Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.68.134.188 attack
Invalid user peter from 138.68.134.188 port 52192
2020-07-19 02:24:51
138.68.134.188 attack
leo_www
2020-07-13 22:04:41
138.68.134.188 attackbots
Jul 13 00:03:37 PorscheCustomer sshd[9091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.134.188
Jul 13 00:03:40 PorscheCustomer sshd[9091]: Failed password for invalid user sergi from 138.68.134.188 port 58318 ssh2
Jul 13 00:06:49 PorscheCustomer sshd[9221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.134.188
...
2020-07-13 06:15:48
138.68.134.188 attackspambots
DATE:2020-07-11 06:11:54,IP:138.68.134.188,MATCHES:11,PORT:ssh
2020-07-11 12:32:39
138.68.134.188 attackbots
$f2bV_matches
2020-07-04 04:10:04
138.68.13.226 attackspam
Unauthorized connection attempt from IP address 138.68.13.226 on port 3389
2020-05-28 23:04:26
138.68.137.20 attack
Unauthorized connection attempt detected from IP address 138.68.137.20 to port 6765 [T]
2020-04-12 16:10:23
138.68.137.20 attackbots
Brute force attempt
2020-04-09 18:16:43
138.68.13.76 attackbots
Port 22 Scan, PTR: None
2020-04-08 02:35:46
138.68.137.20 attack
Apr  4 06:51:24 site3 sshd\[187581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.137.20  user=root
Apr  4 06:51:26 site3 sshd\[187581\]: Failed password for root from 138.68.137.20 port 55852 ssh2
Apr  4 06:52:29 site3 sshd\[187593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.137.20  user=root
Apr  4 06:52:32 site3 sshd\[187593\]: Failed password for root from 138.68.137.20 port 42846 ssh2
Apr  4 06:53:44 site3 sshd\[187603\]: Invalid user admin from 138.68.137.20
...
2020-04-04 17:59:15
138.68.136.152 attackbotsspam
$f2bV_matches
2020-03-18 13:00:56
138.68.136.152 attackbots
Wordpress login scanning
2020-03-18 01:18:28
138.68.13.73 attack
phpunit attack
2020-03-13 18:41:11
138.68.13.73 attackbotsspam
Digital Ocean - should be called Digital Cesspool
//vendor/phpunit/phpunit/phpunit.xsd
2020-03-13 04:51:54
138.68.13.73 attack
Web bot without proper user agent declaration scraping website pages
2020-03-11 12:41:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.13.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.13.78.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:51:10 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 78.13.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 78.13.68.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
100.38.240.68 attack
Unauthorized connection attempt detected from IP address 100.38.240.68 to port 8089
2020-04-13 03:54:23
77.38.95.47 attack
Unauthorized connection attempt detected from IP address 77.38.95.47 to port 5555
2020-04-13 04:01:03
69.94.155.176 attackspam
Unauthorized connection attempt detected from IP address 69.94.155.176 to port 445
2020-04-13 04:02:37
109.239.12.152 attack
Unauthorized connection attempt detected from IP address 109.239.12.152 to port 445
2020-04-13 03:52:24
138.122.4.46 attack
Unauthorized connection attempt detected from IP address 138.122.4.46 to port 80
2020-04-13 04:24:26
149.140.105.138 attack
Unauthorized connection attempt detected from IP address 149.140.105.138 to port 23
2020-04-13 03:51:12
70.73.105.235 attack
Unauthorized connection attempt detected from IP address 70.73.105.235 to port 23
2020-04-13 04:02:14
82.50.145.178 attack
Unauthorized connection attempt detected from IP address 82.50.145.178 to port 23
2020-04-13 03:58:22
197.202.62.82 attackbots
Unauthorized connection attempt detected from IP address 197.202.62.82 to port 23
2020-04-13 04:14:11
98.211.211.31 attackbots
Unauthorized connection attempt detected from IP address 98.211.211.31 to port 23
2020-04-13 03:54:56
59.60.79.25 attackbots
Unauthorized connection attempt detected from IP address 59.60.79.25 to port 23
2020-04-13 04:03:49
89.235.96.110 attackbotsspam
Unauthorized connection attempt detected from IP address 89.235.96.110 to port 9530
2020-04-13 04:29:51
125.160.113.31 attackspambots
Unauthorized connection attempt detected from IP address 125.160.113.31 to port 445
2020-04-13 04:24:54
186.236.96.124 attackspam
Unauthorized connection attempt detected from IP address 186.236.96.124 to port 81
2020-04-13 04:16:08
92.154.96.7 attackbots
Unauthorized connection attempt detected from IP address 92.154.96.7 to port 6379
2020-04-13 03:56:13

Recently Reported IPs

138.68.128.94 138.68.129.167 138.68.129.219 118.179.36.123
138.68.130.246 138.68.130.69 138.68.131.161 138.68.132.156
138.68.131.205 138.68.132.167 138.68.132.43 138.68.132.250
138.68.131.209 138.68.131.163 138.68.130.35 138.68.131.188
138.68.133.169 138.68.133.253 118.179.36.125 138.68.134.58