Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Soddy-Daisy

Region: Tennessee

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.169.172.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32130
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.169.172.139.			IN	A

;; AUTHORITY SECTION:
.			200	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071502 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 16 09:09:50 CST 2022
;; MSG SIZE  rcvd: 107
Host info
139.172.169.68.in-addr.arpa domain name pointer host-68-169-172-139.DAIOLT1.epbfi.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.172.169.68.in-addr.arpa	name = host-68-169-172-139.DAIOLT1.epbfi.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.172.240.188 attack
firewall-block, port(s): 8073/tcp
2019-07-04 18:46:06
43.252.36.98 attack
2019-07-04T08:09:13.6937391240 sshd\[3693\]: Invalid user paulj from 43.252.36.98 port 53928
2019-07-04T08:09:13.6981611240 sshd\[3693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.252.36.98
2019-07-04T08:09:15.2769981240 sshd\[3693\]: Failed password for invalid user paulj from 43.252.36.98 port 53928 ssh2
...
2019-07-04 19:11:38
51.158.68.133 attackbotsspam
51.158.68.133 - - [04/Jul/2019:02:08:45 -0400] "GET /?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00&manufacturerID=127&productID=9050Z-TSS&linkID=8215&duplicate=0 HTTP/1.1" 200 17261 "https://californiafaucetsupply.com/?page=products&action=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00&manufacturerID=127&productID=9050Z-TSS&linkID=8215&duplicate=0" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-07-04 19:22:56
193.188.22.13 attackspambots
RDP attack
2019-07-04 19:09:59
190.20.144.81 attack
Lines containing failures of 190.20.144.81
Jul  4 07:42:19 server01 postfix/smtpd[17414]: connect from 190-20-144-81.baf.movistar.cl[190.20.144.81]
Jul x@x
Jul x@x
Jul  4 07:42:21 server01 postfix/policy-spf[17421]: : Policy action=PREPEND Received-SPF: none (ceinternet.com.au: No applicable sender policy available) receiver=x@x
Jul x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=190.20.144.81
2019-07-04 19:23:18
193.32.163.71 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-07-04 18:56:22
49.156.45.181 attack
49.156.45.181 - - [04/Jul/2019:02:10:03 -0400] "GET /?page=products&action=view&manufacturerID=127&productID=/etc/passwd&linkID=8215&duplicate=0 HTTP/1.1" 302 - "https://californiafaucetsupply.com/?page=products&action=view&manufacturerID=127&productID=/etc/passwd&linkID=8215&duplicate=0" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-07-04 18:57:23
213.99.150.11 attack
23/tcp
[2019-07-04]1pkt
2019-07-04 18:47:40
35.195.139.112 attackspambots
Jul  4 10:59:05 marvibiene sshd[52947]: Invalid user www from 35.195.139.112 port 50986
Jul  4 10:59:05 marvibiene sshd[52947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.195.139.112
Jul  4 10:59:05 marvibiene sshd[52947]: Invalid user www from 35.195.139.112 port 50986
Jul  4 10:59:07 marvibiene sshd[52947]: Failed password for invalid user www from 35.195.139.112 port 50986 ssh2
...
2019-07-04 19:05:07
197.248.16.118 attackbotsspam
2019-07-04T06:03:15.734892hub.schaetter.us sshd\[30318\]: Invalid user maxwell from 197.248.16.118
2019-07-04T06:03:15.787093hub.schaetter.us sshd\[30318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118
2019-07-04T06:03:17.551979hub.schaetter.us sshd\[30318\]: Failed password for invalid user maxwell from 197.248.16.118 port 46088 ssh2
2019-07-04T06:09:09.394529hub.schaetter.us sshd\[30388\]: Invalid user marz39 from 197.248.16.118
2019-07-04T06:09:09.434398hub.schaetter.us sshd\[30388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.248.16.118
...
2019-07-04 19:14:34
58.227.2.130 attackbots
Jul  4 12:12:27 lnxweb61 sshd[16725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.227.2.130
2019-07-04 19:03:57
115.73.30.250 attackbotsspam
2019-07-04 07:40:54 unexpected disconnection while reading SMTP command from (adsl.viettel.vn) [115.73.30.250]:38619 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 07:42:02 unexpected disconnection while reading SMTP command from (adsl.viettel.vn) [115.73.30.250]:56757 I=[10.100.18.25]:25 (error: Connection reset by peer)
2019-07-04 07:42:15 unexpected disconnection while reading SMTP command from (adsl.viettel.vn) [115.73.30.250]:22955 I=[10.100.18.25]:25 (error: Connection reset by peer)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=115.73.30.250
2019-07-04 19:19:05
103.4.167.101 attack
Jul  4 09:12:27 rpi sshd[8646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.4.167.101 
Jul  4 09:12:29 rpi sshd[8646]: Failed password for invalid user weldon from 103.4.167.101 port 57944 ssh2
2019-07-04 19:10:35
116.193.217.138 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.217.138
Failed password for invalid user PRECISIONSPMGR from 116.193.217.138 port 61169 ssh2
Invalid user lang from 116.193.217.138 port 17039
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.193.217.138
Failed password for invalid user lang from 116.193.217.138 port 17039 ssh2
2019-07-04 19:24:45
197.237.197.177 attackspam
2019-07-04 07:04:25 H=(197.237.197.177.wananchi.com) [197.237.197.177]:44293 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=197.237.197.177)
2019-07-04 07:04:29 unexpected disconnection while reading SMTP command from (197.237.197.177.wananchi.com) [197.237.197.177]:44293 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-07-04 07:42:04 H=(197.237.197.177.wananchi.com) [197.237.197.177]:46841 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=197.237.197.177)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.237.197.177
2019-07-04 19:17:17

Recently Reported IPs

122.245.90.249 87.19.248.203 13.65.28.202 60.237.99.188
176.91.194.11 137.184.246.83 187.140.243.146 181.131.6.22
20.100.171.51 196.207.226.14 104.132.118.94 68.183.151.15
125.138.216.230 118.79.176.174 45.61.188.89 149.202.251.88
43.132.162.110 61.246.2.77 180.211.159.66 183.56.206.145