Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Vilnius

Region: Vilnius

Country: Lithuania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.159.42.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51615
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.159.42.68.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023042301 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 24 04:31:35 CST 2023
;; MSG SIZE  rcvd: 106
Host info
68.42.159.213.in-addr.arpa domain name pointer lan-213-159-42-68.vln.penki.lt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.42.159.213.in-addr.arpa	name = lan-213-159-42-68.vln.penki.lt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.200.100.19 attackbots
Mar 27 06:10:06 lukav-desktop sshd\[30360\]: Invalid user pqo from 91.200.100.19
Mar 27 06:10:06 lukav-desktop sshd\[30360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.200.100.19
Mar 27 06:10:08 lukav-desktop sshd\[30360\]: Failed password for invalid user pqo from 91.200.100.19 port 48212 ssh2
Mar 27 06:19:14 lukav-desktop sshd\[20647\]: Invalid user adx from 91.200.100.19
Mar 27 06:19:14 lukav-desktop sshd\[20647\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.200.100.19
2020-03-27 14:49:19
117.66.243.77 attackbots
SSH Brute Force
2020-03-27 15:09:25
37.187.0.20 attackbotsspam
Mar 27 04:29:26 powerpi2 sshd[29585]: Invalid user sarvub from 37.187.0.20 port 44406
Mar 27 04:29:28 powerpi2 sshd[29585]: Failed password for invalid user sarvub from 37.187.0.20 port 44406 ssh2
Mar 27 04:36:58 powerpi2 sshd[29959]: Invalid user yez from 37.187.0.20 port 60116
...
2020-03-27 14:54:14
113.162.145.203 attackspambots
Attempts against SMTP/SSMTP
2020-03-27 14:56:46
122.51.60.228 attackbotsspam
Invalid user xr from 122.51.60.228 port 43760
2020-03-27 15:04:25
189.90.14.101 attackspam
Invalid user user1 from 189.90.14.101 port 39617
2020-03-27 14:30:52
66.143.231.89 attackspambots
Invalid user sam from 66.143.231.89 port 54935
2020-03-27 14:36:55
175.124.43.162 attackspambots
2020-03-27T04:41:14.633704shield sshd\[18456\]: Invalid user mx from 175.124.43.162 port 43834
2020-03-27T04:41:14.641803shield sshd\[18456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.162
2020-03-27T04:41:16.630755shield sshd\[18456\]: Failed password for invalid user mx from 175.124.43.162 port 43834 ssh2
2020-03-27T04:43:29.063952shield sshd\[18674\]: Invalid user cxf from 175.124.43.162 port 49860
2020-03-27T04:43:29.074697shield sshd\[18674\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.162
2020-03-27 14:42:02
98.215.237.42 attack
(imapd) Failed IMAP login from 98.215.237.42 (US/United States/c-98-215-237-42.hsd1.il.comcast.net): 1 in the last 3600 secs
2020-03-27 14:43:44
43.239.220.52 attack
Invalid user wilvang from 43.239.220.52 port 46807
2020-03-27 14:41:04
79.3.6.207 attackspam
(sshd) Failed SSH login from 79.3.6.207 (IT/Italy/host207-6-static.3-79-b.business.telecomitalia.it): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 27 08:02:46 ubnt-55d23 sshd[16574]: Invalid user zxc from 79.3.6.207 port 64564
Mar 27 08:02:47 ubnt-55d23 sshd[16574]: Failed password for invalid user zxc from 79.3.6.207 port 64564 ssh2
2020-03-27 15:07:10
51.75.55.33 attackbots
Banned by Fail2Ban.
2020-03-27 14:44:32
78.195.178.119 attack
SSH-bruteforce attempts
2020-03-27 14:30:20
125.142.63.88 attackspambots
Unauthorized connection attempt detected from IP address 125.142.63.88 to port 7490 [T]
2020-03-27 14:32:47
192.241.231.79 attack
Unauthorized connection attempt detected from IP address 192.241.231.79 to port 8889
2020-03-27 15:01:14

Recently Reported IPs

113.24.224.139 148.24.248.107 32.139.191.62 105.15.239.255
178.7.61.8 64.55.61.40 99.133.50.78 222.83.240.78
27.55.70.160 87.213.101.141 177.70.98.85 42.0.60.184
114.147.203.12 80.38.195.48 132.110.198.16 113.24.224.159
221.1.61.157 87.126.180.157 56.48.217.40 59.235.45.9