Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Boardman

Region: Oregon

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.68.248.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63535
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.68.248.140.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 10 00:17:48 CST 2019
;; MSG SIZE  rcvd: 117
Host info
140.248.68.54.in-addr.arpa domain name pointer ec2-54-68-248-140.us-west-2.compute.amazonaws.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
140.248.68.54.in-addr.arpa	name = ec2-54-68-248-140.us-west-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
47.20.216.248 attack
This IP hacked into my account.
2020-03-11 05:06:55
58.22.99.135 attack
invalid login attempt (fremnet)
2020-03-11 04:55:51
221.193.248.52 attackspam
Automatic report - Banned IP Access
2020-03-11 05:08:50
116.247.81.99 attack
Mar 10 21:28:44 sd-53420 sshd\[30650\]: Invalid user system from 116.247.81.99
Mar 10 21:28:44 sd-53420 sshd\[30650\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.99
Mar 10 21:28:46 sd-53420 sshd\[30650\]: Failed password for invalid user system from 116.247.81.99 port 33823 ssh2
Mar 10 21:32:44 sd-53420 sshd\[31101\]: User root from 116.247.81.99 not allowed because none of user's groups are listed in AllowGroups
Mar 10 21:32:44 sd-53420 sshd\[31101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.99  user=root
...
2020-03-11 04:43:57
110.170.42.147 attackspam
RDP Bruteforce
2020-03-11 04:34:17
94.99.204.194 attackbotsspam
Brute force attack against VPN service
2020-03-11 04:44:11
37.49.227.109 attack
37.49.227.109 was recorded 5 times by 5 hosts attempting to connect to the following ports: 2362. Incident counter (4h, 24h, all-time): 5, 26, 2565
2020-03-11 04:56:05
185.36.81.23 attackbotsspam
2020-03-10T14:53:59.885167linuxbox-skyline auth[7143]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=comercial rhost=185.36.81.23
...
2020-03-11 04:56:28
185.172.110.238 attack
185.172.110.238 was recorded 5 times by 5 hosts attempting to connect to the following ports: 3702. Incident counter (4h, 24h, all-time): 5, 24, 230
2020-03-11 05:07:04
201.97.121.237 attack
Unauthorized connection attempt from IP address 201.97.121.237 on Port 445(SMB)
2020-03-11 04:35:19
103.27.237.152 attackbots
suspicious action Tue, 10 Mar 2020 15:15:25 -0300
2020-03-11 04:37:02
183.82.112.241 attackspam
Unauthorized connection attempt from IP address 183.82.112.241 on Port 445(SMB)
2020-03-11 04:51:36
118.24.14.18 attackbotsspam
Invalid user postgres from 118.24.14.18 port 37078
2020-03-11 05:03:24
189.57.73.18 attackspam
Mar 10 22:38:14 server sshd\[29669\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.57.73.18  user=root
Mar 10 22:38:16 server sshd\[29669\]: Failed password for root from 189.57.73.18 port 36770 ssh2
Mar 10 22:41:00 server sshd\[30424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.57.73.18  user=root
Mar 10 22:41:03 server sshd\[30424\]: Failed password for root from 189.57.73.18 port 16321 ssh2
Mar 10 22:42:55 server sshd\[30661\]: Invalid user cpanel from 189.57.73.18
Mar 10 22:42:55 server sshd\[30661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.57.73.18 
...
2020-03-11 05:00:56
124.79.96.69 attack
suspicious action Tue, 10 Mar 2020 15:15:16 -0300
2020-03-11 04:49:12

Recently Reported IPs

116.178.204.120 219.28.6.10 24.212.209.253 45.226.124.140
109.186.194.34 129.182.185.10 188.39.10.118 84.94.93.202
173.237.50.23 144.81.192.97 1.46.193.215 32.2.128.71
18.234.157.32 202.128.182.192 87.88.107.234 120.92.119.155
56.14.101.229 56.255.127.62 125.4.251.59 181.92.197.45