Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oklahoma City

Region: Oklahoma

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.12.241.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.12.241.29.			IN	A

;; AUTHORITY SECTION:
.			286	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092701 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 28 09:46:15 CST 2020
;; MSG SIZE  rcvd: 116
Host info
29.241.12.68.in-addr.arpa domain name pointer ip68-12-241-29.ok.ok.cox.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.241.12.68.in-addr.arpa	name = ip68-12-241-29.ok.ok.cox.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.234.216.221 attackspambots
Rude login attack (31 tries in 1d)
2019-11-27 06:40:34
112.140.186.121 attackspam
2019-11-26T21:48:09.327296abusebot-6.cloudsearch.cf sshd\[31450\]: Invalid user jisai from 112.140.186.121 port 34341
2019-11-27 06:16:24
150.223.31.248 attackbotsspam
$f2bV_matches
2019-11-27 06:21:24
200.69.250.253 attack
Invalid user test from 200.69.250.253 port 58157
2019-11-27 06:50:23
106.13.38.246 attackspambots
2019-11-26T14:26:16.947842hub.schaetter.us sshd\[26494\]: Invalid user guest12345677 from 106.13.38.246 port 56524
2019-11-26T14:26:16.956447hub.schaetter.us sshd\[26494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.38.246
2019-11-26T14:26:19.583263hub.schaetter.us sshd\[26494\]: Failed password for invalid user guest12345677 from 106.13.38.246 port 56524 ssh2
2019-11-26T14:35:24.517169hub.schaetter.us sshd\[26604\]: Invalid user 123456 from 106.13.38.246 port 33612
2019-11-26T14:35:24.526092hub.schaetter.us sshd\[26604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.38.246
...
2019-11-27 06:25:48
218.92.0.155 attackspam
$f2bV_matches
2019-11-27 06:13:16
159.138.158.32 attack
badbot
2019-11-27 06:23:48
4.71.194.130 attackspam
Automatic report - Banned IP Access
2019-11-27 06:37:13
124.161.231.150 attackbots
$f2bV_matches
2019-11-27 06:29:35
137.74.115.225 attackbotsspam
2019-11-26T16:42:09.176057abusebot-4.cloudsearch.cf sshd\[22136\]: Invalid user \~!@\#\$% from 137.74.115.225 port 34206
2019-11-27 06:35:10
180.250.248.169 attack
2019-11-26T15:26:11.708865ns547587 sshd\[22169\]: Invalid user uucp from 180.250.248.169 port 34146
2019-11-26T15:26:11.712519ns547587 sshd\[22169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.248.169
2019-11-26T15:26:13.626106ns547587 sshd\[22169\]: Failed password for invalid user uucp from 180.250.248.169 port 34146 ssh2
2019-11-26T15:30:15.273094ns547587 sshd\[23675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.248.169  user=root
...
2019-11-27 06:41:04
206.189.239.103 attack
Nov 26 03:57:30 *** sshd[30655]: Failed password for invalid user sa from 206.189.239.103 port 60804 ssh2
Nov 26 04:03:05 *** sshd[30776]: Failed password for invalid user peugniez from 206.189.239.103 port 33416 ssh2
Nov 26 04:05:50 *** sshd[30824]: Failed password for invalid user yoyo from 206.189.239.103 port 47546 ssh2
Nov 26 04:08:58 *** sshd[30855]: Failed password for invalid user wwwrun from 206.189.239.103 port 34506 ssh2
Nov 26 04:11:49 *** sshd[30950]: Failed password for invalid user frankle from 206.189.239.103 port 49024 ssh2
Nov 26 04:14:40 *** sshd[30975]: Failed password for invalid user server from 206.189.239.103 port 35164 ssh2
Nov 26 04:23:07 *** sshd[31135]: Failed password for invalid user sa from 206.189.239.103 port 42316 ssh2
Nov 26 04:28:56 *** sshd[31244]: Failed password for invalid user melania from 206.189.239.103 port 54296 ssh2
Nov 26 04:34:33 *** sshd[31318]: Failed password for invalid user apache from 206.189.239.103 port 38044 ssh2
Nov 26 04:37:22 *** sshd[31355]: Failed
2019-11-27 06:42:22
83.97.20.46 attack
proto=tcp  .  spt=51385  .  dpt=25  .     (Found on   CINS badguys  Nov 26)     (936)
2019-11-27 06:25:20
159.138.159.167 attack
badbot
2019-11-27 06:27:32
159.138.148.103 attackbotsspam
badbot
2019-11-27 06:34:19

Recently Reported IPs

78.228.94.208 155.63.20.159 89.231.111.148 69.144.183.17
98.254.3.158 188.31.92.82 63.139.126.121 182.57.129.88
24.102.246.91 122.26.153.195 126.84.1.70 217.43.139.183
58.152.250.30 203.118.186.180 92.81.247.231 93.168.56.237
45.104.107.113 217.138.37.51 27.220.234.19 217.130.85.87