Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.150.108.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.150.108.68.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 03:24:53 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 68.108.150.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.108.150.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.247.59.153 attackspambots
23/tcp
[2019-11-13]1pkt
2019-11-14 07:03:38
111.248.0.78 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/111.248.0.78/ 
 
 TW - 1H : (233)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 111.248.0.78 
 
 CIDR : 111.248.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 25 
  3H - 79 
  6H - 140 
 12H - 208 
 24H - 208 
 
 DateTime : 2019-11-13 23:58:34 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-14 07:38:11
106.54.95.232 attackspam
Nov 13 23:59:09 vpn01 sshd[936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.95.232
Nov 13 23:59:11 vpn01 sshd[936]: Failed password for invalid user rueth from 106.54.95.232 port 38240 ssh2
...
2019-11-14 07:12:11
194.219.29.87 attack
Nov 13 12:58:56 tdfoods sshd\[15414\]: Invalid user pi from 194.219.29.87
Nov 13 12:58:56 tdfoods sshd\[15415\]: Invalid user pi from 194.219.29.87
Nov 13 12:58:56 tdfoods sshd\[15414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=collegegp.ath.forthnet.gr
Nov 13 12:58:57 tdfoods sshd\[15415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=collegegp.ath.forthnet.gr
Nov 13 12:58:58 tdfoods sshd\[15414\]: Failed password for invalid user pi from 194.219.29.87 port 42706 ssh2
2019-11-14 07:21:41
139.155.5.132 attackbots
Nov 14 00:22:24 dedicated sshd[13918]: Invalid user 123456 from 139.155.5.132 port 56392
2019-11-14 07:35:34
222.186.173.215 attackspambots
Nov 14 00:08:40 dcd-gentoo sshd[4047]: User root from 222.186.173.215 not allowed because none of user's groups are listed in AllowGroups
Nov 14 00:08:42 dcd-gentoo sshd[4047]: error: PAM: Authentication failure for illegal user root from 222.186.173.215
Nov 14 00:08:40 dcd-gentoo sshd[4047]: User root from 222.186.173.215 not allowed because none of user's groups are listed in AllowGroups
Nov 14 00:08:42 dcd-gentoo sshd[4047]: error: PAM: Authentication failure for illegal user root from 222.186.173.215
Nov 14 00:08:40 dcd-gentoo sshd[4047]: User root from 222.186.173.215 not allowed because none of user's groups are listed in AllowGroups
Nov 14 00:08:42 dcd-gentoo sshd[4047]: error: PAM: Authentication failure for illegal user root from 222.186.173.215
Nov 14 00:08:42 dcd-gentoo sshd[4047]: Failed keyboard-interactive/pam for invalid user root from 222.186.173.215 port 53546 ssh2
...
2019-11-14 07:15:48
154.126.190.56 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/154.126.190.56/ 
 
 CM - 1H : (2)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CM 
 NAME ASN : ASN36905 
 
 IP : 154.126.190.56 
 
 CIDR : 154.126.160.0/19 
 
 PREFIX COUNT : 3 
 
 UNIQUE IP COUNT : 17408 
 
 
 ATTACKS DETECTED ASN36905 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-11-13 23:59:20 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-14 07:04:12
41.45.214.163 attackspambots
Nov 14 01:52:51 master sshd[28414]: Failed password for invalid user admin from 41.45.214.163 port 50143 ssh2
2019-11-14 07:39:16
159.89.115.127 attack
8080/tcp 8080/tcp 8080/tcp
[2019-11-13]3pkt
2019-11-14 07:07:00
123.21.237.197 attack
23/tcp
[2019-11-13]1pkt
2019-11-14 07:30:08
123.10.61.107 attackbots
9000/tcp
[2019-11-13]1pkt
2019-11-14 07:25:24
167.71.201.16 attackbots
xmlrpc attack
2019-11-14 07:19:39
54.38.241.162 attackbots
2019-11-13T22:59:08.491581abusebot-5.cloudsearch.cf sshd\[28931\]: Invalid user sequences from 54.38.241.162 port 49258
2019-11-14 07:15:32
170.150.234.186 attack
23/tcp
[2019-11-13]1pkt
2019-11-14 07:17:02
157.34.174.223 attackbots
445/tcp
[2019-11-13]1pkt
2019-11-14 07:33:00

Recently Reported IPs

12.166.61.163 12.167.4.138 12.167.5.63 12.167.4.87
12.167.5.94 12.167.75.32 12.169.140.7 12.169.203.48
12.172.140.137 12.171.94.34 12.181.195.126 12.181.121.202
12.18.72.170 12.178.69.181 12.181.44.68 12.182.150.138
12.181.2.100 12.182.150.99 12.180.242.91 12.182.181.129