Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.162.34.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23251
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.162.34.138.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022101 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 22 01:36:57 CST 2022
;; MSG SIZE  rcvd: 106
Host info
138.34.162.68.in-addr.arpa domain name pointer pool-68-162-34-138.nwrk.east.verizon.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.34.162.68.in-addr.arpa	name = pool-68-162-34-138.nwrk.east.verizon.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
23.129.64.217 attackbotsspam
Aug 9 12:46:40 *hidden* postfix/postscreen[7627]: DNSBL rank 13 for [23.129.64.217]:47125
2020-08-23 04:57:58
218.92.0.248 attackspam
Aug 22 17:12:30 plusreed sshd[23103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.248  user=root
Aug 22 17:12:32 plusreed sshd[23103]: Failed password for root from 218.92.0.248 port 58639 ssh2
...
2020-08-23 05:12:41
112.85.42.174 attack
Aug 22 22:36:46 abendstille sshd\[25833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Aug 22 22:36:48 abendstille sshd\[25833\]: Failed password for root from 112.85.42.174 port 9948 ssh2
Aug 22 22:36:51 abendstille sshd\[25833\]: Failed password for root from 112.85.42.174 port 9948 ssh2
Aug 22 22:36:55 abendstille sshd\[25833\]: Failed password for root from 112.85.42.174 port 9948 ssh2
Aug 22 22:36:58 abendstille sshd\[25833\]: Failed password for root from 112.85.42.174 port 9948 ssh2
...
2020-08-23 04:44:42
151.80.41.64 attackspambots
2020-08-22T23:28:46.959792mail.standpoint.com.ua sshd[21524]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns398062.ip-151-80-41.eu
2020-08-22T23:28:46.956880mail.standpoint.com.ua sshd[21524]: Invalid user delivery from 151.80.41.64 port 35170
2020-08-22T23:28:48.950398mail.standpoint.com.ua sshd[21524]: Failed password for invalid user delivery from 151.80.41.64 port 35170 ssh2
2020-08-22T23:32:11.381124mail.standpoint.com.ua sshd[22220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns398062.ip-151-80-41.eu  user=root
2020-08-22T23:32:13.516549mail.standpoint.com.ua sshd[22220]: Failed password for root from 151.80.41.64 port 38879 ssh2
...
2020-08-23 04:43:03
37.49.224.159 attackspam
Aug 15 04:20:00 *hidden* postfix/postscreen[9987]: DNSBL rank 4 for [37.49.224.159]:55079
2020-08-23 04:52:39
201.236.190.115 attack
SSH Login Bruteforce
2020-08-23 04:56:16
115.159.115.17 attackbotsspam
Aug 22 21:35:25 gospond sshd[18122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.115.17 
Aug 22 21:35:25 gospond sshd[18122]: Invalid user share from 115.159.115.17 port 54966
Aug 22 21:35:26 gospond sshd[18122]: Failed password for invalid user share from 115.159.115.17 port 54966 ssh2
...
2020-08-23 04:41:05
109.244.100.99 attackspambots
Aug 22 20:37:29 vlre-nyc-1 sshd\[4738\]: Invalid user asi from 109.244.100.99
Aug 22 20:37:29 vlre-nyc-1 sshd\[4738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.244.100.99
Aug 22 20:37:32 vlre-nyc-1 sshd\[4738\]: Failed password for invalid user asi from 109.244.100.99 port 39558 ssh2
Aug 22 20:43:08 vlre-nyc-1 sshd\[4852\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.244.100.99  user=root
Aug 22 20:43:11 vlre-nyc-1 sshd\[4852\]: Failed password for root from 109.244.100.99 port 44260 ssh2
...
2020-08-23 04:53:53
61.133.232.251 attackspambots
Aug 22 16:30:19 george sshd[6428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.251 
Aug 22 16:30:21 george sshd[6428]: Failed password for invalid user akhil from 61.133.232.251 port 33789 ssh2
Aug 22 16:34:11 george sshd[6466]: Invalid user openlava from 61.133.232.251 port 2188
Aug 22 16:34:11 george sshd[6466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.133.232.251 
Aug 22 16:34:14 george sshd[6466]: Failed password for invalid user openlava from 61.133.232.251 port 2188 ssh2
...
2020-08-23 04:46:27
167.99.13.90 attackbots
167.99.13.90 - - [22/Aug/2020:21:33:47 +0100] "POST /wp-login.php HTTP/1.1" 200 2216 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.13.90 - - [22/Aug/2020:21:33:48 +0100] "POST /wp-login.php HTTP/1.1" 200 2195 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
167.99.13.90 - - [22/Aug/2020:21:33:48 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-23 05:10:47
222.186.175.154 attackspam
Aug 22 22:56:01 santamaria sshd\[13406\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Aug 22 22:56:03 santamaria sshd\[13406\]: Failed password for root from 222.186.175.154 port 55170 ssh2
Aug 22 22:56:07 santamaria sshd\[13406\]: Failed password for root from 222.186.175.154 port 55170 ssh2
...
2020-08-23 04:58:25
222.186.180.130 attack
Aug 22 23:03:46 eventyay sshd[5010]: Failed password for root from 222.186.180.130 port 23986 ssh2
Aug 22 23:03:55 eventyay sshd[5012]: Failed password for root from 222.186.180.130 port 60617 ssh2
...
2020-08-23 05:06:59
220.128.112.12 attack
Unauthorised access (Aug 22) SRC=220.128.112.12 LEN=48 TTL=109 ID=19331 DF TCP DPT=1433 WINDOW=65535 SYN
2020-08-23 05:13:29
218.25.161.226 attack
Email login attempts - banned mail account name (SMTP)
2020-08-23 05:06:39
85.105.79.33 attackspam
Automatic report - Port Scan Attack
2020-08-23 05:04:14

Recently Reported IPs

104.200.29.180 104.206.229.182 104.207.141.40 104.207.225.168
164.24.99.220 104.207.246.237 104.207.254.82 104.21.1.71
179.125.42.55 104.21.10.195 104.21.11.125 104.21.11.167
24.150.168.53 104.21.12.33 104.21.13.241 104.21.13.70
104.21.14.120 68.44.74.209 104.21.14.137 104.21.14.84