Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
164.68.106.33 attack
 TCP (SYN) 164.68.106.33:52605 -> port 5038, len 44
2020-10-12 23:47:32
164.68.106.33 attack
ET SCAN NMAP -sS window 1024
2020-10-12 15:12:10
164.68.106.33 attackbots
 TCP (SYN) 164.68.106.33:54435 -> port 5038, len 44
2020-10-05 02:01:28
164.68.106.33 attackspambots
Found on   CINS badguys     / proto=6  .  srcport=46016  .  dstport=5038  .     (367)
2020-10-04 17:44:16
164.68.106.33 attack
 TCP (SYN) 164.68.106.33:48518 -> port 5038, len 44
2020-09-16 21:58:14
164.68.106.33 attackbots
Port scanning [2 denied]
2020-09-16 14:28:36
164.68.106.33 attackspambots
SP-Scan 44785:5038 detected 2020.09.15 19:30:21
blocked until 2020.11.04 11:33:08
2020-09-16 06:17:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 164.68.106.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30909
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;164.68.106.132.			IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022090200 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 02 21:30:44 CST 2022
;; MSG SIZE  rcvd: 107
Host info
132.106.68.164.in-addr.arpa domain name pointer ip-132-106-68-164.static.contabo.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.106.68.164.in-addr.arpa	name = ip-132-106-68-164.static.contabo.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
192.154.224.175 attack
Port Scan: TCP/445
2019-09-02 23:40:37
152.231.34.118 attackbots
Port Scan: UDP/39703
2019-09-02 23:46:22
198.179.105.133 attackbots
Port Scan: TCP/22375
2019-09-02 23:39:59
66.116.85.144 attack
Port Scan: UDP/137
2019-09-02 23:32:57
106.12.181.184 attackbotsspam
2019-09-02T14:26:15.929045hub.schaetter.us sshd\[21076\]: Invalid user pbb from 106.12.181.184
2019-09-02T14:26:15.960933hub.schaetter.us sshd\[21076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.184
2019-09-02T14:26:18.160365hub.schaetter.us sshd\[21076\]: Failed password for invalid user pbb from 106.12.181.184 port 51122 ssh2
2019-09-02T14:31:38.159893hub.schaetter.us sshd\[21109\]: Invalid user nova from 106.12.181.184
2019-09-02T14:31:38.191135hub.schaetter.us sshd\[21109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.184
...
2019-09-02 22:58:21
213.141.51.211 attack
5555/tcp
[2019-09-02]1pkt
2019-09-02 22:56:21
122.195.200.148 attackbotsspam
09/02/2019-10:55:05.841729 122.195.200.148 Protocol: 6 ET SCAN Potential SSH Scan
2019-09-02 22:59:09
222.186.52.124 attackspam
Sep  2 17:51:55 server2 sshd\[11312\]: User root from 222.186.52.124 not allowed because not listed in AllowUsers
Sep  2 17:52:01 server2 sshd\[11314\]: User root from 222.186.52.124 not allowed because not listed in AllowUsers
Sep  2 17:52:02 server2 sshd\[11316\]: User root from 222.186.52.124 not allowed because not listed in AllowUsers
Sep  2 17:52:02 server2 sshd\[11339\]: User root from 222.186.52.124 not allowed because not listed in AllowUsers
Sep  2 17:54:25 server2 sshd\[11411\]: User root from 222.186.52.124 not allowed because not listed in AllowUsers
Sep  2 17:55:44 server2 sshd\[11627\]: User root from 222.186.52.124 not allowed because not listed in AllowUsers
2019-09-02 22:57:45
70.182.10.24 attackbots
Port Scan: UDP/32789
2019-09-02 23:58:34
41.89.196.25 attackspam
445/tcp
[2019-09-02]1pkt
2019-09-02 23:13:27
115.55.55.49 attackbotsspam
Port Scan: TCP/23
2019-09-02 23:50:43
205.162.10.7 attackbotsspam
Port Scan: UDP/37853
2019-09-02 23:39:04
189.113.37.202 attack
Port Scan: TCP/34567
2019-09-02 23:42:34
41.38.164.147 attackbots
Port Scan: TCP/445
2019-09-03 00:02:58
83.96.76.250 attackbots
Port Scan: TCP/443
2019-09-02 23:25:05

Recently Reported IPs

154.26.132.95 198.206.182.235 198.206.183.119 198.206.183.72
25.100.157.206 233.82.35.62 40.121.83.174 52.254.85.99
162.19.7.53 176.57.68.233 176.251.200.197 72.16.50.45
72.16.50.179 72.16.50.33 173.212.231.90 45.94.255.28
45.94.255.29 152.44.34.32 156.227.14.97 177.47.113.140