Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.89.83.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.89.83.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:56:05 CST 2025
;; MSG SIZE  rcvd: 105
Host info
68.83.89.138.in-addr.arpa domain name pointer pool-138-89-83-68.mad.east.verizon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.83.89.138.in-addr.arpa	name = pool-138-89-83-68.mad.east.verizon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2.36.194.126 attackspambots
Unauthorized connection attempt detected from IP address 2.36.194.126 to port 80
2020-04-13 04:09:05
121.170.94.33 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-13 04:25:09
184.64.173.123 attackspam
Unauthorized connection attempt detected from IP address 184.64.173.123 to port 23
2020-04-13 04:18:06
96.224.32.215 attackspambots
Unauthorized connection attempt detected from IP address 96.224.32.215 to port 1433
2020-04-13 04:27:28
66.42.22.221 attackspambots
Unauthorized connection attempt detected from IP address 66.42.22.221 to port 23
2020-04-13 04:38:47
89.132.120.93 attack
Unauthorized connection attempt detected from IP address 89.132.120.93 to port 9530
2020-04-13 04:30:07
108.24.54.235 attackbots
Draytek Vigor Remote Command Execution Vulnerability
2020-04-13 04:27:10
81.234.28.100 attack
Unauthorized connection attempt detected from IP address 81.234.28.100 to port 23
2020-04-13 04:32:00
201.197.203.96 attackbotsspam
Unauthorized connection attempt detected from IP address 201.197.203.96 to port 80
2020-04-13 04:12:33
59.60.79.25 attackbots
Unauthorized connection attempt detected from IP address 59.60.79.25 to port 23
2020-04-13 04:03:49
77.42.84.174 attackbots
Unauthorized connection attempt detected from IP address 77.42.84.174 to port 23
2020-04-13 04:36:06
94.60.81.210 attackspam
Unauthorized connection attempt detected from IP address 94.60.81.210 to port 23
2020-04-13 04:28:15
173.54.51.22 attackbotsspam
Unauthorized connection attempt detected from IP address 173.54.51.22 to port 8080
2020-04-13 04:22:05
87.76.60.140 attack
Unauthorized connection attempt detected from IP address 87.76.60.140 to port 26
2020-04-13 04:30:57
50.246.217.197 attackspambots
Unauthorized connection attempt detected from IP address 50.246.217.197 to port 23
2020-04-13 04:41:58

Recently Reported IPs

218.146.136.157 253.177.69.107 99.114.60.242 231.70.248.61
127.160.58.138 121.107.203.15 85.9.54.128 126.200.59.185
146.104.231.67 172.208.100.208 163.117.184.20 7.127.6.105
196.140.189.72 82.191.39.208 227.51.157.51 29.191.212.228
103.61.21.93 55.190.247.182 59.173.62.189 129.17.161.56