Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.196.122.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.196.122.68.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:17:47 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 68.122.196.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.122.196.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.181.186.42 attack
Trying to enter to bank account
2021-11-14 15:02:19
87.246.7.245 attack
sasl failed login
2021-12-06 17:41:57
163.239.31.183 spam
vds satin al

vds satin al

Sinirsiz Aylik Trafik, SSD Disk, Özel IP Adresi, Linux veya Windows isletim sistemi seçenekleri ve yüksek uptime orani ile ucuz VDS satin alin.

vds satin al
2021-12-20 06:25:38
154.28.188.220 attack
Attacking qnap
2021-12-03 21:08:40
45.230.176.146 attack
Tried to access my Credit Card today.
2021-11-14 07:40:35
167.71.69.64 normal
Bonus depo saya
2021-11-11 22:52:02
78.128.113.68 attack
PPTP  attack
2021-12-17 10:27:25
193.56.29.186 spamattack
Brute-Force
2021-11-09 22:39:39
160.116.83.110 spamattackproxy
hacker/scammer
2021-12-14 18:58:20
112.215.237.253 normal
Mencari lokasi
2021-11-11 00:30:36
177.154.28.154 spam
I've received email from this ip requesting $1700 or else all my personal info will be leaked. The attacker spoofs the To field in the email so it looks like you sent the message to yourself
2021-12-20 05:29:38
187.1.23.31 spamnormal
Received: from [127.0.0.1] (187.1.23.31) by AnceMail01.ance.it (192.168.100.53) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Wed, 3 Nov 2021 19:00:03 +0100
From: Harper 
2021-11-04 02:23:25
192.168.1.1 attack
Wifi_Perso_2.4G
2021-12-14 07:43:49
107.77.197.181 attack
Hacker
2021-11-09 00:19:22
169.254.126.53 attack
Hack Wi-Fi
2021-11-06 07:17:55

Recently Reported IPs

139.196.122.119 139.196.122.195 139.196.123.72 139.196.123.15
139.196.123.84 139.196.123.208 139.196.124.72 139.196.124.164
118.24.91.10 139.196.124.97 139.196.125.101 139.196.125.29
139.196.125.109 139.196.125.96 139.196.126.203 139.196.126.174
139.196.126.58 139.196.126.102 139.196.126.75 118.24.92.193