Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kennewick

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       68.112.0.0 - 68.119.255.255
CIDR:           68.112.0.0/13
NetName:        CHARTER-NET-6BLK
NetHandle:      NET-68-112-0-0-1
Parent:         NET68 (NET-68-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Charter Communications LLC (CC04)
RegDate:        2002-03-14
Updated:        2012-03-02
Comment:        ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:        "For NETWORK ABUSE issues, please email abuse@charter.net"
Ref:            https://rdap.arin.net/registry/ip/68.112.0.0



OrgName:        Charter Communications LLC
OrgId:          CC04
Address:        6175 S. Willow Dr
City:           Greenwood Village
StateProv:      CO
PostalCode:     80111
Country:        US
RegDate:        
Updated:        2025-02-10
Ref:            https://rdap.arin.net/registry/entity/CC04


OrgTechHandle: IPADD1-ARIN
OrgTechName:   IPAddressing
OrgTechPhone:  +1-866-248-7662 
OrgTechEmail:  PublicIPAddressing@charter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPADD1-ARIN

OrgAbuseHandle: ABUSE19-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-877-777-2263 
OrgAbuseEmail:  abuse@charter.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE19-ARIN

RTechHandle: IPADD1-ARIN
RTechName:   IPAddressing
RTechPhone:  +1-866-248-7662 
RTechEmail:  PublicIPAddressing@charter.com
RTechRef:    https://rdap.arin.net/registry/entity/IPADD1-ARIN

# end


# start

NetRange:       68.116.0.0 - 68.116.31.255
CIDR:           68.116.0.0/19
NetName:        KWCK-WA-68-116-0
NetHandle:      NET-68-116-0-0-1
Parent:         CHARTER-NET-6BLK (NET-68-112-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Charter Communications LLC (CC04)
RegDate:        2002-05-30
Updated:        2003-08-27
Ref:            https://rdap.arin.net/registry/ip/68.116.0.0



OrgName:        Charter Communications LLC
OrgId:          CC04
Address:        6175 S. Willow Dr
City:           Greenwood Village
StateProv:      CO
PostalCode:     80111
Country:        US
RegDate:        
Updated:        2025-02-10
Ref:            https://rdap.arin.net/registry/entity/CC04


OrgTechHandle: IPADD1-ARIN
OrgTechName:   IPAddressing
OrgTechPhone:  +1-866-248-7662 
OrgTechEmail:  PublicIPAddressing@charter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/IPADD1-ARIN

OrgAbuseHandle: ABUSE19-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-877-777-2263 
OrgAbuseEmail:  abuse@charter.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE19-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.116.28.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.116.28.132.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031802 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 04:00:32 CST 2026
;; MSG SIZE  rcvd: 106
Host info
132.28.116.68.in-addr.arpa domain name pointer syn-068-116-028-132.biz.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.28.116.68.in-addr.arpa	name = syn-068-116-028-132.biz.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.65.18.102 attackspam
Jun 11 00:50:47 vps sshd[5384]: Failed password for root from 124.65.18.102 port 53872 ssh2
Jun 11 00:50:50 vps sshd[5556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.65.18.102  user=root
Jun 11 00:50:53 vps sshd[5556]: Failed password for root from 124.65.18.102 port 58294 ssh2
Jun 11 00:50:55 vps sshd[5866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.65.18.102  user=root
Jun 11 00:50:58 vps sshd[5866]: Failed password for root from 124.65.18.102 port 34846 ssh2
...
2020-06-11 07:04:30
172.245.52.131 attackspambots
318. On Jun 10 2020 experienced a Brute Force SSH login attempt -> 7 unique times by 172.245.52.131.
2020-06-11 07:25:44
43.245.219.130 attack
SSH Brute-Force Attack
2020-06-11 07:23:00
84.2.226.70 attackbots
Jun 11 01:12:59 sso sshd[29558]: Failed password for root from 84.2.226.70 port 57716 ssh2
Jun 11 01:16:10 sso sshd[29945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.2.226.70
...
2020-06-11 07:18:59
45.90.58.33 attack
Automated report (2020-06-11T04:17:55+08:00). Faked user agent detected.
2020-06-11 07:30:16
180.76.151.90 attackbotsspam
Jun 10 23:45:49 fhem-rasp sshd[14794]: Invalid user ubnt from 180.76.151.90 port 53800
...
2020-06-11 07:21:51
222.186.180.8 attack
Jun 11 01:26:08 vps sshd[164759]: Failed password for root from 222.186.180.8 port 29830 ssh2
Jun 11 01:26:11 vps sshd[164759]: Failed password for root from 222.186.180.8 port 29830 ssh2
Jun 11 01:26:15 vps sshd[164759]: Failed password for root from 222.186.180.8 port 29830 ssh2
Jun 11 01:26:18 vps sshd[164759]: Failed password for root from 222.186.180.8 port 29830 ssh2
Jun 11 01:26:22 vps sshd[164759]: Failed password for root from 222.186.180.8 port 29830 ssh2
...
2020-06-11 07:27:33
185.232.30.130 attackbots
06/10/2020-19:12:47.247198 185.232.30.130 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-11 07:26:34
200.56.43.109 attack
Jun 11 00:50:31 legacy sshd[25961]: Failed password for root from 200.56.43.109 port 50132 ssh2
Jun 11 00:53:55 legacy sshd[26079]: Failed password for root from 200.56.43.109 port 52064 ssh2
Jun 11 00:57:23 legacy sshd[26200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.56.43.109
...
2020-06-11 07:07:32
141.98.9.161 attackbotsspam
Jun 11 01:14:18 debian64 sshd[30743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161 
Jun 11 01:14:20 debian64 sshd[30743]: Failed password for invalid user admin from 141.98.9.161 port 35833 ssh2
...
2020-06-11 07:28:06
125.208.26.42 attackbots
Invalid user akerjord from 125.208.26.42 port 20410
2020-06-11 07:18:22
104.236.250.88 attack
Jun 11 00:49:18 vpn01 sshd[24814]: Failed password for root from 104.236.250.88 port 53004 ssh2
Jun 11 00:52:46 vpn01 sshd[24903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.250.88
...
2020-06-11 07:12:12
185.56.153.229 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-06-11 07:21:12
123.21.6.118 attack
SSH Brute-Force Attack
2020-06-11 07:15:54
62.171.167.251 attackspam
Jun 10 23:00:03 ns3042688 courier-pop3d: LOGIN FAILED, user=postmaster@sikla-shop.com, ip=\[::ffff:62.171.167.251\]
...
2020-06-11 07:19:29

Recently Reported IPs

87.121.84.56 122.193.247.163 2606:4700:10::6814:4373 2606:4700:10::6814:8626
122.193.247.94 2606:4700:10::6814:9006 2606:4700:10::6816:4759 2606:4700:10::6814:7071
2606:4700:10::6814:6099 2606:4700:10::6816:120 64.227.15.246 26.236.194.248
44.201.180.168 3.85.39.134 2606:4700:10::ac43:834 2606:4700:10::6816:4183
2606:4700:10::6814:5109 2606:4700:10::6816:2144 2606:4700:10::ac43:1970 2606:4700:10::6814:6235