Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.36.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16393
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.36.18.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:58:35 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 18.36.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.36.68.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.15.38.74 attackbotsspam
23/tcp
[2020-03-04]1pkt
2020-03-05 00:18:56
117.141.131.76 attackspam
suspicious action Wed, 04 Mar 2020 10:35:57 -0300
2020-03-05 00:22:24
113.172.212.176 attackspambots
suspicious action Wed, 04 Mar 2020 10:36:04 -0300
2020-03-05 00:10:27
220.88.1.208 attackspam
$f2bV_matches
2020-03-05 00:44:00
119.226.50.238 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-05 00:26:36
221.120.236.50 attack
$f2bV_matches
2020-03-05 00:26:10
93.136.81.70 attackspambots
88/tcp
[2020-03-04]1pkt
2020-03-05 00:47:39
183.134.90.250 attack
Mar  4 16:37:55 MK-Soft-VM6 sshd[20403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.134.90.250 
Mar  4 16:37:57 MK-Soft-VM6 sshd[20403]: Failed password for invalid user nexus from 183.134.90.250 port 58290 ssh2
...
2020-03-05 00:02:31
41.72.219.102 attackbotsspam
Mar  4 14:43:33 server sshd[158045]: Failed password for invalid user mongo from 41.72.219.102 port 44876 ssh2
Mar  4 15:22:39 server sshd[228266]: Failed password for invalid user oracle from 41.72.219.102 port 35882 ssh2
Mar  4 15:44:18 server sshd[267384]: Failed password for root from 41.72.219.102 port 45634 ssh2
2020-03-05 00:28:12
190.121.130.37 attackbotsspam
Mar  4 10:29:54 www sshd\[17932\]: Invalid user freakshowindustries from 190.121.130.37
Mar  4 10:33:47 www sshd\[18208\]: Invalid user oracle from 190.121.130.37
...
2020-03-05 00:31:34
95.110.154.101 attack
(sshd) Failed SSH login from 95.110.154.101 (IT/Italy/host101-154-110-95.serverdedicati.aruba.it): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar  4 14:35:55 ubnt-55d23 sshd[2686]: Invalid user dcc from 95.110.154.101 port 57974
Mar  4 14:35:57 ubnt-55d23 sshd[2686]: Failed password for invalid user dcc from 95.110.154.101 port 57974 ssh2
2020-03-05 00:19:17
85.243.30.11 attack
Telnet Server BruteForce Attack
2020-03-05 00:42:27
220.83.91.26 attack
$f2bV_matches
2020-03-05 00:48:32
221.124.17.233 attackbots
$f2bV_matches
2020-03-05 00:10:52
3.1.213.253 attackbotsspam
9200/tcp
[2020-03-04]1pkt
2020-03-05 00:08:08

Recently Reported IPs

138.68.37.51 138.68.39.112 138.68.37.53 138.68.38.150
138.68.44.205 138.68.47.16 138.68.45.120 138.68.44.164
138.68.40.123 138.68.49.108 138.68.5.118 138.68.4.189
138.68.5.187 138.68.51.125 138.68.5.228 138.68.50.15
138.68.51.67 138.68.52.143 138.68.55.125 138.68.59.23