Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.68.67.96 attackbotsspam
Invalid user git4 from 138.68.67.96 port 46454
2020-10-04 07:07:16
138.68.67.96 attackspambots
Invalid user test7 from 138.68.67.96 port 37454
2020-10-03 23:20:36
138.68.67.96 attack
Invalid user git4 from 138.68.67.96 port 46454
2020-10-03 15:04:12
138.68.67.96 attackbots
Brute-force attempt banned
2020-09-18 21:25:38
138.68.67.96 attackbotsspam
Sep 18 05:35:45 localhost sshd[2140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96  user=root
Sep 18 05:35:48 localhost sshd[2140]: Failed password for root from 138.68.67.96 port 49328 ssh2
Sep 18 05:39:09 localhost sshd[2557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96  user=root
Sep 18 05:39:11 localhost sshd[2557]: Failed password for root from 138.68.67.96 port 53124 ssh2
Sep 18 05:42:28 localhost sshd[2948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96  user=root
Sep 18 05:42:31 localhost sshd[2948]: Failed password for root from 138.68.67.96 port 56920 ssh2
...
2020-09-18 13:44:25
138.68.67.96 attack
Sep 10 10:37:39 PorscheCustomer sshd[6691]: Failed password for root from 138.68.67.96 port 40782 ssh2
Sep 10 10:40:15 PorscheCustomer sshd[6708]: Failed password for root from 138.68.67.96 port 56292 ssh2
...
2020-09-11 00:12:12
138.68.67.96 attack
Sep 10 09:21:19 PorscheCustomer sshd[5577]: Failed password for root from 138.68.67.96 port 42574 ssh2
Sep 10 09:23:58 PorscheCustomer sshd[5605]: Failed password for root from 138.68.67.96 port 58084 ssh2
...
2020-09-10 15:35:52
138.68.67.96 attack
Sep  9 20:53:01 sso sshd[18621]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96
Sep  9 20:53:03 sso sshd[18621]: Failed password for invalid user vipvzlet from 138.68.67.96 port 46964 ssh2
...
2020-09-10 06:14:14
138.68.67.96 attackbotsspam
Aug 30 17:48:42 rancher-0 sshd[1359205]: Invalid user edwin123 from 138.68.67.96 port 38304
...
2020-08-31 01:47:43
138.68.67.96 attackbotsspam
Bruteforce detected by fail2ban
2020-08-26 01:07:12
138.68.67.96 attackbotsspam
SSH BruteForce Attack
2020-08-24 06:33:25
138.68.67.96 attackspambots
Aug 15 23:16:44 inter-technics sshd[3511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96  user=root
Aug 15 23:16:46 inter-technics sshd[3511]: Failed password for root from 138.68.67.96 port 55106 ssh2
Aug 15 23:20:12 inter-technics sshd[3722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96  user=root
Aug 15 23:20:14 inter-technics sshd[3722]: Failed password for root from 138.68.67.96 port 36600 ssh2
Aug 15 23:23:45 inter-technics sshd[3876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96  user=root
Aug 15 23:23:46 inter-technics sshd[3876]: Failed password for root from 138.68.67.96 port 46324 ssh2
...
2020-08-16 06:35:44
138.68.67.96 attackspambots
(sshd) Failed SSH login from 138.68.67.96 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 22 18:11:43 s1 sshd[32192]: Invalid user zf from 138.68.67.96 port 58014
Jul 22 18:11:45 s1 sshd[32192]: Failed password for invalid user zf from 138.68.67.96 port 58014 ssh2
Jul 22 18:24:44 s1 sshd[32749]: Invalid user jackpot from 138.68.67.96 port 42954
Jul 22 18:24:46 s1 sshd[32749]: Failed password for invalid user jackpot from 138.68.67.96 port 42954 ssh2
Jul 22 18:28:34 s1 sshd[472]: Invalid user denise from 138.68.67.96 port 56820
2020-07-23 00:01:04
138.68.67.96 attackspambots
Jul 16 06:38:15 lnxweb62 sshd[32103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.67.96
2020-07-16 13:39:34
138.68.67.173 attack
Mar 27 13:28:56 debian-2gb-nbg1-2 kernel: \[7571207.392477\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=138.68.67.173 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=44795 PROTO=TCP SPT=52329 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-28 04:31:50
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.67.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13025
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.67.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025070301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 04 08:30:55 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 34.67.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.67.68.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.31.118.113 attackbotsspam
[09/May/2020 x@x
[09/May/2020 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=193.31.118.113
2020-05-10 08:31:52
80.211.53.33 attack
May 10 05:56:49 prox sshd[30811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.53.33 
May 10 05:56:51 prox sshd[30811]: Failed password for invalid user lzj from 80.211.53.33 port 34764 ssh2
2020-05-10 12:21:46
114.67.74.139 attackspambots
May 10 05:59:32 piServer sshd[4838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.74.139 
May 10 05:59:34 piServer sshd[4838]: Failed password for invalid user wwwlogs from 114.67.74.139 port 60168 ssh2
May 10 06:08:13 piServer sshd[5586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.74.139 
...
2020-05-10 12:08:21
112.186.79.4 attackbots
2020-05-10T05:53:11.765738sd-86998 sshd[30683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.79.4  user=root
2020-05-10T05:53:13.439320sd-86998 sshd[30683]: Failed password for root from 112.186.79.4 port 56511 ssh2
2020-05-10T05:55:06.774182sd-86998 sshd[30957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.186.79.4  user=root
2020-05-10T05:55:09.235599sd-86998 sshd[30957]: Failed password for root from 112.186.79.4 port 40039 ssh2
2020-05-10T05:56:45.235684sd-86998 sshd[31131]: Invalid user admin from 112.186.79.4 port 50651
...
2020-05-10 12:25:51
51.91.11.62 attackbots
May  9 21:53:11 server1 sshd\[25576\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.11.62  user=root
May  9 21:53:13 server1 sshd\[25576\]: Failed password for root from 51.91.11.62 port 54236 ssh2
May  9 21:57:01 server1 sshd\[26797\]: Invalid user proxy1 from 51.91.11.62
May  9 21:57:01 server1 sshd\[26797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.11.62 
May  9 21:57:03 server1 sshd\[26797\]: Failed password for invalid user proxy1 from 51.91.11.62 port 34216 ssh2
...
2020-05-10 12:04:02
46.101.113.206 attack
May 10 02:15:28 jane sshd[9762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.113.206 
May 10 02:15:29 jane sshd[9762]: Failed password for invalid user elasticsearch from 46.101.113.206 port 52666 ssh2
...
2020-05-10 08:38:05
223.247.223.39 attack
May 10 06:03:58 OPSO sshd\[13269\]: Invalid user sammy from 223.247.223.39 port 36616
May 10 06:03:58 OPSO sshd\[13269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.223.39
May 10 06:04:00 OPSO sshd\[13269\]: Failed password for invalid user sammy from 223.247.223.39 port 36616 ssh2
May 10 06:10:02 OPSO sshd\[14164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.247.223.39  user=root
May 10 06:10:04 OPSO sshd\[14164\]: Failed password for root from 223.247.223.39 port 41128 ssh2
2020-05-10 12:24:50
45.138.98.121 attack
email spam
2020-05-10 12:01:51
95.47.148.8 attackspambots
1589083019 - 05/10/2020 10:56:59 Host: prostatin.cl.tks.sumy.ua/95.47.148.8 Port: 23 TCP Blocked
...
2020-05-10 12:09:09
85.93.20.34 attackbots
1 attempts against mh-modsecurity-ban on milky
2020-05-10 12:08:39
221.228.97.218 attackspam
[MK-Root1] Blocked by UFW
2020-05-10 12:14:20
180.76.114.61 attackspam
5x Failed Password
2020-05-10 12:05:35
148.251.120.201 attackbots
Unauthorized access detected from black listed ip!
2020-05-10 12:18:59
91.222.58.28 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 91.222.58.28 (PL/Poland/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-05-10 08:26:54 plain authenticator failed for ([91.222.58.28]) [91.222.58.28]: 535 Incorrect authentication data (set_id=m.kamran@safanicu.com)
2020-05-10 12:15:09
222.186.42.137 attackspambots
05/09/2020-23:57:06.710216 222.186.42.137 Protocol: 6 ET SCAN Potential SSH Scan
2020-05-10 12:01:21

Recently Reported IPs

159.65.125.111 65.147.252.154 26.115.143.150 170.227.216.163
20.168.0.135 103.181.221.1 219.176.29.87 112.85.254.2
44.202.35.168 112.2.145.195 98.46.107.155 124.129.56.128
42.226.117.211 75.198.58.108 4.19.157.54 98.81.247.17
43.157.191.20 124.104.209.224 167.99.74.66 47.102.21.172