Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 21.238.91.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;21.238.91.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 22:11:17 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 68.91.238.21.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.91.238.21.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.73.161.3 attackspambots
Jun 29 10:25:51 core01 sshd\[23911\]: Invalid user ubuntu from 134.73.161.3 port 34864
Jun 29 10:25:51 core01 sshd\[23911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.73.161.3
...
2019-06-30 01:53:05
119.109.211.239 attackbotsspam
23/tcp
[2019-06-29]1pkt
2019-06-30 01:39:04
84.45.251.243 attackbotsspam
Jun 29 16:41:50 XXX sshd[20612]: Invalid user apollinaire from 84.45.251.243 port 49576
2019-06-30 01:41:25
185.173.35.45 attack
Portscan or hack attempt detected by psad/fwsnort
2019-06-30 01:50:20
117.158.155.44 attackbots
Jun 27 22:57:53 h2128110 sshd[8095]: Invalid user math from 117.158.155.44
Jun 27 22:57:53 h2128110 sshd[8095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.155.44 
Jun 27 22:57:55 h2128110 sshd[8095]: Failed password for invalid user math from 117.158.155.44 port 59592 ssh2
Jun 27 22:57:55 h2128110 sshd[8095]: Received disconnect from 117.158.155.44: 11: Bye Bye [preauth]
Jun 27 23:14:25 h2128110 sshd[8411]: Invalid user help from 117.158.155.44
Jun 27 23:14:25 h2128110 sshd[8411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.158.155.44 
Jun 27 23:14:26 h2128110 sshd[8411]: Failed password for invalid user help from 117.158.155.44 port 54184 ssh2
Jun 27 23:14:27 h2128110 sshd[8411]: Received disconnect from 117.158.155.44: 11: Bye Bye [preauth]
Jun 27 23:15:25 h2128110 sshd[8430]: Invalid user admin from 117.158.155.44
Jun 27 23:15:25 h2128110 sshd[8430]: pam_unix(sshd:aut........
-------------------------------
2019-06-30 02:10:36
111.231.54.248 attackspam
ssh failed login
2019-06-30 01:51:29
69.94.143.23 attackbots
TCP src-port=56807   dst-port=25    dnsbl-sorbs spamcop zen-spamhaus         (585)
2019-06-30 02:11:17
4.78.193.138 attackbots
Automatic report - Web App Attack
2019-06-30 01:41:58
66.70.130.151 attackspambots
Jun 29 19:29:43 SilenceServices sshd[26610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.151
Jun 29 19:29:45 SilenceServices sshd[26610]: Failed password for invalid user hadoop from 66.70.130.151 port 44294 ssh2
Jun 29 19:31:46 SilenceServices sshd[27888]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.130.151
2019-06-30 02:07:16
68.183.219.43 attack
Jun 24 22:18:54 sanyalnet-awsem3-1 sshd[1013]: Connection from 68.183.219.43 port 47232 on 172.30.0.184 port 22
Jun 24 22:18:55 sanyalnet-awsem3-1 sshd[1013]: Invalid user vserver from 68.183.219.43
Jun 24 22:18:55 sanyalnet-awsem3-1 sshd[1013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.219.43 
Jun 24 22:18:57 sanyalnet-awsem3-1 sshd[1013]: Failed password for invalid user vserver from 68.183.219.43 port 47232 ssh2
Jun 24 22:18:57 sanyalnet-awsem3-1 sshd[1013]: Received disconnect from 68.183.219.43: 11: Bye Bye [preauth]
Jun 24 22:21:56 sanyalnet-awsem3-1 sshd[1094]: Connection from 68.183.219.43 port 57852 on 172.30.0.184 port 22
Jun 24 22:21:57 sanyalnet-awsem3-1 sshd[1094]: Invalid user bugs from 68.183.219.43
Jun 24 22:21:57 sanyalnet-awsem3-1 sshd[1094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.219.43 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?
2019-06-30 02:11:56
148.70.119.243 attackbots
Jun 29 12:23:21 mail sshd[32151]: Invalid user storm from 148.70.119.243
Jun 29 12:23:21 mail sshd[32151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.119.243
Jun 29 12:23:21 mail sshd[32151]: Invalid user storm from 148.70.119.243
Jun 29 12:23:23 mail sshd[32151]: Failed password for invalid user storm from 148.70.119.243 port 53972 ssh2
Jun 29 12:39:59 mail sshd[1857]: Invalid user artur from 148.70.119.243
...
2019-06-30 01:40:53
51.68.138.143 attack
Jun 28 03:29:29 mail sshd[3198]: Invalid user shuang from 51.68.138.143
Jun 28 03:29:29 mail sshd[3198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.138.143
Jun 28 03:29:29 mail sshd[3198]: Invalid user shuang from 51.68.138.143
Jun 28 03:29:31 mail sshd[3198]: Failed password for invalid user shuang from 51.68.138.143 port 38507 ssh2
...
2019-06-30 02:29:33
160.16.207.36 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-30 02:25:02
78.152.116.182 attackbotsspam
Jun 28 03:38:43 mail sshd[17189]: Invalid user marcel from 78.152.116.182
Jun 28 03:38:43 mail sshd[17189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.152.116.182
Jun 28 03:38:43 mail sshd[17189]: Invalid user marcel from 78.152.116.182
Jun 28 03:38:44 mail sshd[17189]: Failed password for invalid user marcel from 78.152.116.182 port 34229 ssh2
Jun 28 03:46:34 mail sshd[28525]: Invalid user brenda from 78.152.116.182
...
2019-06-30 01:54:19
193.112.19.168 attackbots
Jun 29 20:00:39 [munged] sshd[23459]: Invalid user applmgr from 193.112.19.168 port 50862
Jun 29 20:00:39 [munged] sshd[23459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.19.168
2019-06-30 02:06:33

Recently Reported IPs

6.25.171.221 9.111.249.147 214.101.49.238 246.111.161.82
188.73.115.223 229.63.189.222 189.216.194.232 134.156.184.4
54.168.129.22 129.56.103.254 104.122.226.172 93.79.16.152
119.61.221.27 9.82.250.15 133.242.5.83 35.48.23.154
228.145.78.255 224.236.27.47 212.165.0.30 206.181.134.3