Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Spruce Grove

Region: Alberta

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.150.136.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.150.136.136.			IN	A

;; AUTHORITY SECTION:
.			563	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010201 1800 900 604800 86400

;; Query time: 371 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 03 05:22:14 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 136.136.150.68.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.136.150.68.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.227.253.141 attack
2019-11-13T18:58:48.258853mail01 postfix/smtpd[31770]: warning: unknown[45.227.253.141]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-13T18:58:55.446125mail01 postfix/smtpd[28376]: warning: unknown[45.227.253.141]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-13T18:59:11.452808mail01 postfix/smtpd[19703]: warning: unknown[45.227.253.141]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-14 02:05:52
54.39.193.26 attack
Nov 13 18:47:04 SilenceServices sshd[29408]: Failed password for root from 54.39.193.26 port 26378 ssh2
Nov 13 18:50:18 SilenceServices sshd[31477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.193.26
Nov 13 18:50:20 SilenceServices sshd[31477]: Failed password for invalid user epanchi from 54.39.193.26 port 16492 ssh2
2019-11-14 02:05:19
113.77.206.145 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 01:57:45
203.57.39.2 attackbots
Invalid user kendall from 203.57.39.2 port 46037
2019-11-14 01:49:50
115.55.30.165 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-14 01:57:29
211.159.149.29 attackbotsspam
Nov 13 18:27:40 microserver sshd[15516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.149.29  user=root
Nov 13 18:27:41 microserver sshd[15516]: Failed password for root from 211.159.149.29 port 33420 ssh2
Nov 13 18:32:59 microserver sshd[16190]: Invalid user jacky from 211.159.149.29 port 39814
Nov 13 18:32:59 microserver sshd[16190]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.149.29
Nov 13 18:33:00 microserver sshd[16190]: Failed password for invalid user jacky from 211.159.149.29 port 39814 ssh2
Nov 13 18:43:27 microserver sshd[17517]: Invalid user pandolfi from 211.159.149.29 port 52590
Nov 13 18:43:27 microserver sshd[17517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.159.149.29
Nov 13 18:43:30 microserver sshd[17517]: Failed password for invalid user pandolfi from 211.159.149.29 port 52590 ssh2
Nov 13 18:48:43 microserver sshd[18166]: Invalid user serve
2019-11-14 01:43:44
152.136.122.130 attack
Nov 13 18:39:36 vps691689 sshd[30782]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.122.130
Nov 13 18:39:38 vps691689 sshd[30782]: Failed password for invalid user teste from 152.136.122.130 port 45100 ssh2
...
2019-11-14 01:59:15
118.165.118.220 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/118.165.118.220/ 
 
 TW - 1H : (29)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 118.165.118.220 
 
 CIDR : 118.165.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 ATTACKS DETECTED ASN3462 :  
  1H - 10 
  3H - 10 
  6H - 10 
 12H - 10 
 24H - 10 
 
 DateTime : 2019-11-13 16:46:24 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-14 01:51:50
212.129.38.35 attackbotsspam
Nov 13 16:03:43 web8 sshd\[24126\]: Invalid user nino from 212.129.38.35
Nov 13 16:03:43 web8 sshd\[24126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.38.35
Nov 13 16:03:45 web8 sshd\[24126\]: Failed password for invalid user nino from 212.129.38.35 port 57188 ssh2
Nov 13 16:07:40 web8 sshd\[25941\]: Invalid user host from 212.129.38.35
Nov 13 16:07:40 web8 sshd\[25941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.38.35
2019-11-14 02:10:52
111.204.164.82 attack
SSH login attempts
2019-11-14 02:08:23
115.52.244.56 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-14 02:01:57
188.166.23.215 attackbots
Nov 14 00:44:28 itv-usvr-02 sshd[19402]: Invalid user guest from 188.166.23.215 port 45202
Nov 14 00:44:28 itv-usvr-02 sshd[19402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.23.215
Nov 14 00:44:28 itv-usvr-02 sshd[19402]: Invalid user guest from 188.166.23.215 port 45202
Nov 14 00:44:30 itv-usvr-02 sshd[19402]: Failed password for invalid user guest from 188.166.23.215 port 45202 ssh2
Nov 14 00:49:15 itv-usvr-02 sshd[19414]: Invalid user banana from 188.166.23.215 port 53182
2019-11-14 01:51:08
45.148.10.187 attackbotsspam
Oct 19 08:45:19 mail postfix/smtpd[30987]: warning: unknown[45.148.10.187]: SASL LOGIN authentication failed: authentication failure
2019-11-14 01:42:26
113.208.113.146 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 02:07:59
113.206.133.22 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-14 02:10:01

Recently Reported IPs

105.140.80.16 59.166.252.168 173.92.231.173 218.65.163.219
88.131.236.1 131.94.132.61 157.230.43.246 12.178.54.58
24.148.109.166 99.103.109.42 84.198.213.27 71.161.232.182
75.116.120.193 58.249.156.194 133.202.239.110 112.99.143.110
137.50.109.37 184.46.107.79 71.130.80.12 200.244.239.186