Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aygut

Region: Geghark'unik'

Country: Armenia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.130.71.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.130.71.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121101 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 08:43:55 CST 2024
;; MSG SIZE  rcvd: 105
Host info
68.71.130.46.in-addr.arpa domain name pointer 68.71.130.46.in-addr.viva.am.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.71.130.46.in-addr.arpa	name = 68.71.130.46.in-addr.viva.am.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.39.68.34 attackbots
abuse-sasl
2020-06-03 03:22:08
122.62.16.176 attackspambots
trying to access non-authorized port
2020-06-03 03:45:11
195.154.189.23 attackspambots
SIPVicious Scanner Detection , PTR: 195-154-189-23.rev.poneytelecom.eu.
2020-06-03 03:38:32
157.245.237.33 attackbotsspam
Jun  2 20:42:04 10.23.102.36 sshd[15668]: Failed password for root from 157.245.237.33 port 55916 ssh2
Jun  2 20:42:04 10.23.102.36 sshd[15668]: Disconnected from 157.245.237.33 port 55916 [preauth]
...
2020-06-03 03:15:36
113.190.234.201 attackbots
Dovecot Invalid User Login Attempt.
2020-06-03 03:15:48
157.38.243.173 attackspam
Unauthorized connection attempt from IP address 157.38.243.173 on Port 445(SMB)
2020-06-03 03:31:33
200.220.131.30 attack
Unauthorized connection attempt from IP address 200.220.131.30 on Port 445(SMB)
2020-06-03 03:38:04
185.85.191.196 attackspam
Automatic report - Banned IP Access
2020-06-03 03:34:57
41.76.168.65 attackbotsspam
Unauthorized connection attempt from IP address 41.76.168.65 on Port 445(SMB)
2020-06-03 03:16:12
222.186.30.112 attackbots
Unauthorized connection attempt detected from IP address 222.186.30.112 to port 22
2020-06-03 03:26:29
106.12.202.119 attackbots
Jun  2 13:41:10 Host-KEWR-E sshd[2314]: Disconnected from invalid user root 106.12.202.119 port 40526 [preauth]
...
2020-06-03 03:30:20
192.144.218.46 attackbots
2020-06-02T16:56:30.102632mail.broermann.family sshd[29006]: Failed password for root from 192.144.218.46 port 58446 ssh2
2020-06-02T16:59:26.667791mail.broermann.family sshd[29272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.46  user=root
2020-06-02T16:59:28.826056mail.broermann.family sshd[29272]: Failed password for root from 192.144.218.46 port 33010 ssh2
2020-06-02T17:02:25.653756mail.broermann.family sshd[29618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.218.46  user=root
2020-06-02T17:02:27.721309mail.broermann.family sshd[29618]: Failed password for root from 192.144.218.46 port 35802 ssh2
...
2020-06-03 03:19:08
49.88.112.75 attackspam
June 02 2020, 19:09:53 [sshd] - Banned from the Cipher Host hosting platform by Fail2ban.
2020-06-03 03:17:07
193.70.41.118 attack
$f2bV_matches
2020-06-03 03:29:05
62.231.169.17 attack
Unauthorized connection attempt from IP address 62.231.169.17 on Port 445(SMB)
2020-06-03 03:17:49

Recently Reported IPs

162.132.37.182 58.123.238.185 70.12.171.96 26.62.198.89
241.229.123.212 150.250.131.222 25.14.92.15 158.118.78.106
245.243.196.109 212.38.118.186 99.63.99.226 198.237.104.105
101.177.197.192 196.180.101.4 253.103.181.151 63.183.77.222
115.116.2.249 79.11.80.134 2.208.62.193 159.51.224.248