Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.68.44.55 attackspam
2020-10-08T02:17:38.530793hostname sshd[32013]: Failed password for root from 138.68.44.55 port 50230 ssh2
2020-10-08T02:20:50.966324hostname sshd[821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55  user=root
2020-10-08T02:20:53.269048hostname sshd[821]: Failed password for root from 138.68.44.55 port 47628 ssh2
...
2020-10-08 05:19:31
138.68.44.55 attack
$f2bV_matches
2020-10-07 21:43:18
138.68.44.55 attackspambots
Oct  7 03:19:27 ns382633 sshd\[23310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55  user=root
Oct  7 03:19:29 ns382633 sshd\[23310\]: Failed password for root from 138.68.44.55 port 34600 ssh2
Oct  7 03:32:01 ns382633 sshd\[25022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55  user=root
Oct  7 03:32:03 ns382633 sshd\[25022\]: Failed password for root from 138.68.44.55 port 47152 ssh2
Oct  7 03:36:05 ns382633 sshd\[25759\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55  user=root
2020-10-07 13:30:05
138.68.44.55 attackspam
2020-09-24T14:54:46.390798devel sshd[27891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55
2020-09-24T14:54:46.385075devel sshd[27891]: Invalid user arief from 138.68.44.55 port 52716
2020-09-24T14:54:48.629319devel sshd[27891]: Failed password for invalid user arief from 138.68.44.55 port 52716 ssh2
2020-09-25 03:49:45
138.68.44.55 attackbots
Sep 24 05:23:45 firewall sshd[25140]: Invalid user Administrator from 138.68.44.55
Sep 24 05:23:48 firewall sshd[25140]: Failed password for invalid user Administrator from 138.68.44.55 port 60244 ssh2
Sep 24 05:28:19 firewall sshd[25293]: Invalid user user from 138.68.44.55
...
2020-09-24 19:36:58
138.68.44.55 attack
(sshd) Failed SSH login from 138.68.44.55 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 15 06:53:46 optimus sshd[19869]: Invalid user mcserver from 138.68.44.55
Sep 15 06:53:46 optimus sshd[19869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55 
Sep 15 06:53:48 optimus sshd[19869]: Failed password for invalid user mcserver from 138.68.44.55 port 58078 ssh2
Sep 15 06:57:43 optimus sshd[21202]: Invalid user alfred from 138.68.44.55
Sep 15 06:57:43 optimus sshd[21202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55
2020-09-15 20:27:52
138.68.44.55 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-15 12:29:30
138.68.44.55 attack
$f2bV_matches
2020-09-15 04:38:59
138.68.44.55 attack
Sep  9 03:41:43 web9 sshd\[8545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55  user=root
Sep  9 03:41:46 web9 sshd\[8545\]: Failed password for root from 138.68.44.55 port 33664 ssh2
Sep  9 03:45:32 web9 sshd\[8965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55  user=root
Sep  9 03:45:33 web9 sshd\[8965\]: Failed password for root from 138.68.44.55 port 39214 ssh2
Sep  9 03:49:22 web9 sshd\[9395\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55  user=root
2020-09-09 21:52:14
138.68.44.55 attack
2020-09-09T11:17:06.575198paragon sshd[259184]: Failed password for invalid user conter from 138.68.44.55 port 36638 ssh2
2020-09-09T11:20:48.403075paragon sshd[259393]: Invalid user admin from 138.68.44.55 port 42688
2020-09-09T11:20:48.407403paragon sshd[259393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55
2020-09-09T11:20:48.403075paragon sshd[259393]: Invalid user admin from 138.68.44.55 port 42688
2020-09-09T11:20:50.465369paragon sshd[259393]: Failed password for invalid user admin from 138.68.44.55 port 42688 ssh2
...
2020-09-09 15:40:20
138.68.44.55 attackbotsspam
Lines containing failures of 138.68.44.55 (max 1000)
Sep  7 02:33:56 archiv sshd[5814]: Invalid user sogo from 138.68.44.55 port 60232
Sep  7 02:33:56 archiv sshd[5814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55
Sep  7 02:33:58 archiv sshd[5814]: Failed password for invalid user sogo from 138.68.44.55 port 60232 ssh2
Sep  7 02:33:58 archiv sshd[5814]: Received disconnect from 138.68.44.55 port 60232:11: Bye Bye [preauth]
Sep  7 02:33:58 archiv sshd[5814]: Disconnected from 138.68.44.55 port 60232 [preauth]
Sep  7 02:39:20 archiv sshd[5842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.44.55  user=r.r
Sep  7 02:39:21 archiv sshd[5842]: Failed password for r.r from 138.68.44.55 port 46094 ssh2
Sep  7 02:39:21 archiv sshd[5842]: Received disconnect from 138.68.44.55 port 46094:11: Bye Bye [preauth]
Sep  7 02:39:21 archiv sshd[5842]: Disconnected from 138.68.44.55 por........
------------------------------
2020-09-09 07:49:33
138.68.44.204 attackbotsspam
xmlrpc attack
2020-08-08 08:28:06
138.68.44.236 attackbots
Invalid user chenyu from 138.68.44.236 port 54320
2020-07-27 07:21:00
138.68.44.236 attackspambots
$f2bV_matches
2020-07-24 21:23:32
138.68.44.236 attackspambots
Invalid user carla from 138.68.44.236 port 46422
2020-07-18 23:13:46
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.44.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25990
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.44.205.			IN	A

;; AUTHORITY SECTION:
.			455	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 11:58:37 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 205.44.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 205.44.68.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
149.56.44.101 attack
Oct  6 17:38:10 kapalua sshd\[4166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net  user=root
Oct  6 17:38:13 kapalua sshd\[4166\]: Failed password for root from 149.56.44.101 port 47944 ssh2
Oct  6 17:42:11 kapalua sshd\[4676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net  user=root
Oct  6 17:42:12 kapalua sshd\[4676\]: Failed password for root from 149.56.44.101 port 59834 ssh2
Oct  6 17:46:08 kapalua sshd\[5041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net  user=root
2019-10-07 17:30:51
176.10.107.180 attackspambots
www.blogonese.net 176.10.107.180 \[07/Oct/2019:05:45:45 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 493 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_13_4\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/68.0.3440.106 Safari/537.36"
blogonese.net 176.10.107.180 \[07/Oct/2019:05:45:46 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 3777 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_13_4\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/68.0.3440.106 Safari/537.36"
2019-10-07 17:40:35
89.35.39.180 attackspambots
BURG,WP GET /wp-login.php?5=525599
2019-10-07 17:59:06
77.40.11.88 attack
10/07/2019-11:28:12.500385 77.40.11.88 Protocol: 6 SURICATA SMTP tls rejected
2019-10-07 17:58:38
191.83.228.27 attackspam
Unauthorised access (Oct  7) SRC=191.83.228.27 LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=44331 TCP DPT=8080 WINDOW=25389 SYN
2019-10-07 17:35:51
89.40.122.128 attackspambots
Oct  7 11:40:32 meumeu sshd[20176]: Failed password for root from 89.40.122.128 port 57010 ssh2
Oct  7 11:44:07 meumeu sshd[20704]: Failed password for root from 89.40.122.128 port 41198 ssh2
...
2019-10-07 17:47:55
88.220.43.198 attackbotsspam
2019-10-06 22:45:07 H=(lolafitness.it) [88.220.43.198]:58959 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/query/ip/88.220.43.198)
2019-10-06 22:45:07 H=(lolafitness.it) [88.220.43.198]:58959 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-10-06 22:45:07 H=(lolafitness.it) [88.220.43.198]:58959 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/sbl/query/SBLCSS)
...
2019-10-07 18:04:48
23.129.64.187 attackspam
SSH Bruteforce attack
2019-10-07 17:18:56
196.38.70.24 attackbotsspam
2019-10-07T08:17:48.509917homeassistant sshd[16473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.38.70.24  user=root
2019-10-07T08:17:50.668741homeassistant sshd[16473]: Failed password for root from 196.38.70.24 port 28044 ssh2
...
2019-10-07 17:20:16
185.85.238.244 attack
Attempted WordPress login: "GET /wp-login.php"
2019-10-07 17:28:00
138.68.4.198 attack
Oct  6 23:38:18 xtremcommunity sshd\[265648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198  user=root
Oct  6 23:38:20 xtremcommunity sshd\[265648\]: Failed password for root from 138.68.4.198 port 50402 ssh2
Oct  6 23:42:14 xtremcommunity sshd\[265765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198  user=root
Oct  6 23:42:16 xtremcommunity sshd\[265765\]: Failed password for root from 138.68.4.198 port 33358 ssh2
Oct  6 23:46:14 xtremcommunity sshd\[265864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198  user=root
...
2019-10-07 17:27:47
68.47.224.14 attack
Oct  7 08:36:50 dedicated sshd[12361]: Invalid user qwe123!@# from 68.47.224.14 port 52498
2019-10-07 17:30:00
123.20.3.193 attack
Chat Spam
2019-10-07 18:02:48
121.46.93.230 attackbotsspam
2019-10-07T10:39:49.394689stark.klein-stark.info sshd\[26207\]: Invalid user admin from 121.46.93.230 port 36470
2019-10-07T10:39:49.400125stark.klein-stark.info sshd\[26207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.46.93.230
2019-10-07T10:39:50.909993stark.klein-stark.info sshd\[26207\]: Failed password for invalid user admin from 121.46.93.230 port 36470 ssh2
...
2019-10-07 17:25:21
121.27.57.251 attackspambots
Unauthorised access (Oct  7) SRC=121.27.57.251 LEN=40 TTL=49 ID=24854 TCP DPT=8080 WINDOW=12092 SYN 
Unauthorised access (Oct  7) SRC=121.27.57.251 LEN=40 TTL=49 ID=30922 TCP DPT=8080 WINDOW=15944 SYN 
Unauthorised access (Oct  7) SRC=121.27.57.251 LEN=40 TTL=49 ID=22031 TCP DPT=8080 WINDOW=57836 SYN 
Unauthorised access (Oct  6) SRC=121.27.57.251 LEN=40 TTL=49 ID=24503 TCP DPT=8080 WINDOW=12092 SYN 
Unauthorised access (Oct  6) SRC=121.27.57.251 LEN=40 TTL=49 ID=63019 TCP DPT=8080 WINDOW=12092 SYN
2019-10-07 18:04:34

Recently Reported IPs

138.68.38.150 138.68.47.16 138.68.45.120 138.68.44.164
138.68.40.123 138.68.49.108 138.68.5.118 138.68.4.189
138.68.5.187 138.68.51.125 138.68.5.228 138.68.50.15
138.68.51.67 138.68.52.143 138.68.55.125 138.68.59.23
138.68.6.130 138.68.56.0 138.68.60.208 138.68.61.230