Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.139.68.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.139.68.69.			IN	A

;; AUTHORITY SECTION:
.			268	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052300 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 02:34:19 CST 2023
;; MSG SIZE  rcvd: 106
Host info
69.68.139.203.in-addr.arpa domain name pointer sydcd-03p2-69.ppp11.odn.ad.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
69.68.139.203.in-addr.arpa	name = sydcd-03p2-69.ppp11.odn.ad.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.22.74.38 attackbots
Unauthorized connection attempt from IP address 113.22.74.38 on Port 445(SMB)
2019-10-20 23:22:30
210.212.78.34 attackspambots
Unauthorized connection attempt from IP address 210.212.78.34 on Port 445(SMB)
2019-10-20 23:31:22
195.140.224.4 attackbots
Unauthorized connection attempt from IP address 195.140.224.4 on Port 445(SMB)
2019-10-20 23:30:23
149.202.43.72 attackbotsspam
Oct 20 08:28:55 wildwolf wplogin[5105]: 149.202.43.72 prometheus.ngo [2019-10-20 08:28:55+0000] "POST /cms/wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "" "admin1"
Oct 20 08:28:56 wildwolf wplogin[5470]: 149.202.43.72 prometheus.ngo [2019-10-20 08:28:56+0000] "POST /cms/xmlrpc.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "admin" ""
Oct 20 08:31:19 wildwolf wplogin[5176]: 149.202.43.72 prometheus.ngo [2019-10-20 08:31:19+0000] "POST /2017/wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "admin" "edhostnameor"
Oct 20 08:31:20 wildwolf wplogin[3438]: 149.202.43.72 prometheus.ngo [2019-10-20 08:31:20+0000] "POST /2017/xmlrpc.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "admin" ""
Oct 20 10:04:52 wildwolf wplogin[32563]: 149.202.43.72 prometheus.ngo [2019-10........
------------------------------
2019-10-20 23:22:05
177.72.131.54 attackspam
Unauthorised access (Oct 20) SRC=177.72.131.54 LEN=40 TTL=50 ID=19911 TCP DPT=23 WINDOW=13094 SYN 
Unauthorised access (Oct 19) SRC=177.72.131.54 LEN=40 TTL=50 ID=59609 TCP DPT=23 WINDOW=13094 SYN
2019-10-20 22:43:40
103.54.219.106 attackspambots
Oct 20 13:26:15 microserver sshd[553]: Failed password for root from 103.54.219.106 port 28456 ssh2
Oct 20 13:30:25 microserver sshd[1151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.54.219.106  user=root
Oct 20 13:30:28 microserver sshd[1151]: Failed password for root from 103.54.219.106 port 47099 ssh2
Oct 20 13:34:35 microserver sshd[1392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.54.219.106  user=root
Oct 20 13:47:02 microserver sshd[3200]: Invalid user yseo from 103.54.219.106 port 65178
Oct 20 13:47:02 microserver sshd[3200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.54.219.106
Oct 20 13:47:04 microserver sshd[3200]: Failed password for invalid user yseo from 103.54.219.106 port 65178 ssh2
Oct 20 13:51:18 microserver sshd[3816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.54.219.106  user=root
Oct 20 13:51:20
2019-10-20 23:39:42
13.72.67.11 attackbotsspam
BadRequests
2019-10-20 23:00:25
195.9.185.62 attackbotsspam
Unauthorized connection attempt from IP address 195.9.185.62 on Port 445(SMB)
2019-10-20 23:40:07
181.143.72.66 attackspambots
$f2bV_matches
2019-10-20 23:25:57
157.230.63.232 attackbotsspam
Oct 20 05:30:31 php1 sshd\[30098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.63.232  user=root
Oct 20 05:30:34 php1 sshd\[30098\]: Failed password for root from 157.230.63.232 port 40834 ssh2
Oct 20 05:34:08 php1 sshd\[30564\]: Invalid user steam from 157.230.63.232
Oct 20 05:34:08 php1 sshd\[30564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.63.232
Oct 20 05:34:10 php1 sshd\[30564\]: Failed password for invalid user steam from 157.230.63.232 port 52294 ssh2
2019-10-20 23:35:30
123.30.128.138 attack
Oct 20 14:01:47 rotator sshd\[4532\]: Failed password for root from 123.30.128.138 port 40970 ssh2Oct 20 14:01:50 rotator sshd\[4532\]: Failed password for root from 123.30.128.138 port 40970 ssh2Oct 20 14:01:53 rotator sshd\[4532\]: Failed password for root from 123.30.128.138 port 40970 ssh2Oct 20 14:01:56 rotator sshd\[4532\]: Failed password for root from 123.30.128.138 port 40970 ssh2Oct 20 14:02:00 rotator sshd\[4532\]: Failed password for root from 123.30.128.138 port 40970 ssh2Oct 20 14:02:03 rotator sshd\[4532\]: Failed password for root from 123.30.128.138 port 40970 ssh2
...
2019-10-20 23:01:19
197.50.37.253 attackbots
Unauthorized connection attempt from IP address 197.50.37.253 on Port 445(SMB)
2019-10-20 23:16:56
125.136.135.43 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/125.136.135.43/ 
 
 KR - 1H : (55)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KR 
 NAME ASN : ASN4766 
 
 IP : 125.136.135.43 
 
 CIDR : 125.136.128.0/17 
 
 PREFIX COUNT : 8136 
 
 UNIQUE IP COUNT : 44725248 
 
 
 ATTACKS DETECTED ASN4766 :  
  1H - 3 
  3H - 4 
  6H - 10 
 12H - 20 
 24H - 37 
 
 DateTime : 2019-10-20 14:02:00 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-20 23:04:43
50.63.194.75 attackbots
Automatic report - XMLRPC Attack
2019-10-20 23:23:38
154.73.82.130 attackbots
Unauthorized connection attempt from IP address 154.73.82.130 on Port 445(SMB)
2019-10-20 22:58:16

Recently Reported IPs

85.7.126.4 193.47.34.120 85.15.15.81 177.155.78.222
78.103.244.248 80.26.99.57 221.57.71.91 52.66.199.35
90.202.1.239 59.13.1.218 24.136.4.95 85.124.30.122
14.167.80.133 43.40.26.224 4.228.38.26 58.19.60.52
154.3.64.7 72.134.65.8 30.5.43.207 33.55.3.214