Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Atlanta

Region: Georgia

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.149.148.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52326
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.149.148.68.			IN	A

;; AUTHORITY SECTION:
.			588	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100603 1800 900 604800 86400

;; Query time: 88 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 07 05:05:12 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 68.148.149.64.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.148.149.64.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
153.36.232.49 attack
Jul 28 22:49:35 TORMINT sshd\[1809\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.49  user=root
Jul 28 22:49:37 TORMINT sshd\[1809\]: Failed password for root from 153.36.232.49 port 64990 ssh2
Jul 28 22:49:43 TORMINT sshd\[1833\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.232.49  user=root
...
2019-07-29 11:10:23
167.99.138.153 attackspambots
Jul 29 01:51:32 mail sshd\[26270\]: Failed password for root from 167.99.138.153 port 45142 ssh2
Jul 29 02:10:24 mail sshd\[26893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.138.153  user=root
...
2019-07-29 11:07:51
39.74.106.98 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-29 10:43:04
59.21.169.165 attack
failed_logins
2019-07-29 11:02:48
118.33.32.214 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-29 10:49:59
134.73.161.207 attack
Jul 28 23:22:15 xeon sshd[12171]: Failed password for root from 134.73.161.207 port 55648 ssh2
2019-07-29 11:03:51
94.52.235.196 attack
CloudCIX Reconnaissance Scan Detected, PTR: 94-52-235-196.next-gen.ro.
2019-07-29 11:37:18
103.23.100.217 attackbotsspam
$f2bV_matches
2019-07-29 10:44:39
142.93.23.196 attack
xmlrpc attack
2019-07-29 11:11:30
35.234.44.28 attackbots
Jul 28 21:05:26 wildwolf wplogin[3350]: 35.234.44.28 prometheus.ngo [2019-07-28 21:05:26+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "admin" "admin2018!"
Jul 28 21:05:33 wildwolf wplogin[3350]: 35.234.44.28 prometheus.ngo [2019-07-28 21:05:33+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "alina" "alina2018!"
Jul 28 21:05:39 wildwolf wplogin[1350]: 35.234.44.28 prometheus.ngo [2019-07-28 21:05:39+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "burko" "burko2018!"
Jul 28 21:05:43 wildwolf wplogin[376]: 35.234.44.28 prometheus.ngo [2019-07-28 21:05:43+0000] "POST /wp-login.php HTTP/1.1" "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "pavlo" "pavlo2018!"
Jul 28 21:05:46 wildwolf wplogin[6381]: 35.234.44.28 prometheus.ngo [2........
------------------------------
2019-07-29 11:32:48
153.36.236.35 attackspam
SSH Brute Force, server-1 sshd[2396]: Failed password for root from 153.36.236.35 port 62209 ssh2
2019-07-29 11:09:45
3.90.242.179 attack
SSH/22 MH Probe, BF, Hack -
2019-07-29 11:27:33
139.59.78.236 attack
Jul 29 04:54:09 ncomp sshd[30683]: Invalid user guest from 139.59.78.236
Jul 29 04:54:09 ncomp sshd[30683]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.78.236
Jul 29 04:54:09 ncomp sshd[30683]: Invalid user guest from 139.59.78.236
Jul 29 04:54:11 ncomp sshd[30683]: Failed password for invalid user guest from 139.59.78.236 port 37578 ssh2
2019-07-29 11:12:44
180.117.110.52 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-29 10:48:00
49.88.112.65 attack
Jul 28 23:18:49 plusreed sshd[12694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Jul 28 23:18:50 plusreed sshd[12694]: Failed password for root from 49.88.112.65 port 46985 ssh2
...
2019-07-29 11:35:03

Recently Reported IPs

30.149.211.68 190.203.75.146 70.73.58.125 180.37.33.222
168.23.4.200 134.109.142.121 139.89.26.114 19.218.28.119
106.7.153.26 192.59.63.207 127.47.218.178 246.13.50.167
154.23.199.122 175.138.90.130 249.122.149.44 212.10.37.29
57.50.4.15 71.19.178.156 101.136.230.115 47.81.14.169