Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Omaha

Region: Nebraska

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.106.213.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33555
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.106.213.3.			IN	A

;; AUTHORITY SECTION:
.			187	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062502 1800 900 604800 86400

;; Query time: 112 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 26 07:59:37 CST 2020
;; MSG SIZE  rcvd: 116
Host info
3.213.106.68.in-addr.arpa domain name pointer ip68-106-213-3.om.om.cox.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
3.213.106.68.in-addr.arpa	name = ip68-106-213-3.om.om.cox.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.158.162.242 attack
Unauthorized connection attempt detected from IP address 51.158.162.242 to port 2220 [J]
2020-01-14 01:50:22
178.207.14.135 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 13-01-2020 13:05:16.
2020-01-14 02:01:42
208.48.167.211 attackspam
Unauthorized connection attempt detected from IP address 208.48.167.211 to port 2220 [J]
2020-01-14 01:43:59
200.89.174.195 attack
...
2020-01-14 01:53:29
218.92.0.158 attackspambots
Jan 13 18:59:19 vmd26974 sshd[3588]: Failed password for root from 218.92.0.158 port 36041 ssh2
Jan 13 18:59:31 vmd26974 sshd[3588]: error: maximum authentication attempts exceeded for root from 218.92.0.158 port 36041 ssh2 [preauth]
...
2020-01-14 02:06:46
110.77.138.97 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 01:55:10
222.186.173.183 attackbotsspam
Jan 13 19:03:03 nextcloud sshd\[14011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Jan 13 19:03:06 nextcloud sshd\[14011\]: Failed password for root from 222.186.173.183 port 54880 ssh2
Jan 13 19:03:09 nextcloud sshd\[14011\]: Failed password for root from 222.186.173.183 port 54880 ssh2
...
2020-01-14 02:10:37
84.232.228.94 attack
Unauthorised access (Jan 13) SRC=84.232.228.94 LEN=40 TTL=56 ID=23262 TCP DPT=23 WINDOW=22471 SYN
2020-01-14 01:45:24
1.53.6.223 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 01:48:19
141.98.80.132 attack
2020-01-14 05:49:49 fixed_plain authenticator failed for \(\[141.98.80.132\]\) \[141.98.80.132\]: 535 Incorrect authentication data \(set_id=info@thepuddles.net.nz\)
2020-01-14 05:49:52 fixed_plain authenticator failed for \(\[141.98.80.132\]\) \[141.98.80.132\]: 535 Incorrect authentication data \(set_id=info\)
2020-01-14 06:07:11 fixed_plain authenticator failed for \(\[141.98.80.132\]\) \[141.98.80.132\]: 535 Incorrect authentication data \(set_id=info@thepuddles.net.nz\)
...
2020-01-14 01:32:41
27.50.19.173 attackbotsspam
Honeypot attack, port: 445, PTR: ip-19-173.moratelindo.co.id.
2020-01-14 02:00:32
36.90.166.235 attack
Unauthorized connection attempt detected from IP address 36.90.166.235 to port 2220 [J]
2020-01-14 02:09:56
159.65.49.251 attackspam
2020-01-13T16:34:10.079749host3.slimhost.com.ua sshd[2132036]: Invalid user ark from 159.65.49.251 port 60834
2020-01-13T16:34:10.083961host3.slimhost.com.ua sshd[2132036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.49.251
2020-01-13T16:34:10.079749host3.slimhost.com.ua sshd[2132036]: Invalid user ark from 159.65.49.251 port 60834
2020-01-13T16:34:11.330193host3.slimhost.com.ua sshd[2132036]: Failed password for invalid user ark from 159.65.49.251 port 60834 ssh2
2020-01-13T16:52:29.274675host3.slimhost.com.ua sshd[2138858]: Invalid user telecom from 159.65.49.251 port 55058
2020-01-13T16:52:29.282812host3.slimhost.com.ua sshd[2138858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.49.251
2020-01-13T16:52:29.274675host3.slimhost.com.ua sshd[2138858]: Invalid user telecom from 159.65.49.251 port 55058
2020-01-13T16:52:31.071214host3.slimhost.com.ua sshd[2138858]: Failed password for inva
...
2020-01-14 02:05:22
222.128.13.94 attackspambots
SSHD brute force attack detected by fail2ban
2020-01-14 01:33:40
180.246.38.105 attackspambots
Unauthorized IMAP connection attempt
2020-01-14 02:07:01

Recently Reported IPs

216.37.141.63 51.36.124.232 81.53.231.221 69.34.229.7
45.4.189.33 41.210.223.51 65.205.51.33 162.138.202.229
89.200.18.181 3.22.241.224 49.81.156.134 136.242.157.202
92.200.161.93 89.33.208.129 83.97.85.120 27.59.79.98
152.235.215.252 27.219.235.237 150.216.91.108 54.163.148.54