:22:25 ArkNodeAT sshd\[13131\]: Failed password for invalid user jyu from 190.117.62.241 port 45214 ssh2
2019-11-23 06:38:41
68.183.160.63 attackbotsspam
2019-11-22T22:40:50.219265shield sshd\[6278\]: Invalid user umpuser from 68.183.160.63 port 34144
2019-11-22T22:40:50.223595shield sshd\[6278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-22T22:40:52.379546shield sshd\[6278\]: Failed password for invalid user umpuser from 68.183.160.63 port 34144 ssh2
2019-11-22T22:44:43.569649shield sshd\[6951\]: Invalid user unpuser from 68.183.160.63 port 50290
2019-11-22T22:44:43.573908shield sshd\[6951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.160.63
2019-11-23 06:55:08

Recently Reported IPs

138.68.115.64 138.68.119.250 138.68.117.15 138.68.12.98
138.68.117.5 138.68.117.110 138.68.118.106 138.68.119.76
138.68.118.120 138.68.117.67 138.68.116.54 138.68.120.122
138.68.123.38 138.68.121.90 138.68.124.48 156.167.91.104
138.68.125.79 138.68.123.93 138.68.125.249 138.68.120.21