Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Slough

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.68.142.122 attack
2019-05-07 11:08:35 1hNw5T-0007K7-NU SMTP connection from jeans.bridgecoaa.com \(null.technoandy.icu\) \[138.68.142.122\]:41731 I=\[193.107.90.29\]:25 closed by DROP in ACL
2019-05-07 11:09:14 1hNw66-0007Mr-Kd SMTP connection from jeans.bridgecoaa.com \(cats.technoandy.icu\) \[138.68.142.122\]:51735 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-05-07 11:10:28 1hNw7I-0007Py-G4 SMTP connection from jeans.bridgecoaa.com \(shaken.technoandy.icu\) \[138.68.142.122\]:56823 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-02-05 01:13:30
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       138.68.0.0 - 138.68.255.255
CIDR:           138.68.0.0/16
NetName:        DIGITALOCEAN-138-68-0-0
NetHandle:      NET-138-68-0-0-1
Parent:         NET138 (NET-138-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DigitalOcean, LLC (DO-13)
RegDate:        2016-01-26
Updated:        2025-03-01
Comment:        Routing and Peering Policy can be found at https://www.as14061.net
Comment:        
Comment:        Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref:            https://rdap.arin.net/registry/ip/138.68.0.0



OrgName:        DigitalOcean, LLC
OrgId:          DO-13
Address:        105 Edgeview Drive, Suite 425
City:           Broomfield
StateProv:      CO
PostalCode:     80021
Country:        US
RegDate:        2012-05-14
Updated:        2025-04-11
Ref:            https://rdap.arin.net/registry/entity/DO-13


OrgTechHandle: NOC32014-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-646-827-4366 
OrgTechEmail:  noc@digitalocean.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN

OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName:   DigitalOcean Abuse
OrgAbusePhone:  +1-646-827-4366 
OrgAbuseEmail:  abuse@digitalocean.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DIGIT19-ARIN

OrgNOCHandle: NOC32014-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-646-827-4366 
OrgNOCEmail:  noc@digitalocean.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.142.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.142.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092101 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 22 04:00:17 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 2.142.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.142.68.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
209.17.96.18 attackspambots
Unauthorized access to SSH at 6/Jun/2020:04:13:28 +0000.
2020-06-06 19:24:22
146.185.130.101 attack
Jun  6 08:33:58 fhem-rasp sshd[16924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.130.101  user=root
Jun  6 08:34:00 fhem-rasp sshd[16924]: Failed password for root from 146.185.130.101 port 36752 ssh2
...
2020-06-06 19:11:57
122.144.134.27 attack
Failed password for invalid user root from 122.144.134.27 port 10323 ssh2
2020-06-06 19:01:06
122.252.229.100 attackspam
 TCP (SYN) 122.252.229.100:63452 -> port 23, len 44
2020-06-06 19:25:35
178.238.8.7 attackbotsspam
Fail2Ban Ban Triggered
2020-06-06 19:23:35
106.12.12.127 attack
Jun  5 19:13:11 sachi sshd\[8244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.127  user=root
Jun  5 19:13:12 sachi sshd\[8244\]: Failed password for root from 106.12.12.127 port 53488 ssh2
Jun  5 19:15:50 sachi sshd\[8436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.127  user=root
Jun  5 19:15:52 sachi sshd\[8436\]: Failed password for root from 106.12.12.127 port 56760 ssh2
Jun  5 19:18:41 sachi sshd\[8649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.127  user=root
2020-06-06 18:58:14
71.189.47.10 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-06-06 18:56:43
122.51.109.222 attackbots
Jun  6 12:25:34 inter-technics sshd[816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.109.222  user=root
Jun  6 12:25:36 inter-technics sshd[816]: Failed password for root from 122.51.109.222 port 39418 ssh2
Jun  6 12:27:21 inter-technics sshd[918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.109.222  user=root
Jun  6 12:27:23 inter-technics sshd[918]: Failed password for root from 122.51.109.222 port 58816 ssh2
Jun  6 12:29:13 inter-technics sshd[999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.109.222  user=root
Jun  6 12:29:14 inter-technics sshd[999]: Failed password for root from 122.51.109.222 port 49988 ssh2
...
2020-06-06 18:54:15
129.204.139.26 attackspambots
Jun  6 12:26:39 lnxmail61 sshd[32476]: Failed password for root from 129.204.139.26 port 44786 ssh2
Jun  6 12:29:25 lnxmail61 sshd[322]: Failed password for root from 129.204.139.26 port 46396 ssh2
2020-06-06 19:06:45
181.23.199.31 attackbots
Jun  6 06:13:43 debian-2gb-nbg1-2 kernel: \[13675573.796878\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=181.23.199.31 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=42 ID=9786 PROTO=TCP SPT=38525 DPT=23 WINDOW=34415 RES=0x00 SYN URGP=0
2020-06-06 19:15:03
106.54.127.78 attack
Jun  6 17:36:08 itv-usvr-02 sshd[30040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.127.78  user=root
Jun  6 17:40:11 itv-usvr-02 sshd[30243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.127.78  user=root
Jun  6 17:44:09 itv-usvr-02 sshd[30363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.127.78  user=root
2020-06-06 19:15:47
106.75.21.25 attackspam
Honeypot attack, port: 7, PTR: PTR record not found
2020-06-06 19:17:55
51.77.220.127 attackspambots
51.77.220.127 - - [06/Jun/2020:14:41:07 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-06-06 19:03:08
188.166.185.157 attack
Lines containing failures of 188.166.185.157
Jun  1 04:06:57 nexus sshd[14558]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.185.157  user=r.r
Jun  1 04:06:59 nexus sshd[14558]: Failed password for r.r from 188.166.185.157 port 34316 ssh2
Jun  1 04:06:59 nexus sshd[14558]: Received disconnect from 188.166.185.157 port 34316:11: Bye Bye [preauth]
Jun  1 04:06:59 nexus sshd[14558]: Disconnected from 188.166.185.157 port 34316 [preauth]
Jun  1 04:16:25 nexus sshd[14694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.185.157  user=r.r
Jun  1 04:16:27 nexus sshd[14694]: Failed password for r.r from 188.166.185.157 port 43776 ssh2
Jun  1 04:16:27 nexus sshd[14694]: Received disconnect from 188.166.185.157 port 43776:11: Bye Bye [preauth]
Jun  1 04:16:27 nexus sshd[14694]: Disconnected from 188.166.185.157 port 43776 [preauth]
Jun  1 04:20:26 nexus sshd[14740]: pam_unix(sshd:aut........
------------------------------
2020-06-06 18:59:39
106.12.175.226 attackspam
Lines containing failures of 106.12.175.226
Jun  5 02:13:06 neweola sshd[4298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.175.226  user=r.r
Jun  5 02:13:08 neweola sshd[4298]: Failed password for r.r from 106.12.175.226 port 38632 ssh2
Jun  5 02:13:11 neweola sshd[4298]: Received disconnect from 106.12.175.226 port 38632:11: Bye Bye [preauth]
Jun  5 02:13:11 neweola sshd[4298]: Disconnected from authenticating user r.r 106.12.175.226 port 38632 [preauth]
Jun  5 02:20:33 neweola sshd[4522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.175.226  user=r.r
Jun  5 02:20:35 neweola sshd[4522]: Failed password for r.r from 106.12.175.226 port 55634 ssh2
Jun  5 02:20:37 neweola sshd[4522]: Received disconnect from 106.12.175.226 port 55634:11: Bye Bye [preauth]
Jun  5 02:20:37 neweola sshd[4522]: Disconnected from authenticating user r.r 106.12.175.226 port 55634 [preauth]
Jun  ........
------------------------------
2020-06-06 18:47:08

Recently Reported IPs

117.200.148.133 2601:19c:8100:5190:3cea:bda5:7366:b8bb 209.97.138.50 8.10.75.51
124.238.31.225 156.253.15.251 2620:18c::209 35.203.211.20
46.30.213.183 49.7.227.204 2001:8a0:7f44:1400:3859:4338:143e:5753 176.11.51.212
20.169.107.208 117.31.157.228 245.27.40.199 10.128.8.11
185.235.47.255 185.189.114.170 65.49.192.21 147.185.133.40