Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Israel

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.68.64.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.68.64.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 06:07:20 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 7.64.68.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.64.68.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.237.58.150 attackbots
Honeypot attack, port: 445, PTR: dynamic-ip-adsl.viettel.vn.
2020-05-11 01:48:16
110.137.39.236 attackspam
Honeypot attack, port: 81, PTR: 236.subnet110-137-39.speedy.telkom.net.id.
2020-05-11 01:37:32
45.142.127.8 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-11 01:53:54
114.237.206.21 attackspam
Honeypot attack, port: 5555, PTR: 21.206.237.114.broad.lyg.js.dynamic.163data.com.cn.
2020-05-11 01:39:19
139.59.57.64 attackbots
139.59.57.64 - - [10/May/2020:17:10:25 +0300] "POST /wp-login.php HTTP/1.1" 200 3436 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-11 01:36:17
50.211.196.245 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-05-11 01:45:03
177.124.40.7 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-11 01:41:24
68.183.184.7 attackspam
68.183.184.7 - - [10/May/2020:17:50:56 +0200] "POST /wp-login.php HTTP/1.1" 200 3406 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.184.7 - - [10/May/2020:17:50:58 +0200] "POST /wp-login.php HTTP/1.1" 200 3382 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-05-11 01:44:33
114.34.215.173 attackbots
scan z
2020-05-11 01:51:46
62.42.5.118 attackspambots
Honeypot attack, port: 81, PTR: 62.42.5.118.dyn.user.ono.com.
2020-05-11 02:02:34
217.88.78.40 attackbotsspam
(sshd) Failed SSH login from 217.88.78.40 (DE/Germany/pD9584E28.dip0.t-ipconnect.de): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 10 18:21:02 ubnt-55d23 sshd[8937]: Invalid user fan from 217.88.78.40 port 56736
May 10 18:21:05 ubnt-55d23 sshd[8937]: Failed password for invalid user fan from 217.88.78.40 port 56736 ssh2
2020-05-11 01:26:02
68.183.19.84 attackbotsspam
SSH brute-force: detected 22 distinct usernames within a 24-hour window.
2020-05-11 01:41:51
92.35.61.122 attackspam
Unauthorized connection attempt detected from IP address 92.35.61.122 to port 5555
2020-05-11 01:28:03
220.134.25.134 attackbotsspam
Honeypot attack, port: 81, PTR: 220-134-25-134.HINET-IP.hinet.net.
2020-05-11 02:03:05
223.18.146.223 attackbotsspam
Honeypot attack, port: 5555, PTR: 223-146-18-223-on-nets.com.
2020-05-11 02:04:08

Recently Reported IPs

68.144.204.206 84.207.200.221 224.85.121.116 62.36.227.148
197.23.104.154 114.128.218.203 70.155.144.218 206.122.240.198
116.78.33.74 156.227.130.3 165.215.154.69 156.73.48.28
155.154.143.237 115.138.226.13 52.143.60.90 197.204.46.176
136.65.127.121 94.159.95.168 156.163.53.64 120.245.23.148