Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aledo

Region: Texas

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 108.68.40.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64656
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;108.68.40.140.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071300 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 01:05:03 CST 2019
;; MSG SIZE  rcvd: 117
Host info
140.40.68.108.in-addr.arpa domain name pointer adsl-108-68-40-140.dsl.rcsntx.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
140.40.68.108.in-addr.arpa	name = adsl-108-68-40-140.dsl.rcsntx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.143.233.29 attackspam
Oct  8 05:02:46 scw-tender-jepsen sshd[12308]: Failed password for root from 140.143.233.29 port 40698 ssh2
2020-10-08 20:44:32
106.12.108.170 attack
firewall-block, port(s): 3838/tcp
2020-10-08 20:34:38
132.232.1.155 attack
Oct  8 10:48:56 rancher-0 sshd[539150]: Invalid user @QW from 132.232.1.155 port 33254
Oct  8 10:48:59 rancher-0 sshd[539150]: Failed password for invalid user @QW from 132.232.1.155 port 33254 ssh2
...
2020-10-08 20:25:11
62.99.90.10 attackbots
2020-10-08 07:33:07.471512-0500  localhost sshd[61964]: Failed password for root from 62.99.90.10 port 44384 ssh2
2020-10-08 20:41:36
112.85.42.74 attackbotsspam
Oct  8 12:53:44 jumpserver sshd[581500]: Failed password for root from 112.85.42.74 port 47132 ssh2
Oct  8 12:53:49 jumpserver sshd[581500]: Failed password for root from 112.85.42.74 port 47132 ssh2
Oct  8 12:53:51 jumpserver sshd[581500]: Failed password for root from 112.85.42.74 port 47132 ssh2
...
2020-10-08 20:54:13
78.180.51.216 attack
Port probing on unauthorized port 445
2020-10-08 20:38:40
106.13.98.59 attackbots
Brute-force attempt banned
2020-10-08 20:29:22
202.77.105.50 attackbots
Port Scan
...
2020-10-08 20:26:33
62.201.120.141 attack
Oct  8 10:12:32 mail sshd[5033]: Failed password for root from 62.201.120.141 port 36608 ssh2
...
2020-10-08 20:45:42
66.49.131.65 attack
SSH Brute-force
2020-10-08 20:34:51
113.161.69.158 attackspambots
SSH login attempts.
2020-10-08 20:50:31
103.131.71.101 attackspambots
(mod_security) mod_security (id:210730) triggered by 103.131.71.101 (VN/Vietnam/bot-103-131-71-101.coccoc.com): 5 in the last 3600 secs
2020-10-08 20:40:47
212.47.238.207 attackbots
SSH login attempts.
2020-10-08 20:47:39
139.162.77.6 attack
 TCP (SYN) 139.162.77.6:37494 -> port 3389, len 44
2020-10-08 20:59:00
189.7.81.29 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-08T11:38:42Z and 2020-10-08T11:49:26Z
2020-10-08 20:53:26

Recently Reported IPs

105.242.165.159 78.238.51.33 40.34.96.18 104.215.98.192
74.124.215.139 2a03:2880:f242:00cb:face:b00c:0000:43fe 90.138.119.94 184.47.221.114
110.229.162.38 190.123.85.9 39.143.201.193 96.218.98.83
94.251.62.141 77.24.174.235 90.1.52.135 79.3.157.26
109.182.33.42 126.0.17.113 23.101.184.153 44.138.20.96