Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.66.138.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.66.138.35.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 00:39:40 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 35.138.66.68.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 35.138.66.68.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
34.82.254.168 attackspam
Aug 20 01:11:53 server sshd[9059]: Failed password for invalid user soporte from 34.82.254.168 port 33304 ssh2
Aug 20 01:14:56 server sshd[14432]: Failed password for invalid user oprofile from 34.82.254.168 port 55814 ssh2
Aug 20 01:18:01 server sshd[19549]: Failed password for root from 34.82.254.168 port 50096 ssh2
2020-08-20 08:33:00
76.30.48.210 attack
firewall-block, port(s): 23/tcp
2020-08-20 08:18:15
156.96.62.57 attackspambots
 TCP (SYN) 156.96.62.57:60786 -> port 25, len 52
2020-08-20 08:34:44
75.141.114.206 attackbotsspam
SSH login attempts.
2020-08-20 08:26:19
144.168.164.26 attackspambots
diesunddas.net 144.168.164.26 [20/Aug/2020:00:51:26 +0200] "POST /xmlrpc.php HTTP/1.0" 301 495 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
diesunddas.net 144.168.164.26 [20/Aug/2020:00:51:27 +0200] "POST /xmlrpc.php HTTP/1.0" 500 2280 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_4) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
2020-08-20 08:32:34
75.144.73.147 attack
SSH login attempts.
2020-08-20 08:31:13
97.122.64.41 attackbotsspam
"SSH brute force auth login attempt."
2020-08-20 08:17:43
68.236.122.177 attack
SSH Brute Force
2020-08-20 08:46:02
64.225.64.215 attackbots
SSH Brute-Forcing (server1)
2020-08-20 08:45:12
75.149.249.130 attack
SSH login attempts.
2020-08-20 08:41:25
180.76.141.81 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-08-20 08:16:05
222.186.42.155 attackbotsspam
Aug 20 02:13:27 vpn01 sshd[12229]: Failed password for root from 222.186.42.155 port 42970 ssh2
Aug 20 02:13:30 vpn01 sshd[12229]: Failed password for root from 222.186.42.155 port 42970 ssh2
...
2020-08-20 08:21:04
75.136.252.97 attackspambots
SSH login attempts.
2020-08-20 08:14:37
201.80.21.131 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-19T20:55:10Z and 2020-08-19T21:10:26Z
2020-08-20 08:35:17
104.248.22.250 attackspam
Automatic report - XMLRPC Attack
2020-08-20 08:48:57

Recently Reported IPs

65.84.102.164 6.138.8.234 62.189.90.255 18.93.72.110
197.35.74.9 104.159.41.62 7.1.146.212 133.101.35.60
137.130.100.149 117.164.54.194 40.186.61.237 107.13.83.44
155.130.242.142 93.136.152.255 35.194.234.217 65.250.128.52
220.38.237.240 96.119.2.77 100.178.213.146 59.115.130.8