Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bemidji

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Minnesota State Colleges and Universities

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.17.190.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39653
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.17.190.69.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 20:57:25 CST 2019
;; MSG SIZE  rcvd: 117

Host info
69.190.17.199.in-addr.arpa domain name pointer bsu190069.bemidjistate.edu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
69.190.17.199.in-addr.arpa	name = bsu190069.bemidjistate.edu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
198.108.67.56 attack
47808/tcp 5595/tcp 800/tcp...
[2020-02-20/04-21]95pkt,88pt.(tcp)
2020-04-21 16:35:56
51.178.55.87 attack
SSH Brute Force
2020-04-21 16:47:42
61.19.228.102 attackspambots
20/4/20@23:51:57: FAIL: Alarm-Network address from=61.19.228.102
...
2020-04-21 16:47:25
170.210.214.50 attack
Invalid user uc from 170.210.214.50 port 52112
2020-04-21 16:52:20
58.119.172.1 attack
Unauthorized connection attempt detected from IP address 58.119.172.1 to port 1433 [T]
2020-04-21 16:24:13
101.108.161.114 attack
SSH brutforce
2020-04-21 16:50:29
192.227.223.126 attackbots
[portscan] tcp/22 [SSH]
in blocklist.de:'listed [ssh]'
*(RWIN=65535)(04211031)
2020-04-21 16:39:53
137.74.132.171 attack
$f2bV_matches
2020-04-21 16:45:01
111.10.24.147 attackbotsspam
$f2bV_matches
2020-04-21 16:28:27
188.166.185.236 attackbots
Invalid user ubuntu from 188.166.185.236 port 43559
2020-04-21 16:21:56
106.12.70.118 attack
Apr 21 14:44:41 itv-usvr-01 sshd[12205]: Invalid user test from 106.12.70.118
Apr 21 14:44:41 itv-usvr-01 sshd[12205]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.70.118
Apr 21 14:44:41 itv-usvr-01 sshd[12205]: Invalid user test from 106.12.70.118
Apr 21 14:44:42 itv-usvr-01 sshd[12205]: Failed password for invalid user test from 106.12.70.118 port 43022 ssh2
Apr 21 14:48:12 itv-usvr-01 sshd[12331]: Invalid user ux from 106.12.70.118
2020-04-21 16:47:07
140.246.175.68 attack
$f2bV_matches
2020-04-21 16:51:21
1.179.154.21 attackbots
Apr 21 05:52:18 *host* sshd\[21825\]: Invalid user dircreate from 1.179.154.21 port 64042
2020-04-21 16:30:32
139.99.134.167 attackspambots
2020-04-21T00:47:28.9865681495-001 sshd[4639]: Invalid user zs from 139.99.134.167 port 59008
2020-04-21T00:47:28.9912971495-001 sshd[4639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.ip-139-99-134.net
2020-04-21T00:47:28.9865681495-001 sshd[4639]: Invalid user zs from 139.99.134.167 port 59008
2020-04-21T00:47:30.7542451495-001 sshd[4639]: Failed password for invalid user zs from 139.99.134.167 port 59008 ssh2
2020-04-21T00:54:31.4658311495-001 sshd[5012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.ip-139-99-134.net  user=root
2020-04-21T00:54:33.9676581495-001 sshd[5012]: Failed password for root from 139.99.134.167 port 47834 ssh2
...
2020-04-21 16:16:23
213.180.203.158 attack
[Tue Apr 21 10:52:11.556079 2020] [:error] [pid 24129:tid 139755073300224] [client 213.180.203.158:35748] [client 213.180.203.158] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "Xp5t6-uesU4r2dl7v7RkUQAAAcM"]
...
2020-04-21 16:33:40

Recently Reported IPs

66.22.143.119 46.201.211.215 222.60.98.91 203.14.242.48
202.118.23.36 89.37.123.222 168.138.93.118 198.108.67.30
175.176.126.110 49.222.157.161 122.69.221.139 52.238.93.81
154.36.32.151 197.45.105.213 71.163.237.173 52.122.192.25
171.99.75.177 137.42.24.244 89.66.22.104 59.25.180.237