Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Slough

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.132.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54627
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.132.209.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026010301 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 04 10:30:30 CST 2026
;; MSG SIZE  rcvd: 107
Host info
209.132.68.138.in-addr.arpa domain name pointer db-mongodb-lon1-30254-25ee8184.mongo.ondigitalocean.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
209.132.68.138.in-addr.arpa	name = db-mongodb-lon1-30254-25ee8184.mongo.ondigitalocean.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.128.49.239 attackbotsspam
Invalid user af from 178.128.49.239 port 51958
2020-04-30 02:01:29
106.54.20.26 attackbotsspam
Failed password for postgres from 106.54.20.26 port 53436 ssh2
2020-04-30 02:10:43
193.70.37.148 attackbotsspam
Invalid user teamspeak3 from 193.70.37.148 port 41736
2020-04-30 01:57:37
1.9.78.242 attackbots
Failed password for postgres from 1.9.78.242 port 37289 ssh2
2020-04-30 01:54:04
118.89.58.198 attackbotsspam
Failed password for root from 118.89.58.198 port 49432 ssh2
2020-04-30 02:09:37
37.187.3.53 attackspam
2020-04-27 18:23:40 server sshd[55299]: Failed password for invalid user britz from 37.187.3.53 port 38887 ssh2
2020-04-30 02:21:48
114.69.249.194 attackbotsspam
Apr 29 16:50:50 XXX sshd[17330]: Invalid user jiri from 114.69.249.194 port 54370
2020-04-30 02:10:08
89.45.208.215 attackspambots
Unauthorized connection attempt from IP address 89.45.208.215 on Port 445(SMB)
2020-04-30 02:29:38
51.144.171.125 attackbotsspam
Invalid user ubuntu from 51.144.171.125 port 50634
2020-04-30 02:17:50
52.226.79.76 attack
Apr 29 15:56:39 localhost sshd[23042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.226.79.76  user=root
Apr 29 15:56:40 localhost sshd[23042]: Failed password for root from 52.226.79.76 port 35054 ssh2
Apr 29 15:58:04 localhost sshd[23244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.226.79.76  user=root
Apr 29 15:58:05 localhost sshd[23244]: Failed password for root from 52.226.79.76 port 55356 ssh2
Apr 29 15:58:56 localhost sshd[23371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.226.79.76  user=root
Apr 29 15:58:58 localhost sshd[23371]: Failed password for root from 52.226.79.76 port 40162 ssh2
...
2020-04-30 02:16:55
202.43.167.234 attackbotsspam
2020-04-29T17:04:43.478602abusebot-2.cloudsearch.cf sshd[3998]: Invalid user nilesh from 202.43.167.234 port 41072
2020-04-29T17:04:43.485083abusebot-2.cloudsearch.cf sshd[3998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.43.167.234
2020-04-29T17:04:43.478602abusebot-2.cloudsearch.cf sshd[3998]: Invalid user nilesh from 202.43.167.234 port 41072
2020-04-29T17:04:45.615623abusebot-2.cloudsearch.cf sshd[3998]: Failed password for invalid user nilesh from 202.43.167.234 port 41072 ssh2
2020-04-29T17:09:07.155744abusebot-2.cloudsearch.cf sshd[4067]: Invalid user support from 202.43.167.234 port 46264
2020-04-29T17:09:07.163044abusebot-2.cloudsearch.cf sshd[4067]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.43.167.234
2020-04-29T17:09:07.155744abusebot-2.cloudsearch.cf sshd[4067]: Invalid user support from 202.43.167.234 port 46264
2020-04-29T17:09:09.203177abusebot-2.cloudsearch.cf sshd[4067]: 
...
2020-04-30 01:55:48
120.133.237.228 attackbotsspam
$f2bV_matches
2020-04-30 02:09:07
157.131.240.194 attack
Invalid user nexthink from 157.131.240.194 port 13321
2020-04-30 02:04:32
124.122.4.71 attack
Failed password for postgres from 124.122.4.71 port 46234 ssh2
2020-04-30 02:08:32
193.112.22.34 attackspam
Invalid user ftpuser from 193.112.22.34 port 58377
2020-04-30 01:57:21

Recently Reported IPs

104.131.6.219 195.184.76.150 116.203.123.33 1.33.3.251
57.180.60.84 8.222.146.99 8.219.221.67 201.62.59.125
24.199.126.200 91.230.168.82 91.230.168.182 91.230.168.146
121.40.43.137 194.187.177.235 194.187.177.214 47.237.173.78
137.184.71.192 38.247.134.212 101.226.144.76 8.222.158.163