Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Brooklyn

Region: New York

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: MCI Communications Services, Inc. d/b/a Verizon Business

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.2.68.106
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35295
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;100.2.68.106.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 25 23:56:30 +08 2019
;; MSG SIZE  rcvd: 116

Host info
106.68.2.100.in-addr.arpa domain name pointer pool-100-2-68-106.nycmny.fios.verizon.net.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
106.68.2.100.in-addr.arpa	name = pool-100-2-68-106.nycmny.fios.verizon.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
211.21.48.73 attackspambots
Unauthorized connection attempt from IP address 211.21.48.73 on Port 445(SMB)
2019-11-29 08:21:26
170.155.2.131 attack
Unauthorized connection attempt from IP address 170.155.2.131 on Port 445(SMB)
2019-11-29 07:44:15
129.204.75.207 attack
Nov 29 00:35:58 master sshd[5112]: Failed password for root from 129.204.75.207 port 53848 ssh2
2019-11-29 08:01:29
106.37.72.234 attack
Nov 28 22:28:53 thevastnessof sshd[26039]: Failed password for invalid user demo from 106.37.72.234 port 49106 ssh2
...
2019-11-29 07:43:25
36.233.37.237 attackspambots
port scan/probe/communication attempt; port 23
2019-11-29 08:06:44
91.121.205.83 attackspam
SSH brutforce
2019-11-29 08:03:40
191.177.182.239 attackspam
Unauthorized connection attempt from IP address 191.177.182.239 on Port 445(SMB)
2019-11-29 08:16:18
185.93.3.110 attack
(From rodgerOrinc@outlook.com) Having related backlinks is a must in today`s SEO world 
 
So, we are able to provide you with this great service at a mere price 
https://www.monkeydigital.co/product/related-backlinks/ 
 
You will receive full report within 15 days 
500 to 1000 related backlinks will be provided in this service 
 
 
thanks and regards 
Monkey Digital Team 
support@monkeydigital.co
2019-11-29 08:20:38
106.12.183.6 attackbots
ssh failed login
2019-11-29 08:04:10
114.40.161.9 attackbots
Unauthorized connection attempt from IP address 114.40.161.9 on Port 445(SMB)
2019-11-29 08:12:34
171.8.68.185 attackbotsspam
Unauthorized connection attempt from IP address 171.8.68.185 on Port 445(SMB)
2019-11-29 07:45:25
115.159.88.192 attackspam
2019-11-28T23:21:31.000609abusebot-3.cloudsearch.cf sshd\[6060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.88.192  user=root
2019-11-29 08:11:13
201.105.138.79 attackbots
Unauthorized connection attempt from IP address 201.105.138.79 on Port 445(SMB)
2019-11-29 08:05:59
41.60.232.2 attackbots
port scan/probe/communication attempt; port 23
2019-11-29 07:50:28
58.39.208.80 attack
Unauthorized connection attempt from IP address 58.39.208.80 on Port 445(SMB)
2019-11-29 08:09:44

Recently Reported IPs

18.123.131.48 112.124.149.92 82.158.2.185 200.66.53.243
67.214.43.209 159.65.104.178 189.199.20.120 70.144.226.90
185.229.243.144 45.234.95.82 103.76.153.190 60.92.154.70
74.191.21.254 70.166.120.4 102.97.166.27 184.17.97.29
114.79.160.50 97.230.254.16 94.138.96.82 133.11.56.78