Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Scanning random ports - tries to find possible vulnerable services
2019-09-01 16:44:53
attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-31 07:02:04
Comments on same subnet:
IP Type Details Datetime
138.68.212.139 attackbots
" "
2019-11-29 08:49:47
138.68.212.45 attackspam
Mozilla/5.0 zgrab/0.x
2019-11-22 22:48:08
138.68.212.139 attackbots
port scan and connect, tcp 443 (https)
2019-11-10 21:03:29
138.68.212.113 attackspambots
Honeypot hit.
2019-11-10 01:07:35
138.68.212.139 attackspam
138.68.212.139 was recorded 5 times by 5 hosts attempting to connect to the following ports: 1028. Incident counter (4h, 24h, all-time): 5, 16, 23
2019-11-09 22:03:05
138.68.212.45 attackspam
Connection by 138.68.212.45 on port: 10009 got caught by honeypot at 11/8/2019 10:05:03 AM
2019-11-08 21:20:49
138.68.212.113 attackbotsspam
179/tcp 1433/tcp 5060/udp...
[2019-09-02/10-31]51pkt,43pt.(tcp),4pt.(udp)
2019-11-02 19:20:16
138.68.212.45 attackbotsspam
53169/tcp 49738/tcp 8118/tcp...
[2019-08-31/10-30]49pkt,37pt.(tcp),3pt.(udp)
2019-10-31 01:38:00
138.68.212.139 attack
firewall-block, port(s): 990/tcp
2019-10-14 16:56:22
138.68.212.113 attack
firewall-block, port(s): 465/tcp
2019-10-03 02:45:27
138.68.212.45 attackspam
port scan and connect, tcp 22 (ssh)
2019-09-27 14:35:48
138.68.212.45 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-09-13 12:22:35
138.68.212.185 attackbotsspam
" "
2019-09-06 04:29:10
138.68.212.207 attackbotsspam
2525/tcp 8443/tcp 5902/tcp...
[2019-08-29/09-05]7pkt,7pt.(tcp)
2019-09-05 22:31:56
138.68.212.210 attackbotsspam
Honeypot hit, critical abuseConfidenceScore, incoming Traffic from this IP
2019-09-04 02:34:53
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.212.178
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64297
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.68.212.178.			IN	A

;; AUTHORITY SECTION:
.			2464	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019083001 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 31 07:01:59 CST 2019
;; MSG SIZE  rcvd: 118
Host info
178.212.68.138.in-addr.arpa domain name pointer zg-0829b-27.stretchoid.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
178.212.68.138.in-addr.arpa	name = zg-0829b-27.stretchoid.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.198.148.255 attack
Unauthorized connection attempt detected from IP address 46.198.148.255 to port 88 [J]
2020-03-02 20:41:12
61.148.238.4 attack
Unauthorized connection attempt detected from IP address 61.148.238.4 to port 1433 [J]
2020-03-02 21:11:34
114.32.96.81 attackbots
Unauthorized connection attempt detected from IP address 114.32.96.81 to port 23 [J]
2020-03-02 21:03:43
37.54.209.249 attackbots
Unauthorized connection attempt detected from IP address 37.54.209.249 to port 23 [J]
2020-03-02 20:42:40
5.64.136.227 attackbots
Unauthorized connection attempt detected from IP address 5.64.136.227 to port 4567 [J]
2020-03-02 20:44:07
112.66.107.70 attack
Unauthorized connection attempt detected from IP address 112.66.107.70 to port 8082 [J]
2020-03-02 20:34:45
211.230.196.24 attackbots
Unauthorized connection attempt detected from IP address 211.230.196.24 to port 5555 [J]
2020-03-02 20:52:06
201.170.62.73 attack
Unauthorized connection attempt detected from IP address 201.170.62.73 to port 80 [J]
2020-03-02 20:52:27
103.70.167.213 attack
Unauthorized connection attempt detected from IP address 103.70.167.213 to port 1433 [J]
2020-03-02 20:38:01
111.220.89.192 attack
Unauthorized connection attempt detected from IP address 111.220.89.192 to port 8080 [J]
2020-03-02 20:35:45
58.153.62.228 attack
Unauthorized connection attempt detected from IP address 58.153.62.228 to port 5555 [J]
2020-03-02 21:12:22
80.99.58.64 attackspam
Honeypot attack, port: 81, PTR: catv-80-99-58-64.catv.broadband.hu.
2020-03-02 21:07:58
159.192.159.227 attack
Unauthorized connection attempt detected from IP address 159.192.159.227 to port 8080 [J]
2020-03-02 20:57:11
139.59.25.248 attack
[munged]::443 139.59.25.248 - - [02/Mar/2020:05:57:19 +0100] "POST /[munged]: HTTP/1.1" 200 6016 "-" "-"
[munged]::443 139.59.25.248 - - [02/Mar/2020:05:57:34 +0100] "POST /[munged]: HTTP/1.1" 200 6016 "-" "-"
2020-03-02 20:30:48
95.172.47.108 attack
Unauthorized connection attempt detected from IP address 95.172.47.108 to port 8080 [J]
2020-03-02 20:39:32

Recently Reported IPs

143.137.5.105 41.200.247.67 13.229.198.198 5.8.16.236
179.110.173.224 108.235.163.23 110.112.23.104 180.166.45.146
137.110.172.168 185.233.246.14 190.24.142.90 178.62.236.70
129.28.61.66 45.12.220.233 141.126.127.123 106.12.113.223
183.166.99.123 150.107.0.54 45.95.33.220 219.119.75.182