Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Clara

Region: California

Country: United States

Internet Service Provider: DigitalOcean LLC

Hostname: unknown

Organization: DigitalOcean, LLC

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
2020-05-28T00:37:16.710772hessvillage.com sshd\[15279\]: Invalid user 987456321 from 138.68.57.194
2020-05-28T00:39:41.488181hessvillage.com sshd\[15283\]: Invalid user 987456321 from 138.68.57.194
2020-05-28T00:42:09.221948hessvillage.com sshd\[15294\]: Invalid user 987456321 from 138.68.57.194
2020-05-28T00:44:29.266230hessvillage.com sshd\[15297\]: Invalid user sammy from 138.68.57.194
2020-05-28T00:47:08.525522hessvillage.com sshd\[15307\]: Invalid user sammy from 138.68.57.194
...
2020-05-28 18:01:09
attack
Sep  6 18:22:26 game-panel sshd[28940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.194
Sep  6 18:22:28 game-panel sshd[28940]: Failed password for invalid user bevs from 138.68.57.194 port 46472 ssh2
Sep  6 18:29:18 game-panel sshd[29155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.194
2019-09-07 02:33:30
attackbotsspam
Aug 17 18:35:13 localhost sshd\[18915\]: Invalid user audrey from 138.68.57.194 port 54556
Aug 17 18:35:13 localhost sshd\[18915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.194
Aug 17 18:35:15 localhost sshd\[18915\]: Failed password for invalid user audrey from 138.68.57.194 port 54556 ssh2
...
2019-08-18 02:57:12
attackbots
Aug 14 12:55:52 thevastnessof sshd[3109]: Failed password for invalid user vsezahost from 138.68.57.194 port 46042 ssh2
Aug 14 13:11:51 thevastnessof sshd[3326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.194
...
2019-08-14 21:23:45
attack
Aug 14 12:21:34 thevastnessof sshd[2743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.194
...
2019-08-14 20:22:26
attack
Aug 13 19:32:28 thevastnessof sshd[20924]: Failed password for invalid user antonio from 138.68.57.194 port 58836 ssh2
Aug 13 19:46:18 thevastnessof sshd[21117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.194
...
2019-08-14 03:55:06
attackbots
Aug  8 14:36:52 thevastnessof sshd[15476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.194
...
2019-08-08 22:44:40
attackspambots
Aug  8 11:10:02 thevastnessof sshd[11615]: Failed password for invalid user hand from 138.68.57.194 port 57152 ssh2
Aug  8 11:21:09 thevastnessof sshd[11814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.194
...
2019-08-08 19:35:17
Comments on same subnet:
IP Type Details Datetime
138.68.57.143 attackspambots
Exploited Host.
2020-07-26 02:41:26
138.68.57.143 attack
Invalid user webstaff from 138.68.57.143 port 53974
2020-05-23 12:16:18
138.68.57.143 attack
Invalid user lqr from 138.68.57.143 port 39488
2020-05-22 02:00:33
138.68.57.207 attackbots
138.68.57.207 - - [26/Apr/2020:05:56:10 +0200] "GET /wp-login.php HTTP/1.1" 200 5686 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.57.207 - - [26/Apr/2020:05:56:13 +0200] "POST /wp-login.php HTTP/1.1" 200 5937 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.57.207 - - [26/Apr/2020:05:56:14 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-26 12:50:39
138.68.57.207 attackbotsspam
138.68.57.207 - - [17/Apr/2020:22:50:40 +0200] "GET /wp-login.php HTTP/1.1" 200 6463 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.57.207 - - [17/Apr/2020:22:50:42 +0200] "POST /wp-login.php HTTP/1.1" 200 7362 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.57.207 - - [17/Apr/2020:22:50:44 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-18 05:14:46
138.68.57.207 attackbots
CMS (WordPress or Joomla) login attempt.
2020-04-15 15:06:46
138.68.57.207 attackspam
Automatic report - XMLRPC Attack
2020-04-10 12:53:04
138.68.57.207 attackspam
xmlrpc attack
2020-04-03 00:50:30
138.68.57.207 attackspam
BURG,WP GET /wp-login.php
2020-03-13 22:35:18
138.68.57.207 attackspambots
138.68.57.207 - - [08/Jan/2020:09:48:40 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.57.207 - - [08/Jan/2020:09:48:41 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-08 20:14:41
138.68.57.207 attack
xmlrpc attack
2019-12-14 16:23:09
138.68.57.207 attackbotsspam
138.68.57.207 - - \[20/Nov/2019:22:06:41 +0100\] "POST /wp-login.php HTTP/1.0" 200 4404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.68.57.207 - - \[20/Nov/2019:22:06:44 +0100\] "POST /wp-login.php HTTP/1.0" 200 4236 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.68.57.207 - - \[20/Nov/2019:22:06:45 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-21 05:39:12
138.68.57.99 attackbots
Nov 18 21:15:04 venus sshd\[29451\]: Invalid user yellowst from 138.68.57.99 port 40374
Nov 18 21:15:04 venus sshd\[29451\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.57.99
Nov 18 21:15:06 venus sshd\[29451\]: Failed password for invalid user yellowst from 138.68.57.99 port 40374 ssh2
...
2019-11-19 06:21:10
138.68.57.207 attack
138.68.57.207 - - \[17/Nov/2019:07:29:39 +0100\] "POST /wp-login.php HTTP/1.0" 200 4404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.68.57.207 - - \[17/Nov/2019:07:29:42 +0100\] "POST /wp-login.php HTTP/1.0" 200 4236 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
138.68.57.207 - - \[17/Nov/2019:07:29:44 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-17 14:53:48
138.68.57.99 attackspam
Invalid user smmsp from 138.68.57.99 port 60556
2019-11-14 07:33:13
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.57.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39156
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;138.68.57.194.			IN	A

;; AUTHORITY SECTION:
.			3056	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041701 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 18 03:51:00 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 194.57.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 194.57.68.138.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
179.233.31.10 attack
Aug 13 14:50:59 XXX sshd[53995]: Invalid user demuji from 179.233.31.10 port 22444
2019-08-14 02:27:22
79.175.42.221 attackspambots
Aug 13 21:24:47 yabzik sshd[22559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.175.42.221
Aug 13 21:24:49 yabzik sshd[22559]: Failed password for invalid user spamd from 79.175.42.221 port 57588 ssh2
Aug 13 21:29:58 yabzik sshd[24268]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.175.42.221
2019-08-14 02:34:08
190.64.137.171 attack
Aug 13 19:21:03 webhost01 sshd[30277]: Failed password for root from 190.64.137.171 port 49714 ssh2
...
2019-08-14 02:18:45
201.248.90.19 attackspam
SSH Brute-Force attacks
2019-08-14 02:08:13
128.199.47.148 attackspam
Aug 13 14:45:55 XXX sshd[53399]: Invalid user ylikool from 128.199.47.148 port 60122
2019-08-14 02:31:58
201.247.151.51 attack
*Port Scan* detected from 201.247.151.51 (SV/El Salvador/-). 4 hits in the last 0 seconds
2019-08-14 02:19:42
139.199.248.153 attackbotsspam
Aug 13 10:33:44 localhost sshd\[315\]: Invalid user dmin from 139.199.248.153
Aug 13 10:33:44 localhost sshd\[315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.153
Aug 13 10:33:46 localhost sshd\[315\]: Failed password for invalid user dmin from 139.199.248.153 port 55852 ssh2
Aug 13 10:38:27 localhost sshd\[712\]: Invalid user apple from 139.199.248.153
Aug 13 10:38:27 localhost sshd\[712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.248.153
...
2019-08-14 01:51:08
37.28.240.1 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-14 01:41:40
148.70.100.235 attackspam
Aug 13 21:05:11 www sshd\[21187\]: Invalid user sun from 148.70.100.235Aug 13 21:05:14 www sshd\[21187\]: Failed password for invalid user sun from 148.70.100.235 port 49648 ssh2Aug 13 21:11:43 www sshd\[21395\]: Invalid user racquel from 148.70.100.235
...
2019-08-14 02:20:23
147.91.71.165 attackspambots
Aug 13 19:11:42 mail sshd\[16748\]: Failed password for invalid user test1 from 147.91.71.165 port 53600 ssh2
Aug 13 19:29:56 mail sshd\[16936\]: Invalid user deploy from 147.91.71.165 port 39576
...
2019-08-14 02:33:38
142.93.198.152 attackbots
Aug 13 14:45:00 XXX sshd[53289]: Invalid user eliane from 142.93.198.152 port 44144
2019-08-14 01:52:32
80.234.44.81 attack
Automatic report - SSH Brute-Force Attack
2019-08-14 02:13:50
34.87.125.104 attackspam
Aug 13 08:23:57 xtremcommunity sshd\[30598\]: Invalid user postgres from 34.87.125.104 port 38892
Aug 13 08:23:57 xtremcommunity sshd\[30598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.125.104
Aug 13 08:23:59 xtremcommunity sshd\[30598\]: Failed password for invalid user postgres from 34.87.125.104 port 38892 ssh2
Aug 13 08:29:42 xtremcommunity sshd\[30890\]: Invalid user server from 34.87.125.104 port 33058
Aug 13 08:29:42 xtremcommunity sshd\[30890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.87.125.104
...
2019-08-14 02:05:57
51.255.234.209 attackspambots
Aug 13 14:13:38 SilenceServices sshd[16637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.234.209
Aug 13 14:13:40 SilenceServices sshd[16637]: Failed password for invalid user musikbot from 51.255.234.209 port 54250 ssh2
Aug 13 14:18:36 SilenceServices sshd[20713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.234.209
2019-08-14 02:05:22
202.84.37.51 attackspam
$f2bV_matches
2019-08-14 01:45:36

Recently Reported IPs

94.21.241.37 120.138.19.194 93.66.56.27 13.251.22.128
185.117.75.163 186.77.199.246 45.32.191.29 39.120.13.73
117.50.48.21 59.57.162.39 221.230.53.77 147.30.219.114
31.184.248.154 186.251.59.82 177.36.58.5 96.78.175.36
140.143.235.12 39.57.147.50 24.232.210.224 81.130.161.44