Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Spruce Grove

Region: Alberta

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.150.136.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.150.136.136.			IN	A

;; AUTHORITY SECTION:
.			563	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010201 1800 900 604800 86400

;; Query time: 371 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 03 05:22:14 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 136.136.150.68.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.136.150.68.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.123.8.75 attackspam
2020-06-27T19:14:00.413382billing sshd[15340]: Invalid user ftpuser from 103.123.8.75 port 33820
2020-06-27T19:14:02.290002billing sshd[15340]: Failed password for invalid user ftpuser from 103.123.8.75 port 33820 ssh2
2020-06-27T19:16:51.344184billing sshd[21459]: Invalid user wpc from 103.123.8.75 port 47340
...
2020-06-28 01:55:05
49.234.219.196 attackbotsspam
Invalid user scs from 49.234.219.196 port 54272
2020-06-28 01:53:10
23.129.64.209 attackbotsspam
srv02 SSH BruteForce Attacks 22 ..
2020-06-28 01:41:29
111.231.116.149 attackbots
Invalid user xti from 111.231.116.149 port 35746
2020-06-28 01:45:17
91.121.86.22 attack
SSH bruteforce
2020-06-28 01:54:22
185.39.11.48 attackspam
Port scan: Attack repeated for 24 hours
2020-06-28 02:02:01
196.52.43.128 attackspam
Honeypot attack, port: 445, PTR: 196.52.43.128.netsystemsresearch.com.
2020-06-28 01:55:55
159.203.112.185 attackbotsspam
Jun 27 14:15:18 ncomp sshd[8447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.112.185  user=root
Jun 27 14:15:20 ncomp sshd[8447]: Failed password for root from 159.203.112.185 port 34000 ssh2
Jun 27 14:16:56 ncomp sshd[8463]: Invalid user cy from 159.203.112.185
2020-06-28 01:47:58
129.211.94.30 attackbotsspam
Jun 27 12:30:21 askasleikir sshd[40679]: Failed password for root from 129.211.94.30 port 39706 ssh2
2020-06-28 02:12:28
117.82.188.161 attack
Invalid user exx from 117.82.188.161 port 31438
2020-06-28 01:39:42
193.8.82.84 attackbotsspam
2020-06-27T23:37:01.875935hostname sshd[10983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.8.82.84
2020-06-27T23:37:01.826238hostname sshd[10983]: Invalid user alberto from 193.8.82.84 port 33686
2020-06-27T23:37:03.877782hostname sshd[10983]: Failed password for invalid user alberto from 193.8.82.84 port 33686 ssh2
...
2020-06-28 01:47:12
141.98.10.197 attack
Jun 27 18:22:27 tuxlinux sshd[30076]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.10.197  user=root
...
2020-06-28 02:13:36
140.143.143.200 attackbotsspam
Jun 27 14:06:49 ns382633 sshd\[9151\]: Invalid user yip from 140.143.143.200 port 46998
Jun 27 14:06:49 ns382633 sshd\[9151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.143.200
Jun 27 14:06:51 ns382633 sshd\[9151\]: Failed password for invalid user yip from 140.143.143.200 port 46998 ssh2
Jun 27 14:16:53 ns382633 sshd\[10941\]: Invalid user itadmin from 140.143.143.200 port 52972
Jun 27 14:16:53 ns382633 sshd\[10941\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.143.200
2020-06-28 01:50:08
222.186.173.154 attackbots
Jun 27 19:21:46 sso sshd[11612]: Failed password for root from 222.186.173.154 port 3900 ssh2
Jun 27 19:21:55 sso sshd[11612]: Failed password for root from 222.186.173.154 port 3900 ssh2
...
2020-06-28 01:38:45
106.75.176.189 attackbotsspam
Jun 27 17:46:38 localhost sshd\[17273\]: Invalid user stas from 106.75.176.189
Jun 27 17:46:38 localhost sshd\[17273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.176.189
Jun 27 17:46:40 localhost sshd\[17273\]: Failed password for invalid user stas from 106.75.176.189 port 49382 ssh2
Jun 27 17:48:46 localhost sshd\[17366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.176.189  user=root
Jun 27 17:48:48 localhost sshd\[17366\]: Failed password for root from 106.75.176.189 port 44664 ssh2
...
2020-06-28 01:34:44

Recently Reported IPs

105.140.80.16 59.166.252.168 173.92.231.173 218.65.163.219
88.131.236.1 131.94.132.61 157.230.43.246 12.178.54.58
24.148.109.166 99.103.109.42 84.198.213.27 71.161.232.182
75.116.120.193 58.249.156.194 133.202.239.110 112.99.143.110
137.50.109.37 184.46.107.79 71.130.80.12 200.244.239.186