This IP address has been reported a total of 886
times from 425 distinct
sources.
138.68.161.220 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
Sep 11 11:22:22 petr-testing sshd[16212]: Failed password for root from 138.68.161.220 port 42122 ss ... show moreSep 11 11:22:22 petr-testing sshd[16212]: Failed password for root from 138.68.161.220 port 42122 ssh2
Sep 11 11:29:42 petr-testing sshd[13846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.161.220
Sep 11 11:29:44 petr-testing sshd[13846]: Failed password for invalid user puneet from 138.68.161.220 port 37130 ssh2
... show less
Sep 11 11:00:24 CursedCityRP sshd[631246]: Failed password for invalid user user from 138.68.161.220 ... show moreSep 11 11:00:24 CursedCityRP sshd[631246]: Failed password for invalid user user from 138.68.161.220 port 46068 ssh2
Sep 11 11:01:02 CursedCityRP sshd[631276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.161.220 user=root
Sep 11 11:01:05 CursedCityRP sshd[631276]: Failed password for root from 138.68.161.220 port 39552 ssh2
Sep 11 11:01:43 CursedCityRP sshd[631316]: Invalid user vr from 138.68.161.220 port 52556
Sep 11 11:01:43 CursedCityRP sshd[631316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.161.220
Sep 11 11:01:43 CursedCityRP sshd[631316]: Invalid user vr from 138.68.161.220 port 52556
Sep 11 11:01:45 CursedCityRP sshd[631316]: Failed password for invalid user vr from 138.68.161.220 port 52556 ssh2
... show less
Sep 11 08:28:31 ice1 sshd[3217734]: Invalid user kafka from 138.68.161.220 port 39230
Sep 11 0 ... show moreSep 11 08:28:31 ice1 sshd[3217734]: Invalid user kafka from 138.68.161.220 port 39230
Sep 11 08:31:16 ice1 sshd[3217881]: Invalid user arman from 138.68.161.220 port 52860
... show less
Sep 11 03:30:38 Tower sshd-session[11211]: Failed password for invalid user oracle from 138.68.161.2 ... show moreSep 11 03:30:38 Tower sshd-session[11211]: Failed password for invalid user oracle from 138.68.161.220 port 46490 ssh2
Sep 11 03:30:38 Tower sshd-session[11211]: Received disconnect from 138.68.161.220 port 46490:11: Bye Bye [preauth]
Sep 11 03:30:38 Tower sshd-session[11211]: Disconnected from invalid user oracle 138.68.161.220 port 46490 [preauth]
Sep 11 03:30:38 Tower sshd[20489]: srclimit_penalise: ipv4: new 138.68.161.220/32 deferred penalty of 5 seconds for penalty: failed authentication show less
Sep 11 08:57:30 lnxweb62 sshd[4289]: Failed password for invalid user ro from 138.68.161.220 port 59 ... show moreSep 11 08:57:30 lnxweb62 sshd[4289]: Failed password for invalid user ro from 138.68.161.220 port 59050 ssh2
Sep 11 08:57:31 lnxweb62 sshd[4289]: Disconnected from invalid user ro 138.68.161.220 port 59050 [preauth]
Sep 11 09:00:37 lnxweb62 sshd[6726]: Invalid user jeremy from 138.68.161.220 port 50394
Sep 11 09:00:37 lnxweb62 sshd[6726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.161.220
Sep 11 09:00:38 lnxweb62 sshd[6726]: Failed password for invalid user jeremy from 138.68.161.220 port 50394 ssh2
... show less
Sep 11 07:27:22 hasankayra04 sshd[407322]: Invalid user oficina from 138.68.161.220 port 51966 ... show moreSep 11 07:27:22 hasankayra04 sshd[407322]: Invalid user oficina from 138.68.161.220 port 51966
Sep 11 07:27:22 hasankayra04 sshd[407322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.161.220
Sep 11 07:27:22 hasankayra04 sshd[407322]: Invalid user oficina from 138.68.161.220 port 51966
Sep 11 07:27:24 hasankayra04 sshd[407322]: Failed password for invalid user oficina from 138.68.161.220 port 51966 ssh2
Sep 11 07:28:04 hasankayra04 sshd[407351]: Invalid user smr from 138.68.161.220 port 50072
... show less
Report 1337130 with IP 2366063 for SSH brute-force attack by source 2366045 via ssh-honeypot/0.2.0+h ... show moreReport 1337130 with IP 2366063 for SSH brute-force attack by source 2366045 via ssh-honeypot/0.2.0+http show less
Sep 11 04:55:40 host1 sshd[1167795]: Invalid user test from 138.68.161.220 port 36006
Sep 11 0 ... show moreSep 11 04:55:40 host1 sshd[1167795]: Invalid user test from 138.68.161.220 port 36006
Sep 11 04:55:40 host1 sshd[1167795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.161.220
Sep 11 04:55:40 host1 sshd[1167795]: Invalid user test from 138.68.161.220 port 36006
Sep 11 04:55:41 host1 sshd[1167795]: Failed password for invalid user test from 138.68.161.220 port 36006 ssh2
Sep 11 04:56:22 host1 sshd[1167887]: Invalid user wen from 138.68.161.220 port 56940
... show less
Sep 11 02:18:05 debian sshd[3043240]: Failed password for root from 138.68.161.220 port 37960 ssh2<b ... show moreSep 11 02:18:05 debian sshd[3043240]: Failed password for root from 138.68.161.220 port 37960 ssh2
Sep 11 02:22:22 debian sshd[3043304]: Invalid user jenkins from 138.68.161.220 port 56104
... show less