Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
138.68.80.235 attackbots
138.68.80.235 - - [05/Oct/2020:07:51:33 -0700] "GET /wp-login.php HTTP/1.1" 301 561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-06 06:43:36
138.68.80.235 attack
138.68.80.235 - - [05/Oct/2020:07:51:33 -0700] "GET /wp-login.php HTTP/1.1" 301 561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-05 22:52:10
138.68.80.235 attack
hacking
2020-10-05 14:46:56
138.68.80.235 attack
138.68.80.235 - - [29/Sep/2020:17:56:59 +0100] "POST /wp-login.php HTTP/1.1" 200 2243 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.80.235 - - [29/Sep/2020:17:57:00 +0100] "POST /wp-login.php HTTP/1.1" 200 2287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.80.235 - - [29/Sep/2020:17:57:00 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-30 04:31:31
138.68.80.235 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-29 20:39:51
138.68.80.235 attackspam
138.68.80.235 - - [29/Sep/2020:03:56:38 +0100] "POST /wp-login.php HTTP/1.1" 401 3568 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.80.235 - - [29/Sep/2020:03:56:40 +0100] "POST /wp-login.php HTTP/1.1" 401 3568 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.80.235 - - [29/Sep/2020:03:56:41 +0100] "POST /wp-login.php HTTP/1.1" 401 3568 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-29 12:48:53
138.68.80.235 attackbotsspam
C1,WP GET /suche/wp-login.php
2020-09-29 06:51:54
138.68.80.235 attack
xmlrpc attack
2020-09-28 23:19:46
138.68.80.235 attack
xmlrpc attack
2020-09-28 15:23:17
138.68.80.235 attackspam
CMS (WordPress or Joomla) login attempt.
2020-09-10 00:39:17
138.68.80.217 attackbotsspam
port 23
2020-08-14 14:33:03
138.68.80.235 attackspambots
Automatic report generated by Wazuh
2020-08-06 20:25:50
138.68.80.235 attackspambots
[03/Aug/2020:19:30:47 +0200] Web-Request: "GET /wp-login.php", User-Agent: "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-04 03:16:18
138.68.80.235 attackbotsspam
xmlrpc attack
2020-07-31 07:48:16
138.68.80.235 attack
Automatic report - XMLRPC Attack
2020-06-23 19:32:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.68.80.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.68.80.201.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120901 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 03:23:43 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 201.80.68.138.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 201.80.68.138.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.18.206.22 attack
Portscan or hack attempt detected by psad/fwsnort
2020-01-09 19:13:37
52.112.132.71 attackbotsspam
unauthorized connection attempt
2020-01-09 19:26:32
59.115.159.6 attackbots
unauthorized connection attempt
2020-01-09 19:25:46
52.73.169.169 attackspam
123/udp 1900/udp 161/udp...
[2019-11-11/2020-01-09]99pkt,5pt.(udp)
2020-01-09 19:27:03
78.26.141.16 attack
unauthorized connection attempt
2020-01-09 18:56:37
177.139.164.194 attackspambots
unauthorized connection attempt
2020-01-09 19:05:39
91.143.47.91 attackspam
unauthorized connection attempt
2020-01-09 18:55:39
14.233.244.25 attackbots
unauthorized connection attempt
2020-01-09 18:58:08
82.221.105.7 attack
HTTP/80/443 Probe, BF, WP, Hack -
2020-01-09 19:23:17
143.202.189.144 attackspam
unauthorized connection attempt
2020-01-09 19:09:16
123.185.8.226 attackbotsspam
unauthorized connection attempt
2020-01-09 19:13:05
136.29.17.198 attackspam
unauthorized connection attempt
2020-01-09 19:10:35
124.30.5.210 attack
unauthorized connection attempt
2020-01-09 19:12:47
175.10.48.248 attack
Unauthorized connection attempt detected from IP address 175.10.48.248 to port 23 [T]
2020-01-09 19:06:59
89.248.160.178 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-09 19:20:54

Recently Reported IPs

36.124.149.208 187.131.62.45 47.130.241.31 138.249.196.123
219.250.220.144 245.103.223.139 156.189.212.221 125.25.132.55
169.42.52.37 61.169.136.79 131.43.41.197 3.156.223.120
80.31.131.212 209.237.46.68 210.145.32.61 170.170.53.15
162.30.80.25 96.138.41.77 34.93.93.169 161.55.161.126