Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.68.100.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9371
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.68.100.12.			IN	A

;; AUTHORITY SECTION:
.			206	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 06:31:36 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 12.100.68.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.100.68.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
115.231.174.170 attackspambots
Oct 17 17:41:55 ahost sshd[23086]: Invalid user adrc from 115.231.174.170
Oct 17 17:41:55 ahost sshd[23086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.174.170 
Oct 17 17:41:56 ahost sshd[23086]: Failed password for invalid user adrc from 115.231.174.170 port 37565 ssh2
Oct 17 17:41:57 ahost sshd[23086]: Received disconnect from 115.231.174.170: 11: Bye Bye [preauth]
Oct 17 17:53:34 ahost sshd[23202]: Invalid user test from 115.231.174.170
Oct 17 17:53:34 ahost sshd[23202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.174.170 
Oct 17 17:53:36 ahost sshd[23202]: Failed password for invalid user test from 115.231.174.170 port 41896 ssh2
Oct 17 17:53:36 ahost sshd[23202]: Received disconnect from 115.231.174.170: 11: Bye Bye [preauth]
Oct 17 17:59:08 ahost sshd[23267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.174.170 ........
------------------------------
2019-10-20 20:05:11
117.55.241.3 attackspambots
Oct 20 13:28:08 MainVPS sshd[20869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.55.241.3  user=root
Oct 20 13:28:10 MainVPS sshd[20869]: Failed password for root from 117.55.241.3 port 53692 ssh2
Oct 20 13:32:49 MainVPS sshd[21197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.55.241.3  user=root
Oct 20 13:32:50 MainVPS sshd[21197]: Failed password for root from 117.55.241.3 port 33290 ssh2
Oct 20 13:37:23 MainVPS sshd[21519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.55.241.3  user=root
Oct 20 13:37:25 MainVPS sshd[21519]: Failed password for root from 117.55.241.3 port 41130 ssh2
...
2019-10-20 19:49:35
122.15.82.83 attack
Oct 20 06:57:55 intra sshd\[52653\]: Invalid user report from 122.15.82.83Oct 20 06:57:57 intra sshd\[52653\]: Failed password for invalid user report from 122.15.82.83 port 47292 ssh2Oct 20 07:02:25 intra sshd\[52756\]: Invalid user zaq1@WSX from 122.15.82.83Oct 20 07:02:27 intra sshd\[52756\]: Failed password for invalid user zaq1@WSX from 122.15.82.83 port 56092 ssh2Oct 20 07:06:51 intra sshd\[52833\]: Invalid user abdelkarim from 122.15.82.83Oct 20 07:06:52 intra sshd\[52833\]: Failed password for invalid user abdelkarim from 122.15.82.83 port 36662 ssh2
...
2019-10-20 19:50:21
13.80.112.16 attackspambots
Oct 20 07:01:15 www sshd\[12159\]: Failed password for root from 13.80.112.16 port 44452 ssh2Oct 20 07:08:39 www sshd\[12461\]: Invalid user upload from 13.80.112.16Oct 20 07:08:41 www sshd\[12461\]: Failed password for invalid user upload from 13.80.112.16 port 50382 ssh2
...
2019-10-20 19:45:47
79.12.166.141 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/79.12.166.141/ 
 
 IT - 1H : (90)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : IT 
 NAME ASN : ASN3269 
 
 IP : 79.12.166.141 
 
 CIDR : 79.12.0.0/15 
 
 PREFIX COUNT : 550 
 
 UNIQUE IP COUNT : 19507712 
 
 
 ATTACKS DETECTED ASN3269 :  
  1H - 3 
  3H - 6 
  6H - 10 
 12H - 21 
 24H - 42 
 
 DateTime : 2019-10-20 05:44:52 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-20 19:46:44
129.28.169.208 attackbotsspam
Oct 16 22:13:55 ovpn sshd[8297]: Invalid user master from 129.28.169.208
Oct 16 22:13:55 ovpn sshd[8297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.169.208
Oct 16 22:13:56 ovpn sshd[8297]: Failed password for invalid user master from 129.28.169.208 port 54236 ssh2
Oct 16 22:13:56 ovpn sshd[8297]: Received disconnect from 129.28.169.208 port 54236:11: Bye Bye [preauth]
Oct 16 22:13:56 ovpn sshd[8297]: Disconnected from 129.28.169.208 port 54236 [preauth]
Oct 16 22:23:06 ovpn sshd[10075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.169.208  user=r.r
Oct 16 22:23:08 ovpn sshd[10075]: Failed password for r.r from 129.28.169.208 port 58692 ssh2
Oct 16 22:23:09 ovpn sshd[10075]: Received disconnect from 129.28.169.208 port 58692:11: Bye Bye [preauth]
Oct 16 22:23:09 ovpn sshd[10075]: Disconnected from 129.28.169.208 port 58692 [preauth]

........
-----------------------------------------------
https://www.blockli
2019-10-20 19:33:35
116.111.212.176 attack
Oct 20 10:44:12 lcl-usvr-02 sshd[31459]: Invalid user super from 116.111.212.176 port 52371
Oct 20 10:44:12 lcl-usvr-02 sshd[31459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.111.212.176
Oct 20 10:44:12 lcl-usvr-02 sshd[31459]: Invalid user super from 116.111.212.176 port 52371
Oct 20 10:44:14 lcl-usvr-02 sshd[31459]: Failed password for invalid user super from 116.111.212.176 port 52371 ssh2
Oct 20 10:44:12 lcl-usvr-02 sshd[31459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.111.212.176
Oct 20 10:44:12 lcl-usvr-02 sshd[31459]: Invalid user super from 116.111.212.176 port 52371
Oct 20 10:44:14 lcl-usvr-02 sshd[31459]: Failed password for invalid user super from 116.111.212.176 port 52371 ssh2
Oct 20 10:44:14 lcl-usvr-02 sshd[31459]: error: Received disconnect from 116.111.212.176 port 52371:3: com.jcraft.jsch.JSchException: Auth fail [preauth]
...
2019-10-20 20:08:56
122.175.55.196 attack
Oct 20 10:32:04 server sshd\[22213\]: Invalid user yang from 122.175.55.196
Oct 20 10:32:04 server sshd\[22213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.175.55.196 
Oct 20 10:32:06 server sshd\[22213\]: Failed password for invalid user yang from 122.175.55.196 port 48206 ssh2
Oct 20 10:40:15 server sshd\[24298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.175.55.196  user=root
Oct 20 10:40:16 server sshd\[24298\]: Failed password for root from 122.175.55.196 port 19953 ssh2
...
2019-10-20 19:39:50
81.120.65.55 attack
Malicious/Probing: /2016/wp-login.php
2019-10-20 19:52:49
201.114.252.23 attack
2019-09-25T04:30:46.106870suse-nuc sshd[19453]: Invalid user cqusers from 201.114.252.23 port 34824
...
2019-10-20 19:59:51
58.254.132.140 attackbotsspam
Fail2Ban Ban Triggered
2019-10-20 19:36:47
46.101.43.235 attack
Oct 16 23:58:43 plesk sshd[4399]: Invalid user = from 46.101.43.235
Oct 16 23:58:43 plesk sshd[4399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.235 
Oct 16 23:58:45 plesk sshd[4399]: Failed password for invalid user = from 46.101.43.235 port 51388 ssh2
Oct 16 23:58:45 plesk sshd[4399]: Received disconnect from 46.101.43.235: 11: Bye Bye [preauth]
Oct 16 23:59:26 plesk sshd[4458]: Invalid user , from 46.101.43.235
Oct 16 23:59:26 plesk sshd[4458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.43.235 
Oct 16 23:59:28 plesk sshd[4458]: Failed password for invalid user , from 46.101.43.235 port 42789 ssh2
Oct 16 23:59:28 plesk sshd[4458]: Received disconnect from 46.101.43.235: 11: Bye Bye [preauth]
Oct 17 00:00:09 plesk sshd[4497]: Invalid user ! from 46.101.43.235
Oct 17 00:00:09 plesk sshd[4497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=s........
-------------------------------
2019-10-20 19:39:01
210.56.20.181 attack
2019-10-20T11:35:22.287770abusebot-5.cloudsearch.cf sshd\[19858\]: Invalid user alberto from 210.56.20.181 port 34010
2019-10-20 19:40:18
167.99.74.119 attackbots
C1,WP GET /chicken-house2018/wp-login.php
2019-10-20 19:29:54
220.76.205.178 attackspambots
2019-10-03T07:13:13.618921suse-nuc sshd[23862]: Invalid user siriusadmin from 220.76.205.178 port 59414
...
2019-10-20 19:53:27

Recently Reported IPs

13.67.90.144 13.68.115.184 13.68.105.47 13.68.146.209
13.68.182.126 13.68.156.208 13.68.105.43 13.68.131.3
13.68.188.178 13.68.195.86 13.68.223.33 13.68.83.170
13.68.225.93 13.68.28.109 13.69.13.203 13.68.92.165
13.68.232.100 13.68.85.163 13.69.126.167 13.69.15.29