Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Clara

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.68.246.71 attackspambots
138.68.246.71 - - [21/Sep/2020:16:11:10 +0200] "GET /wp-login.php HTTP/1.1" 200 8558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.246.71 - - [21/Sep/2020:16:11:17 +0200] "POST /wp-login.php HTTP/1.1" 200 8809 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.246.71 - - [21/Sep/2020:16:11:23 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-22 03:56:26
138.68.246.71 attackspam
xmlrpc attack
2020-09-21 19:45:20
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       138.68.0.0 - 138.68.255.255
CIDR:           138.68.0.0/16
NetName:        DIGITALOCEAN-138-68-0-0
NetHandle:      NET-138-68-0-0-1
Parent:         NET138 (NET-138-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   DigitalOcean, LLC (DO-13)
RegDate:        2016-01-26
Updated:        2025-03-01
Comment:        Routing and Peering Policy can be found at https://www.as14061.net
Comment:        
Comment:        Please submit abuse reports at https://www.digitalocean.com/company/contact/#abuse
Ref:            https://rdap.arin.net/registry/ip/138.68.0.0



OrgName:        DigitalOcean, LLC
OrgId:          DO-13
Address:        105 Edgeview Drive, Suite 425
City:           Broomfield
StateProv:      CO
PostalCode:     80021
Country:        US
RegDate:        2012-05-14
Updated:        2025-04-11
Ref:            https://rdap.arin.net/registry/entity/DO-13


OrgNOCHandle: NOC32014-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-646-827-4366 
OrgNOCEmail:  noc@digitalocean.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN

OrgAbuseHandle: DIGIT19-ARIN
OrgAbuseName:   DigitalOcean Abuse
OrgAbusePhone:  +1-646-827-4366 
OrgAbuseEmail:  abuse@digitalocean.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/DIGIT19-ARIN

OrgTechHandle: NOC32014-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-646-827-4366 
OrgTechEmail:  noc@digitalocean.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC32014-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.246.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.246.32.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042201 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 23 04:51:53 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 32.246.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 32.246.68.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.12.55.17 attack
8089/tcp 8089/tcp
[2020-06-23/08-11]2pkt
2020-08-12 07:30:15
51.68.91.191 attackbots
Aug 12 00:44:22 nextcloud sshd\[2319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.91.191  user=root
Aug 12 00:44:25 nextcloud sshd\[2319\]: Failed password for root from 51.68.91.191 port 53039 ssh2
Aug 12 00:48:03 nextcloud sshd\[5836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.91.191  user=root
2020-08-12 07:06:42
202.77.105.98 attack
Aug 12 00:21:39 v22019038103785759 sshd\[9041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.98  user=root
Aug 12 00:21:41 v22019038103785759 sshd\[9041\]: Failed password for root from 202.77.105.98 port 43146 ssh2
Aug 12 00:25:46 v22019038103785759 sshd\[9160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.98  user=root
Aug 12 00:25:48 v22019038103785759 sshd\[9160\]: Failed password for root from 202.77.105.98 port 52976 ssh2
Aug 12 00:29:59 v22019038103785759 sshd\[9245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.77.105.98  user=root
...
2020-08-12 07:25:58
194.15.36.19 attack
Invalid user oracle from 194.15.36.19 port 57448
2020-08-12 07:13:03
91.240.118.113 attack
3394/tcp 3399/tcp 3395/tcp...
[2020-06-17/08-11]327pkt,14pt.(tcp)
2020-08-12 07:00:28
175.24.16.135 attack
Aug 11 20:52:28 game-panel sshd[32759]: Failed password for root from 175.24.16.135 port 36974 ssh2
Aug 11 20:56:26 game-panel sshd[487]: Failed password for root from 175.24.16.135 port 51642 ssh2
2020-08-12 07:17:36
184.105.247.208 attack
548/tcp 7547/tcp 3389/tcp...
[2020-06-13/08-11]31pkt,14pt.(tcp),1pt.(udp)
2020-08-12 06:56:54
36.111.47.193 attackbotsspam
12166/tcp 10456/tcp 2733/tcp...
[2020-06-23/08-11]14pkt,13pt.(tcp)
2020-08-12 07:05:26
213.231.157.40 attackspam
9530/tcp 9530/tcp 9530/tcp
[2020-08-09/11]3pkt
2020-08-12 07:12:13
122.51.69.116 attackspam
2020-08-11T01:49:56.870423perso.[domain] sshd[739174]: Failed password for root from 122.51.69.116 port 33274 ssh2 2020-08-11T01:53:43.114107perso.[domain] sshd[739216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.69.116 user=root 2020-08-11T01:53:45.325507perso.[domain] sshd[739216]: Failed password for root from 122.51.69.116 port 34802 ssh2 ...
2020-08-12 06:54:41
4.7.94.244 attackspambots
2020-08-11T18:30:38.4541591495-001 sshd[38047]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.7.94.244  user=root
2020-08-11T18:30:40.5250351495-001 sshd[38047]: Failed password for root from 4.7.94.244 port 39016 ssh2
2020-08-11T18:34:28.3400201495-001 sshd[38229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.7.94.244  user=root
2020-08-11T18:34:30.3203771495-001 sshd[38229]: Failed password for root from 4.7.94.244 port 49698 ssh2
2020-08-11T18:38:13.8634781495-001 sshd[38393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=4.7.94.244  user=root
2020-08-11T18:38:15.7332321495-001 sshd[38393]: Failed password for root from 4.7.94.244 port 60378 ssh2
...
2020-08-12 07:20:24
23.228.89.34 attackspambots
1433/tcp 1433/tcp 1433/tcp...
[2020-06-15/08-11]10pkt,1pt.(tcp)
2020-08-12 07:15:52
124.156.62.201 attackbots
7777/tcp 9600/tcp 1503/tcp...
[2020-07-01/08-11]4pkt,4pt.(tcp)
2020-08-12 07:11:16
141.98.10.197 attackspambots
Aug 12 06:05:51 itv-usvr-02 sshd[29444]: Invalid user admin from 141.98.10.197 port 33417
2020-08-12 07:21:07
104.206.128.74 attack
5432/tcp 3389/tcp 1433/tcp...
[2020-06-11/08-11]23pkt,15pt.(tcp),1pt.(udp)
2020-08-12 07:02:48

Recently Reported IPs

14.213.49.108 81.71.34.249 160.119.76.24 67.210.97.34
54.147.211.146 110.77.187.94 2606:4700:10::6814:9880 2606:4700:10::6816:357
2606:4700:10::ac43:599 2606:4700:10::6814:6021 120.55.64.150 39.71.178.12
211.90.113.244 183.252.162.93 1.30.27.138 124.89.62.14
123.163.229.19 123.155.165.154 123.13.13.73 121.10.180.21