Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Siheung-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.39.68.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;61.39.68.99.			IN	A

;; AUTHORITY SECTION:
.			375	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022200 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 05:29:08 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 99.68.39.61.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.68.39.61.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.6.99.139 attackbotsspam
Aug  2 22:33:00 localhost sshd\[61752\]: Invalid user enterprise from 201.6.99.139 port 46853
Aug  2 22:33:00 localhost sshd\[61752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.6.99.139
...
2019-08-03 05:53:05
162.247.74.74 attackspambots
k+ssh-bruteforce
2019-08-03 06:22:36
103.9.159.105 attackbots
445/tcp 445/tcp 445/tcp...
[2019-06-07/08-02]15pkt,1pt.(tcp)
2019-08-03 06:07:01
45.55.187.39 attackbots
Automatic report - Banned IP Access
2019-08-03 05:39:07
111.231.204.127 attackbotsspam
Aug  2 22:48:50 s64-1 sshd[32546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.204.127
Aug  2 22:48:53 s64-1 sshd[32546]: Failed password for invalid user press from 111.231.204.127 port 45156 ssh2
Aug  2 22:53:06 s64-1 sshd[32628]: Failed password for root from 111.231.204.127 port 38442 ssh2
...
2019-08-03 05:35:58
46.17.47.156 attackbotsspam
scan z
2019-08-03 06:19:41
203.48.246.66 attackspam
Aug  2 23:38:08 MK-Soft-Root1 sshd\[22005\]: Invalid user confluencepass from 203.48.246.66 port 56328
Aug  2 23:38:08 MK-Soft-Root1 sshd\[22005\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.48.246.66
Aug  2 23:38:10 MK-Soft-Root1 sshd\[22005\]: Failed password for invalid user confluencepass from 203.48.246.66 port 56328 ssh2
...
2019-08-03 05:46:22
163.179.32.42 attack
REQUESTED PAGE: /wp-login.php
2019-08-03 06:11:22
159.203.127.137 attackbotsspam
Automatic report - Banned IP Access
2019-08-03 06:11:44
100.43.91.102 attackbots
EventTime:Sat Aug 3 05:27:01 AEST 2019,Protocol:TCP,VendorEventCode:RT_FLOW_SESSION_DENY,TargetPort:81,SourceIP:100.43.91.102,SourcePort:56777
2019-08-03 06:13:53
142.93.210.94 attack
142.93.210.94 - - [02/Aug/2019:21:25:14 +0200] "GET /wp-login.php HTTP/1.1" 200 1202 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.210.94 - - [02/Aug/2019:21:25:21 +0200] "POST /wp-login.php HTTP/1.1" 200 1595 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.210.94 - - [02/Aug/2019:21:25:24 +0200] "GET /wp-login.php HTTP/1.1" 200 1202 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.210.94 - - [02/Aug/2019:21:25:34 +0200] "POST /wp-login.php HTTP/1.1" 200 1575 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.210.94 - - [02/Aug/2019:21:27:04 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.210.94 - - [02/Aug/2019:21:27:12 +0200] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-08-03 05:55:26
191.10.89.40 attackbotsspam
Probing for vulnerable services
2019-08-03 06:10:10
46.27.19.200 attackbots
$f2bV_matches
2019-08-03 06:16:49
107.170.63.196 attack
2019-08-02T22:01:38.251860abusebot.cloudsearch.cf sshd\[3795\]: Invalid user webtool from 107.170.63.196 port 45961
2019-08-03 06:21:20
82.81.134.225 attackspambots
Automatic report - Port Scan Attack
2019-08-03 06:14:24

Recently Reported IPs

114.247.195.189 24.194.110.191 94.52.12.221 110.1.20.128
136.202.220.220 91.205.130.14 209.179.93.219 66.28.186.71
131.99.194.90 45.164.254.237 71.56.11.32 137.116.96.78
50.244.23.118 36.78.63.15 23.229.92.225 69.23.40.217
117.22.50.106 15.237.14.198 110.12.18.220 18.222.38.154