Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.69.68.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.69.68.47.			IN	A

;; AUTHORITY SECTION:
.			95	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022121300 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 13 14:57:22 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 47.68.69.13.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 47.68.69.13.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.156.73.38 attackspambots
03/27/2020-06:45:07.342825 185.156.73.38 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-27 18:52:21
185.176.27.34 attack
03/27/2020-06:35:18.068059 185.176.27.34 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-27 18:47:34
92.118.37.86 attack
[MK-VM2] Blocked by UFW
2020-03-27 19:02:39
198.108.66.231 attackspambots
Mar 27 09:14:58 debian-2gb-nbg1-2 kernel: \[7555969.734628\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=198.108.66.231 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=31 ID=64424 PROTO=TCP SPT=20790 DPT=9518 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-27 18:42:07
106.51.50.2 attack
Attempted connection to port 22.
2020-03-27 19:20:00
79.137.33.20 attackbots
web-1 [ssh] SSH Attack
2020-03-27 19:16:23
66.240.205.34 attackspambots
Unauthorized connection attempt detected from IP address 66.240.205.34 to port 80
2020-03-27 19:08:49
71.6.146.185 attack
Unauthorized connection attempt detected from IP address 71.6.146.185 to port 5984
2020-03-27 19:07:49
185.176.27.162 attack
scans 17 times in preceeding hours on the ports (in chronological order) 5863 8743 4200 3361 1405 3370 1400 1616 9835 10055 10012 8895 3325 10033 60711 6819 4111 resulting in total of 218 scans from 185.176.27.0/24 block.
2020-03-27 18:45:36
185.176.27.250 attack
scans 3 times in preceeding hours on the ports (in chronological order) 55555 5188 16888 resulting in total of 218 scans from 185.176.27.0/24 block.
2020-03-27 18:44:28
185.94.111.1 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 13331 1900
2020-03-27 18:54:32
185.153.198.249 attack
03/27/2020-06:12:58.943746 185.153.198.249 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-27 18:52:36
176.113.70.60 attack
scans 9 times in preceeding hours on the ports (in chronological order) 1900 1900 1900 1900 1900 1900 1900 1900 1900
2020-03-27 18:56:53
80.82.77.240 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-27 18:30:36
71.6.232.6 attack
SIP/5060 Probe, BF, Hack -
2020-03-27 19:07:10

Recently Reported IPs

207.133.30.197 206.250.195.196 2600:1008:b046:d908:0:c:84b0:9301 206.141.20.174
205.93.26.6 205.210.238.66 204.23.207.60 185.255.92.201
158.0.35.36 203.62.121.242 203.237.70.222 176.111.174.143
39.155.100.183 48.94.168.209 210.100.247.37 203.134.182.246
79.102.22.96 78.151.161.62 107.161.22.254 29.91.81.252