Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oklahoma City

Region: Oklahoma

Country: United States

Internet Service Provider: Softcom Internet Communications, Inc

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.12.180.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22543
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.12.180.165.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 08:14:47 CST 2025
;; MSG SIZE  rcvd: 106
Host info
165.180.12.68.in-addr.arpa domain name pointer ip68-12-180-165.ok.ok.cox.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
165.180.12.68.in-addr.arpa	name = ip68-12-180-165.ok.ok.cox.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.91.3.84 attackbotsspam
$f2bV_matches
2019-08-19 22:39:34
1.57.22.154 attack
19.08.2019 09:35:36 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2019-08-19 22:36:46
222.189.51.2 attack
NOQUEUE: reject: RCPT from unknown\[222.189.51.2\]: 554 5.7.1 Service unavailable\; host \[222.189.51.2\] blocked using dul.dnsbl.sorbs.net\; Dynamic
2019-08-19 23:26:57
46.33.225.84 attack
Aug 19 14:31:24 yabzik sshd[9376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.33.225.84
Aug 19 14:31:25 yabzik sshd[9376]: Failed password for invalid user infa from 46.33.225.84 port 41128 ssh2
Aug 19 14:35:41 yabzik sshd[10857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.33.225.84
2019-08-19 23:23:38
51.83.74.45 attackspam
Invalid user user from 51.83.74.45 port 47860
2019-08-19 23:50:15
119.188.132.33 attackspambots
Aug 19 10:46:36 web1 postfix/smtpd[7959]: warning: unknown[119.188.132.33]: SASL LOGIN authentication failed: authentication failure
...
2019-08-19 23:24:51
119.29.15.120 attackspambots
Aug 19 13:44:38 nextcloud sshd\[25618\]: Invalid user adalgisa from 119.29.15.120
Aug 19 13:44:38 nextcloud sshd\[25618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.15.120
Aug 19 13:44:40 nextcloud sshd\[25618\]: Failed password for invalid user adalgisa from 119.29.15.120 port 33158 ssh2
...
2019-08-19 23:41:13
95.253.111.145 attackbots
Invalid user webmin from 95.253.111.145 port 40694
2019-08-19 23:04:59
85.37.38.195 attackbots
Aug 19 13:41:02 MK-Soft-Root1 sshd\[17864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.37.38.195  user=root
Aug 19 13:41:05 MK-Soft-Root1 sshd\[17864\]: Failed password for root from 85.37.38.195 port 17869 ssh2
Aug 19 13:45:26 MK-Soft-Root1 sshd\[18537\]: Invalid user tuser from 85.37.38.195 port 16313
Aug 19 13:45:26 MK-Soft-Root1 sshd\[18537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.37.38.195
...
2019-08-19 23:02:16
4.16.43.2 attackbotsspam
Invalid user ds from 4.16.43.2 port 47758
2019-08-19 22:34:13
151.80.61.103 attackspambots
Invalid user fedor from 151.80.61.103 port 43060
2019-08-19 22:53:19
98.213.58.68 attackbots
Automatic report - Banned IP Access
2019-08-19 23:44:33
138.94.217.95 attack
NAME : LACNIC-ERX-138-94-0-0 CIDR : 138.94.0.0/16 | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack UY - block certain countries :) IP: 138.94.217.95  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-20 00:08:43
212.15.169.6 attackspambots
$f2bV_matches
2019-08-19 22:42:11
185.101.231.42 attackbots
$f2bV_matches
2019-08-19 23:18:50

Recently Reported IPs

174.229.183.209 37.91.101.53 56.17.78.157 191.67.140.56
96.115.64.175 177.149.118.185 26.9.205.232 101.72.48.143
224.151.87.145 246.111.201.1 72.129.122.76 101.120.180.127
179.127.126.21 76.45.3.119 249.242.18.187 133.161.224.167
195.247.7.130 31.43.151.252 97.95.2.133 117.220.19.69