Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.125.21.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47119
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.125.21.133.			IN	A

;; AUTHORITY SECTION:
.			300	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032501 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 25 23:50:01 CST 2022
;; MSG SIZE  rcvd: 106
Host info
133.21.125.68.in-addr.arpa domain name pointer adsl-68-125-21-133.dsl.irvnca.pacbell.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
133.21.125.68.in-addr.arpa	name = adsl-68-125-21-133.dsl.irvnca.pacbell.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.26.123.51 attack
Automatic report - Port Scan Attack
2019-07-16 06:45:54
113.71.154.60 attackspam
Automatic report - Port Scan Attack
2019-07-16 06:13:20
156.198.67.154 attackbotsspam
Automatic report - Port Scan Attack
2019-07-16 06:22:10
197.248.38.174 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-17/07-15]11pkt,1pt.(tcp)
2019-07-16 06:35:15
104.206.128.42 attackbotsspam
Automatic report - Port Scan Attack
2019-07-16 06:21:23
122.52.48.92 attackspambots
2019-07-15T22:28:25.622463abusebot-3.cloudsearch.cf sshd\[1754\]: Invalid user goga from 122.52.48.92 port 56515
2019-07-16 06:54:49
47.104.226.128 attackspambots
Looking for resource vulnerabilities
2019-07-16 06:31:36
51.75.21.57 attackbots
Jul 16 00:09:17 SilenceServices sshd[3638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.21.57
Jul 16 00:09:17 SilenceServices sshd[3643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.21.57
2019-07-16 06:16:04
124.83.106.243 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 15:57:27,713 INFO [amun_request_handler] PortScan Detected on Port: 445 (124.83.106.243)
2019-07-16 06:56:59
191.243.244.13 attackbots
2019-07-15T22:30:09.294647abusebot-7.cloudsearch.cf sshd\[6912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.243.244.13.newnet.net.br  user=root
2019-07-16 06:48:29
14.126.207.243 attackspam
Automatic report - Port Scan Attack
2019-07-16 06:40:17
91.206.15.248 attack
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-07-16 06:41:32
49.69.38.131 attack
leo_www
2019-07-16 06:39:21
201.28.212.146 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-15 15:29:14,362 INFO [amun_request_handler] PortScan Detected on Port: 445 (201.28.212.146)
2019-07-16 06:49:47
121.121.38.141 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-26/07-15]7pkt,1pt.(tcp)
2019-07-16 06:12:46

Recently Reported IPs

80.220.67.193 54.138.169.59 100.71.150.148 28.125.240.102
163.185.231.13 161.142.175.208 205.145.14.59 88.224.47.234
27.31.52.174 197.234.190.95 14.24.164.128 193.251.148.18
212.113.69.115 30.112.131.76 37.47.122.202 85.229.36.244
35.186.171.130 52.192.86.255 41.216.52.137 83.74.192.128