AbuseIPDB » 138.68.94.43

138.68.94.43 was found in our database!

This IP was reported 71 times. Confidence of Abuse is 100%: ?

100%
ISP DigitalOcean, LLC
Usage Type Data Center/Web Hosting/Transit
Domain Name digitalocean.com
Country Germany
City Frankfurt am Main, Hesse

IP Abuse Reports for 138.68.94.43:

This IP address has been reported a total of 71 times from 48 distinct sources. 138.68.94.43 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
IP Analyzer
Unauthorized connection attempt from IP address 138.68.94.43 on Port 1194
Port Scan
rtbh.com.tr
list.rtbh.com.tr report: tcp/4443, tcp/8443, tcp/8080
Brute-Force
TrafficAnalyser
Port scanning
Port Scan
MPL
tcp port scan (551 or more attempts)
Port Scan
Study Bitcoin 🤗
4 port probes: tcp/4443 (pharos), tcp/9608, tcp/8443, tcp/8080 (http)
[ros]
Port Scan Bad Web Bot Web App Attack
_ArminS_
SP-Scan 41526:9201 detected 2024.12.03 16:58:47
blocked until 2025.01.22 10:01:34
Port Scan
Anonymous
Dec 3 16:29:14 rendez-vous openvpn[1764]: 138.68.94.43:52112 Connection reset, restarting [0]
VPN IP Port Scan Web App Attack
www.remote24.se
3389BruteforceStormFW21
Brute-Force
Study Bitcoin 🤗
2 port probes: tcp/3390 (distributed service coordinator), tcp/3389 (rdp)
[srv136]
Port Scan Brute-Force
Grizzlytools
Kingcopy(AI-IDS)RouterOS: Portscanner detected.
Port Scan
smopdidi
Ports: 22; 2 attempts
Port Scan
DerDoktor
I1202 08:37:50.6
Fail2ban action triggered
Port Scan Brute-Force SSH
swrlly
ssh bruteforce
Brute-Force SSH
OiledAmoeba
Dec 2 09:28:59 mout sshd[26474]: Connection closed by 138.68.94.43 port 41748 [preauth]
Brute-Force SSH
Hirte
C1-W: TCP-Scanner. Port: 22
Port Scan

Showing 1 to 15 of 71 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: