Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hessen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.68.71.18 attackspambots
Sep 28 01:37:21 pl2server sshd[26678]: Invalid user alex from 138.68.71.18 port 38504
Sep 28 01:37:21 pl2server sshd[26678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.71.18
Sep 28 01:37:22 pl2server sshd[26678]: Failed password for invalid user alex from 138.68.71.18 port 38504 ssh2
Sep 28 01:37:22 pl2server sshd[26678]: Received disconnect from 138.68.71.18 port 38504:11: Bye Bye [preauth]
Sep 28 01:37:22 pl2server sshd[26678]: Disconnected from 138.68.71.18 port 38504 [preauth]
Sep 28 01:51:34 pl2server sshd[30416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.71.18  user=www-data
Sep 28 01:51:36 pl2server sshd[30416]: Failed password for www-data from 138.68.71.18 port 44968 ssh2
Sep 28 01:51:36 pl2server sshd[30416]: Received disconnect from 138.68.71.18 port 44968:11: Bye Bye [preauth]
Sep 28 01:51:36 pl2server sshd[30416]: Disconnected from 138.68.71.18 port 4496........
-------------------------------
2020-09-30 09:26:07
138.68.71.18 attackbots
Sep 28 01:37:21 pl2server sshd[26678]: Invalid user alex from 138.68.71.18 port 38504
Sep 28 01:37:21 pl2server sshd[26678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.71.18
Sep 28 01:37:22 pl2server sshd[26678]: Failed password for invalid user alex from 138.68.71.18 port 38504 ssh2
Sep 28 01:37:22 pl2server sshd[26678]: Received disconnect from 138.68.71.18 port 38504:11: Bye Bye [preauth]
Sep 28 01:37:22 pl2server sshd[26678]: Disconnected from 138.68.71.18 port 38504 [preauth]
Sep 28 01:51:34 pl2server sshd[30416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.71.18  user=www-data
Sep 28 01:51:36 pl2server sshd[30416]: Failed password for www-data from 138.68.71.18 port 44968 ssh2
Sep 28 01:51:36 pl2server sshd[30416]: Received disconnect from 138.68.71.18 port 44968:11: Bye Bye [preauth]
Sep 28 01:51:36 pl2server sshd[30416]: Disconnected from 138.68.71.18 port 4496........
-------------------------------
2020-09-30 02:17:00
138.68.71.18 attack
Sep 29 11:15:01 l03 sshd[19472]: Invalid user dave from 138.68.71.18 port 37666
...
2020-09-29 18:19:16
138.68.71.18 attackbots
5x Failed Password
2020-09-26 03:09:10
138.68.71.18 attackspambots
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-25 18:57:01
138.68.71.188 attackspambots
Exploited Host.
2020-07-26 02:40:16
138.68.71.174 attack
[Thu Jun 04 08:31:15.929570 2020] [php7:error] [pid 12674] [client 138.68.71.174:49980] script /Library/Server/Web/Data/Sites/omfocused.com/wp-login.php not found or unable to stat
2020-06-05 01:02:28
138.68.71.174 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-06-02 00:17:57
138.68.71.188 attack
May  7 07:09:10 h2829583 sshd[15812]: Failed password for root from 138.68.71.188 port 46358 ssh2
2020-05-07 13:09:36
138.68.71.174 attackspam
2020-04-29T10:25:46.993070+00:00 [f2b-wordpress-hard-ddos] : Authentication attempt user [munged] from 138.68.71.174
2020-04-29T10:25:45.652329+00:00 [f2b-wordpress-hard-ddos] : Authentication attempt user [munged] from 138.68.71.174
2020-04-29T10:25:45.650309+00:00 [f2b-wordpress-hard-ddos] : Authentication attempt user [munged] from 138.68.71.174
2020-04-29 18:30:04
138.68.71.174 attack
138.68.71.174 - - [24/Apr/2020:14:03:32 +0200] "GET /wp-login.php HTTP/1.1" 200 5982 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.71.174 - - [24/Apr/2020:14:03:35 +0200] "POST /wp-login.php HTTP/1.1" 200 6174 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.71.174 - - [24/Apr/2020:14:03:35 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-04-25 01:23:52
138.68.71.174 attackspam
Automatic report - XMLRPC Attack
2020-03-12 14:42:12
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.71.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.71.68.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025041201 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 13 07:30:24 CST 2025
;; MSG SIZE  rcvd: 105
Host info
68.71.68.138.in-addr.arpa domain name pointer portscanner-fra1-01.dev.cyberresilience.io.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.71.68.138.in-addr.arpa	name = portscanner-fra1-01.dev.cyberresilience.io.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.123.6.163 attackspambots
Dec  3 00:53:04 sauna sshd[209512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.123.6.163
Dec  3 00:53:06 sauna sshd[209512]: Failed password for invalid user dicitionar from 200.123.6.163 port 56620 ssh2
...
2019-12-03 07:00:22
217.182.74.125 attackbotsspam
Dec  2 12:34:17 wbs sshd\[22564\]: Invalid user GardenAdmin from 217.182.74.125
Dec  2 12:34:17 wbs sshd\[22564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.ip-217-182-74.eu
Dec  2 12:34:19 wbs sshd\[22564\]: Failed password for invalid user GardenAdmin from 217.182.74.125 port 46660 ssh2
Dec  2 12:42:01 wbs sshd\[23521\]: Invalid user szolt from 217.182.74.125
Dec  2 12:42:01 wbs sshd\[23521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.ip-217-182-74.eu
2019-12-03 06:53:34
218.92.0.148 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2019-12-03 06:58:10
31.27.38.242 attackbotsspam
Dec  2 12:38:39 hanapaa sshd\[25310\]: Invalid user dagert from 31.27.38.242
Dec  2 12:38:39 hanapaa sshd\[25310\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-31-27-38-242.cust.vodafonedsl.it
Dec  2 12:38:41 hanapaa sshd\[25310\]: Failed password for invalid user dagert from 31.27.38.242 port 57658 ssh2
Dec  2 12:44:36 hanapaa sshd\[25977\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-31-27-38-242.cust.vodafonedsl.it  user=root
Dec  2 12:44:38 hanapaa sshd\[25977\]: Failed password for root from 31.27.38.242 port 41504 ssh2
2019-12-03 06:57:41
117.202.8.55 attackspambots
Dec  2 22:41:52 vps647732 sshd[6666]: Failed password for root from 117.202.8.55 port 55673 ssh2
...
2019-12-03 06:33:10
218.92.0.184 attackbotsspam
Dec  2 22:45:48 marvibiene sshd[8390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Dec  2 22:45:50 marvibiene sshd[8390]: Failed password for root from 218.92.0.184 port 7296 ssh2
Dec  2 22:45:53 marvibiene sshd[8390]: Failed password for root from 218.92.0.184 port 7296 ssh2
Dec  2 22:45:48 marvibiene sshd[8390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Dec  2 22:45:50 marvibiene sshd[8390]: Failed password for root from 218.92.0.184 port 7296 ssh2
Dec  2 22:45:53 marvibiene sshd[8390]: Failed password for root from 218.92.0.184 port 7296 ssh2
...
2019-12-03 06:51:39
185.176.27.254 attackbotsspam
12/02/2019-17:45:51.234100 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-03 06:46:44
92.63.194.36 attackbotsspam
Trying ports that it shouldn't be.
2019-12-03 06:40:53
132.232.29.208 attackspambots
2019-12-02T22:38:20.673384abusebot-8.cloudsearch.cf sshd\[10410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.29.208  user=root
2019-12-03 06:52:36
5.132.115.161 attackspam
Dec  2 12:38:11 php1 sshd\[25165\]: Invalid user admin from 5.132.115.161
Dec  2 12:38:11 php1 sshd\[25165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161-115-132-5.ftth.glasoperator.nl
Dec  2 12:38:13 php1 sshd\[25165\]: Failed password for invalid user admin from 5.132.115.161 port 53830 ssh2
Dec  2 12:43:49 php1 sshd\[26021\]: Invalid user kienast from 5.132.115.161
Dec  2 12:43:49 php1 sshd\[26021\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161-115-132-5.ftth.glasoperator.nl
2019-12-03 06:56:13
49.235.216.174 attackspam
Dec  2 12:50:28 eddieflores sshd\[19214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.216.174  user=root
Dec  2 12:50:30 eddieflores sshd\[19214\]: Failed password for root from 49.235.216.174 port 42052 ssh2
Dec  2 12:57:12 eddieflores sshd\[19847\]: Invalid user mythtv from 49.235.216.174
Dec  2 12:57:12 eddieflores sshd\[19847\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.216.174
Dec  2 12:57:13 eddieflores sshd\[19847\]: Failed password for invalid user mythtv from 49.235.216.174 port 47896 ssh2
2019-12-03 06:59:19
183.6.26.203 attack
Dec  2 23:18:21 lnxmysql61 sshd[9874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.6.26.203
Dec  2 23:18:21 lnxmysql61 sshd[9874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.6.26.203
2019-12-03 06:32:25
83.13.209.154 attack
Dec  2 12:37:01 kapalua sshd\[27855\]: Invalid user yoke from 83.13.209.154
Dec  2 12:37:01 kapalua sshd\[27855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fib154.internetdsl.tpnet.pl
Dec  2 12:37:03 kapalua sshd\[27855\]: Failed password for invalid user yoke from 83.13.209.154 port 38796 ssh2
Dec  2 12:42:57 kapalua sshd\[28559\]: Invalid user projetecno from 83.13.209.154
Dec  2 12:42:57 kapalua sshd\[28559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=fib154.internetdsl.tpnet.pl
2019-12-03 06:46:14
112.85.42.177 attackspambots
Dec  2 23:38:58 eventyay sshd[30323]: Failed password for root from 112.85.42.177 port 28445 ssh2
Dec  2 23:39:12 eventyay sshd[30323]: error: maximum authentication attempts exceeded for root from 112.85.42.177 port 28445 ssh2 [preauth]
Dec  2 23:39:19 eventyay sshd[30331]: Failed password for root from 112.85.42.177 port 63325 ssh2
...
2019-12-03 06:47:25
14.52.100.65 attack
3389BruteforceFW22
2019-12-03 06:50:54

Recently Reported IPs

218.104.224.177 54.64.128.149 172.203.232.204 31.42.177.247
234.134.5.120 19.165.70.3 66.223.172.61 fe80::20b5:6ff:fe45
2409:8938:48b2:ddc:3c32:72ff:fe15:b165 206.168.34.46 20.42.112.218 113.215.189.88
195.184.76.119 195.184.76.113 39.144.124.159 104.18.214.235
195.184.76.9 195.184.76.8 195.184.76.115 143.198.70.32