Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.147.81
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.147.81.			IN	A

;; AUTHORITY SECTION:
.			493	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 07:07:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
81.147.68.138.in-addr.arpa domain name pointer coarse.9550009999.dtp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
81.147.68.138.in-addr.arpa	name = coarse.9550009999.dtp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.91.86.28 attackspambots
Jun 18 17:13:29 Ubuntu-1404-trusty-64-minimal sshd\[20130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.91.86.28  user=root
Jun 18 17:13:31 Ubuntu-1404-trusty-64-minimal sshd\[20130\]: Failed password for root from 201.91.86.28 port 2415 ssh2
Jun 18 17:21:26 Ubuntu-1404-trusty-64-minimal sshd\[11166\]: Invalid user user from 201.91.86.28
Jun 18 17:21:26 Ubuntu-1404-trusty-64-minimal sshd\[11166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.91.86.28
Jun 18 17:21:28 Ubuntu-1404-trusty-64-minimal sshd\[11166\]: Failed password for invalid user user from 201.91.86.28 port 14275 ssh2
2020-06-18 23:32:18
157.245.211.120 attack
$f2bV_matches
2020-06-18 22:46:10
200.236.117.104 attackbotsspam
Automatic report - Port Scan Attack
2020-06-18 23:21:26
91.121.91.82 attack
Jun 18 17:17:46 server sshd[18161]: Failed password for invalid user vz from 91.121.91.82 port 39830 ssh2
Jun 18 17:24:17 server sshd[24370]: Failed password for root from 91.121.91.82 port 44992 ssh2
Jun 18 17:27:24 server sshd[27229]: Failed password for invalid user kcc from 91.121.91.82 port 44976 ssh2
2020-06-18 23:28:58
189.213.101.238 attackspam
Automatic report - Port Scan Attack
2020-06-18 23:34:25
115.159.153.180 attackspam
SSH Brute-Force reported by Fail2Ban
2020-06-18 23:09:09
201.179.195.33 attack
Jun 18 13:37:10 h2034429 sshd[10911]: Invalid user tg from 201.179.195.33
Jun 18 13:37:10 h2034429 sshd[10911]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.179.195.33
Jun 18 13:37:12 h2034429 sshd[10911]: Failed password for invalid user tg from 201.179.195.33 port 44102 ssh2
Jun 18 13:37:12 h2034429 sshd[10911]: Received disconnect from 201.179.195.33 port 44102:11: Bye Bye [preauth]
Jun 18 13:37:12 h2034429 sshd[10911]: Disconnected from 201.179.195.33 port 44102 [preauth]
Jun 18 13:41:05 h2034429 sshd[10982]: Invalid user israel from 201.179.195.33
Jun 18 13:41:05 h2034429 sshd[10982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.179.195.33
Jun 18 13:41:07 h2034429 sshd[10982]: Failed password for invalid user israel from 201.179.195.33 port 41118 ssh2
Jun 18 13:41:07 h2034429 sshd[10982]: Received disconnect from 201.179.195.33 port 41118:11: Bye Bye [preauth]
Jun 18 13:41........
-------------------------------
2020-06-18 23:24:07
186.228.221.176 attackbots
SSH login attempts.
2020-06-18 23:28:28
46.238.53.245 attackspambots
Jun 18 14:20:21 h2779839 sshd[20063]: Invalid user site from 46.238.53.245 port 50240
Jun 18 14:20:21 h2779839 sshd[20063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.238.53.245
Jun 18 14:20:21 h2779839 sshd[20063]: Invalid user site from 46.238.53.245 port 50240
Jun 18 14:20:23 h2779839 sshd[20063]: Failed password for invalid user site from 46.238.53.245 port 50240 ssh2
Jun 18 14:23:32 h2779839 sshd[20137]: Invalid user sergio from 46.238.53.245 port 48952
Jun 18 14:23:32 h2779839 sshd[20137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.238.53.245
Jun 18 14:23:32 h2779839 sshd[20137]: Invalid user sergio from 46.238.53.245 port 48952
Jun 18 14:23:34 h2779839 sshd[20137]: Failed password for invalid user sergio from 46.238.53.245 port 48952 ssh2
Jun 18 14:26:49 h2779839 sshd[20226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.238.53.245  user=ro
...
2020-06-18 22:46:54
54.37.149.233 attack
$f2bV_matches
2020-06-18 23:14:08
183.89.229.137 attackspam
2020-06-18T15:07:30.118061mail1.gph.lt auth[37908]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=junkowxd@stepracing.lt rhost=183.89.229.137
...
2020-06-18 23:01:36
144.168.199.71 attackspambots
Spammer
2020-06-18 23:03:05
112.215.113.10 attackbotsspam
Jun 18 14:07:46 zulu412 sshd\[752\]: Invalid user b2 from 112.215.113.10 port 47025
Jun 18 14:07:46 zulu412 sshd\[752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.215.113.10
Jun 18 14:07:48 zulu412 sshd\[752\]: Failed password for invalid user b2 from 112.215.113.10 port 47025 ssh2
...
2020-06-18 22:45:11
106.12.161.118 attackspambots
Jun 18 14:07:45 nextcloud sshd\[16957\]: Invalid user ftp from 106.12.161.118
Jun 18 14:07:45 nextcloud sshd\[16957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.161.118
Jun 18 14:07:47 nextcloud sshd\[16957\]: Failed password for invalid user ftp from 106.12.161.118 port 55310 ssh2
2020-06-18 22:45:27
123.31.32.150 attackbotsspam
Jun 18 16:42:24 vps647732 sshd[13853]: Failed password for root from 123.31.32.150 port 42964 ssh2
Jun 18 16:45:40 vps647732 sshd[13974]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.31.32.150
...
2020-06-18 22:57:25

Recently Reported IPs

138.68.137.28 138.68.145.117 138.68.145.240 138.68.15.100
138.68.150.42 138.68.156.129 138.68.164.157 138.68.172.53
138.68.179.39 138.68.176.214 138.68.184.136 138.68.224.129
138.68.73.237 138.68.79.170 138.68.95.21 138.68.95.112
138.68.60.138 138.88.169.37 138.94.30.196 138.94.84.32