Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Huntington

Region: New York

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.132.70.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1668
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.132.70.5.			IN	A

;; AUTHORITY SECTION:
.			541	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071402 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jul 15 08:05:42 CST 2020
;; MSG SIZE  rcvd: 115
Host info
Host 5.70.132.68.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 5.70.132.68.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
157.230.38.102 attackbotsspam
 TCP (SYN) 157.230.38.102:49598 -> port 18652, len 44
2020-09-29 18:58:14
138.97.22.186 attack
SSH/22 MH Probe, BF, Hack -
2020-09-29 19:02:11
112.242.214.169 attackbotsspam
Portscan detected
2020-09-29 19:16:03
110.49.71.243 attackspam
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.243 
Failed password for invalid user apache from 110.49.71.243 port 38270 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.243
2020-09-29 18:54:45
68.183.146.178 attackspambots
2020-09-29 04:47:10,965 fail2ban.actions: WARNING [ssh] Ban 68.183.146.178
2020-09-29 19:10:32
70.37.75.157 attackspam
$f2bV_matches
2020-09-29 18:49:40
87.190.16.229 attackbots
$f2bV_matches
2020-09-29 19:04:15
89.250.148.154 attackbots
$f2bV_matches
2020-09-29 19:10:03
91.234.128.42 attackspambots
Port Scan: TCP/443
2020-09-29 18:40:34
1.55.223.64 attack
Icarus honeypot on github
2020-09-29 18:46:05
117.247.238.10 attackspam
Invalid user 1234 from 117.247.238.10 port 35648
2020-09-29 18:47:52
119.29.10.25 attackspam
sshd: Failed password for invalid user .... from 119.29.10.25 port 59874 ssh2 (5 attempts)
2020-09-29 19:18:13
117.6.211.161 attack
Brute forcing RDP port 3389
2020-09-29 18:47:00
139.186.67.94 attackspambots
Invalid user android from 139.186.67.94 port 49488
2020-09-29 18:52:01
63.80.187.50 attackbotsspam
email spam
2020-09-29 18:50:05

Recently Reported IPs

203.132.161.85 196.240.54.12 86.6.118.28 41.55.242.15
121.150.165.126 2.50.182.81 84.77.93.252 176.15.64.178
80.173.53.215 212.126.121.254 92.97.128.101 187.23.204.119
116.126.254.2 124.123.32.98 15.206.115.157 179.129.223.97
3.90.119.60 191.60.200.219 167.211.9.105 205.253.97.197