Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       167.68.0.0 - 167.68.255.255
CIDR:           167.68.0.0/16
NetName:        TLR-167-68-0-0-1
NetHandle:      NET-167-68-0-0-1
Parent:         NET167 (NET-167-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Thomson Reuters (Legal) Inc.  (TLR-34)
RegDate:        1993-05-05
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/167.68.0.0


OrgName:        Thomson Reuters (Legal) Inc. 
OrgId:          TLR-34
Address:        610 Opperman Dr
City:           Eagan
StateProv:      MN
PostalCode:     55123
Country:        US
RegDate:        2006-05-17
Updated:        2014-12-03
Ref:            https://rdap.arin.net/registry/entity/TLR-34


OrgAbuseHandle: TRIPA1-ARIN
OrgAbuseName:   TR-IP-Abuse
OrgAbusePhone:  +1-651-687-7000 
OrgAbuseEmail:  TR.IP-ABUSE@thomsonreuters.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/TRIPA1-ARIN

OrgTechHandle: TRIPT-ARIN
OrgTechName:   TR-IP-TECH
OrgTechPhone:  +1-651-687-7000 
OrgTechEmail:  TR.IP-TECH@thomsonreuters.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TRIPT-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 167.68.42.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18704
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;167.68.42.168.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092000 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Sep 20 16:45:01 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 168.42.68.167.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.42.68.167.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.28.2.60 attackbotsspam
Oct  6 03:19:53 auw2 sshd\[32030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.2.60  user=root
Oct  6 03:19:55 auw2 sshd\[32030\]: Failed password for root from 103.28.2.60 port 43244 ssh2
Oct  6 03:24:50 auw2 sshd\[32416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.2.60  user=root
Oct  6 03:24:52 auw2 sshd\[32416\]: Failed password for root from 103.28.2.60 port 35596 ssh2
Oct  6 03:29:49 auw2 sshd\[405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.28.2.60  user=root
2019-10-07 01:27:36
195.14.36.199 attack
Port 1433 Scan
2019-10-07 01:18:52
194.37.92.42 attackspambots
2019-10-06T17:00:09.843943abusebot-2.cloudsearch.cf sshd\[23463\]: Invalid user 5T6Y7U8I9O0P from 194.37.92.42 port 43777
2019-10-07 01:10:23
115.68.220.10 attackspambots
2019-10-06T12:24:14.510125shield sshd\[9331\]: Invalid user 123Danger from 115.68.220.10 port 48182
2019-10-06T12:24:14.514490shield sshd\[9331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.220.10
2019-10-06T12:24:16.319179shield sshd\[9331\]: Failed password for invalid user 123Danger from 115.68.220.10 port 48182 ssh2
2019-10-06T12:28:14.498555shield sshd\[9632\]: Invalid user P4ssword!@\#\$ from 115.68.220.10 port 51198
2019-10-06T12:28:14.503140shield sshd\[9632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.68.220.10
2019-10-07 01:25:09
58.220.249.130 attackspam
10/06/2019-07:41:04.494997 58.220.249.130 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 54
2019-10-07 01:39:15
62.234.109.155 attackspambots
Oct  6 16:02:41 sshgateway sshd\[4221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.109.155  user=root
Oct  6 16:02:44 sshgateway sshd\[4221\]: Failed password for root from 62.234.109.155 port 59403 ssh2
Oct  6 16:08:13 sshgateway sshd\[4242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.109.155  user=root
2019-10-07 01:37:49
52.163.221.85 attackspambots
Oct  6 07:25:02 php1 sshd\[6499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.163.221.85  user=root
Oct  6 07:25:05 php1 sshd\[6499\]: Failed password for root from 52.163.221.85 port 47706 ssh2
Oct  6 07:29:24 php1 sshd\[6925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.163.221.85  user=root
Oct  6 07:29:25 php1 sshd\[6925\]: Failed password for root from 52.163.221.85 port 32792 ssh2
Oct  6 07:33:45 php1 sshd\[7454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.163.221.85  user=root
2019-10-07 01:43:16
116.20.61.205 attack
Port 1433 Scan
2019-10-07 01:36:30
182.61.109.92 attack
Oct  6 13:37:58 TORMINT sshd\[9299\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.92  user=root
Oct  6 13:38:01 TORMINT sshd\[9299\]: Failed password for root from 182.61.109.92 port 41260 ssh2
Oct  6 13:42:14 TORMINT sshd\[9525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.109.92  user=root
...
2019-10-07 01:49:12
101.29.180.123 attackbots
Unauthorised access (Oct  6) SRC=101.29.180.123 LEN=40 TTL=49 ID=48949 TCP DPT=8080 WINDOW=55912 SYN 
Unauthorised access (Oct  6) SRC=101.29.180.123 LEN=40 TTL=49 ID=34451 TCP DPT=8080 WINDOW=26490 SYN
2019-10-07 01:40:45
90.143.146.224 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-07 01:29:32
2.82.142.142 attackspambots
Automatic report - Port Scan
2019-10-07 01:13:49
110.244.75.92 attackbots
Unauthorised access (Oct  6) SRC=110.244.75.92 LEN=40 TTL=49 ID=3636 TCP DPT=8080 WINDOW=52735 SYN
2019-10-07 01:21:06
89.248.168.202 attackbots
10/06/2019-18:56:54.664291 89.248.168.202 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-07 01:22:18
187.162.62.12 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-07 01:45:42

Recently Reported IPs

9.13.85.5 185.246.87.99 104.129.167.161 162.216.149.151
246.123.83.152 182.42.111.156 82.207.88.189 34.155.79.151
91.92.241.199 64.62.156.197 209.38.19.118 221.207.21.28
64.62.156.199 40.124.175.225 2001:8a0:578a:f201:85f1:486f:7bc:7401 172.250.192.156
216.180.246.8 73.244.82.148 34.77.159.182 61.160.247.102