Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.148.29.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5963
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.148.29.25.			IN	A

;; AUTHORITY SECTION:
.			480	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110201 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 04:49:34 CST 2019
;; MSG SIZE  rcvd: 116
Host info
25.29.148.68.in-addr.arpa domain name pointer S010620aa4bdddb4d.ed.shawcable.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
25.29.148.68.in-addr.arpa	name = S010620aa4bdddb4d.ed.shawcable.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
80.82.70.239 attack
Port scan on 8 port(s): 3183 3184 9675 9677 9679 9682 9684 9687
2019-08-14 00:35:37
134.209.106.64 attackspambots
Aug 13 15:13:03 XXX sshd[58478]: Invalid user backup from 134.209.106.64 port 53452
2019-08-14 00:29:25
81.22.45.202 attackbots
Aug 13 16:23:52 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.202 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=58243 PROTO=TCP SPT=56012 DPT=3372 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-08-13 23:24:04
151.80.209.231 attackspam
Unauthorised access (Aug 13) SRC=151.80.209.231 LEN=40 TTL=54 ID=48822 TCP DPT=23 WINDOW=709 SYN
2019-08-13 23:28:58
106.52.142.17 attack
Aug 13 18:01:35 vibhu-HP-Z238-Microtower-Workstation sshd\[12020\]: Invalid user laboratorio from 106.52.142.17
Aug 13 18:01:35 vibhu-HP-Z238-Microtower-Workstation sshd\[12020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.142.17
Aug 13 18:01:36 vibhu-HP-Z238-Microtower-Workstation sshd\[12020\]: Failed password for invalid user laboratorio from 106.52.142.17 port 52110 ssh2
Aug 13 18:08:12 vibhu-HP-Z238-Microtower-Workstation sshd\[12247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.142.17  user=root
Aug 13 18:08:14 vibhu-HP-Z238-Microtower-Workstation sshd\[12247\]: Failed password for root from 106.52.142.17 port 43712 ssh2
...
2019-08-13 23:35:45
182.185.219.170 attack
182.185.219.170 - - \[13/Aug/2019:00:10:22 -0700\] "POST /downloader//downloader/index.php HTTP/1.1" 404 20703182.185.219.170 - - \[13/Aug/2019:00:18:16 -0700\] "POST /downloader//downloader/index.php HTTP/1.1" 404 20703182.185.219.170 - - \[13/Aug/2019:00:27:08 -0700\] "POST /downloader//downloader/index.php HTTP/1.1" 404 20703
...
2019-08-14 00:36:33
27.50.151.183 attack
2019-08-13T12:41:20.574062abusebot-5.cloudsearch.cf sshd\[2172\]: Invalid user amos from 27.50.151.183 port 50721
2019-08-14 00:02:44
103.55.91.51 attack
Aug 13 11:53:20 lnxded63 sshd[7700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.55.91.51
2019-08-13 23:49:50
79.106.191.5 attackspam
Automatic report - Banned IP Access
2019-08-13 23:56:21
163.172.59.60 attack
Aug 13 13:42:17 mail sshd\[26514\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.59.60  user=root
Aug 13 13:42:19 mail sshd\[26514\]: Failed password for root from 163.172.59.60 port 48672 ssh2
Aug 13 13:47:29 mail sshd\[26580\]: Invalid user mia from 163.172.59.60
Aug 13 13:47:29 mail sshd\[26580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.59.60
...
2019-08-13 23:16:17
223.171.32.66 attackbots
$f2bV_matches
2019-08-13 23:37:34
138.197.200.77 attack
Aug 13 15:31:58 server sshd\[1579\]: Invalid user iceuser from 138.197.200.77 port 59648
Aug 13 15:31:58 server sshd\[1579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
Aug 13 15:32:00 server sshd\[1579\]: Failed password for invalid user iceuser from 138.197.200.77 port 59648 ssh2
Aug 13 15:37:01 server sshd\[23956\]: Invalid user ubnt from 138.197.200.77 port 52412
Aug 13 15:37:01 server sshd\[23956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.200.77
2019-08-14 00:39:31
162.216.19.219 attack
port scan and connect, tcp 5432 (postgresql)
2019-08-14 00:37:02
132.232.54.102 attackspambots
$f2bV_matches
2019-08-14 00:36:11
179.219.239.78 attack
$f2bV_matches
2019-08-14 00:10:59

Recently Reported IPs

159.55.150.103 231.192.55.100 28.204.234.155 149.49.252.70
112.3.239.114 34.90.168.238 188.137.19.73 187.213.105.5
203.209.110.145 184.250.84.231 118.63.33.141 128.236.126.212
207.213.35.113 104.184.237.155 83.213.64.126 23.23.253.98
139.118.146.216 153.142.133.76 89.36.214.18 146.25.7.116