Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.66.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.66.43.			IN	A

;; AUTHORITY SECTION:
.			596	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 04:04:32 CST 2022
;; MSG SIZE  rcvd: 105
Host info
43.66.68.138.in-addr.arpa domain name pointer utify.io.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
43.66.68.138.in-addr.arpa	name = utify.io.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.143.57.159 attack
Invalid user vinay from 140.143.57.159 port 51108
2020-01-19 21:52:26
112.3.30.47 attackspam
Invalid user admin from 112.3.30.47 port 59710
2020-01-19 21:36:31
222.186.30.209 attackbotsspam
01/19/2020-09:00:05.591377 222.186.30.209 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-19 22:04:13
60.2.10.86 attackbotsspam
Invalid user git from 60.2.10.86 port 44363
2020-01-19 21:43:09
202.102.79.232 attackspambots
Invalid user he from 202.102.79.232 port 26579
2020-01-19 21:48:28
157.230.244.13 attackbotsspam
Jan 19 12:58:57 localhost sshd\[17417\]: Invalid user kids from 157.230.244.13 port 37508
Jan 19 12:58:57 localhost sshd\[17417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.244.13
Jan 19 12:58:59 localhost sshd\[17417\]: Failed password for invalid user kids from 157.230.244.13 port 37508 ssh2
...
2020-01-19 21:51:01
118.34.37.145 attackbotsspam
Unauthorized connection attempt detected from IP address 118.34.37.145 to port 2220 [J]
2020-01-19 21:33:03
113.160.178.148 attack
Invalid user admin from 113.160.178.148 port 50078
2020-01-19 21:35:01
120.132.116.86 attackbots
Invalid user ubuntu from 120.132.116.86 port 56606
2020-01-19 21:53:49
118.184.168.118 attackspambots
Invalid user telecomadmin from 118.184.168.118 port 40034
2020-01-19 21:32:17
110.137.125.67 attackbots
Unauthorized connection attempt from IP address 110.137.125.67 on Port 445(SMB)
2020-01-19 22:01:48
87.81.169.74 attackbotsspam
Jan 19 14:25:45 mail sshd[5746]: Invalid user carlos from 87.81.169.74
Jan 19 14:25:45 mail sshd[5746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.81.169.74
Jan 19 14:25:45 mail sshd[5746]: Invalid user carlos from 87.81.169.74
Jan 19 14:25:46 mail sshd[5746]: Failed password for invalid user carlos from 87.81.169.74 port 47766 ssh2
Jan 19 14:26:36 mail sshd[5868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.81.169.74  user=debian-spamd
Jan 19 14:26:38 mail sshd[5868]: Failed password for debian-spamd from 87.81.169.74 port 58708 ssh2
...
2020-01-19 21:40:51
103.206.57.18 attackbots
Unauthorized connection attempt detected from IP address 103.206.57.18 to port 22 [J]
2020-01-19 21:39:17
144.34.253.93 attackbots
Failed password for root from 144.34.253.93 port 42354 ssh2
Invalid user admin from 144.34.253.93 port 59068
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.34.253.93
Failed password for invalid user admin from 144.34.253.93 port 59068 ssh2
Invalid user admin from 144.34.253.93 port 47548
2020-01-19 22:01:11
101.255.52.171 attackbots
Invalid user hjw from 101.255.52.171 port 43664
2020-01-19 21:39:47

Recently Reported IPs

138.68.69.41 138.68.71.139 138.68.71.132 138.68.75.9
138.68.73.116 138.68.7.101 138.68.76.251 138.68.8.41
138.68.82.240 138.68.84.201 139.0.10.59 139.129.172.167
8.43.85.13 139.0.10.62 139.129.187.244 139.129.158.243
139.129.148.166 139.129.186.245 139.112.122.19 139.112.129.40