Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Phoenix

Region: Arizona

Country: United States

Internet Service Provider: Softcom Internet Communications, Inc

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.3.119.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61635
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.3.119.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020801 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 09 04:30:43 CST 2025
;; MSG SIZE  rcvd: 105
Host info
142.119.3.68.in-addr.arpa domain name pointer ip68-3-119-142.ph.ph.cox.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.119.3.68.in-addr.arpa	name = ip68-3-119-142.ph.ph.cox.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.55.235.30 attackspambots
Invalid user ubuntu from 45.55.235.30 port 49081
2020-04-30 02:20:16
140.86.12.31 attackspam
$f2bV_matches
2020-04-30 02:05:42
221.165.252.143 attackspam
Invalid user testing from 221.165.252.143 port 48464
2020-04-30 01:54:21
27.254.130.67 attack
Apr 29 19:52:14 v22019038103785759 sshd\[12235\]: Invalid user emk from 27.254.130.67 port 41480
Apr 29 19:52:14 v22019038103785759 sshd\[12235\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.67
Apr 29 19:52:16 v22019038103785759 sshd\[12235\]: Failed password for invalid user emk from 27.254.130.67 port 41480 ssh2
Apr 29 19:57:07 v22019038103785759 sshd\[12579\]: Invalid user etienne from 27.254.130.67 port 58142
Apr 29 19:57:07 v22019038103785759 sshd\[12579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.67
...
2020-04-30 02:22:02
106.13.123.73 attackbots
Failed password for postgres from 106.13.123.73 port 33236 ssh2
2020-04-30 02:11:39
80.82.64.219 attack
port
2020-04-30 02:15:13
78.88.8.252 attackbots
Failed password for root from 78.88.8.252 port 42250 ssh2
2020-04-30 01:46:08
49.235.143.244 attackspam
$f2bV_matches
2020-04-30 01:51:36
123.31.27.102 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-04-30 02:08:49
77.232.100.160 attackspambots
Apr 29 15:52:04 ns381471 sshd[25145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.232.100.160
Apr 29 15:52:06 ns381471 sshd[25145]: Failed password for invalid user webmaster from 77.232.100.160 port 55734 ssh2
2020-04-30 01:46:25
38.73.238.138 attack
Failed password for postgres from 38.73.238.138 port 39572 ssh2
2020-04-30 01:52:36
104.248.130.10 attack
Apr 29 19:47:08 rotator sshd\[28364\]: Invalid user satis from 104.248.130.10Apr 29 19:47:11 rotator sshd\[28364\]: Failed password for invalid user satis from 104.248.130.10 port 49496 ssh2Apr 29 19:49:57 rotator sshd\[28376\]: Failed password for root from 104.248.130.10 port 42274 ssh2Apr 29 19:53:00 rotator sshd\[29144\]: Invalid user gh from 104.248.130.10Apr 29 19:53:02 rotator sshd\[29144\]: Failed password for invalid user gh from 104.248.130.10 port 35056 ssh2Apr 29 19:55:55 rotator sshd\[29901\]: Failed password for root from 104.248.130.10 port 56068 ssh2
...
2020-04-30 02:12:50
193.70.37.148 attackbotsspam
Invalid user teamspeak3 from 193.70.37.148 port 41736
2020-04-30 01:57:37
92.222.90.130 attackspambots
2020-04-29T13:57:44.633243abusebot-8.cloudsearch.cf sshd[29110]: Invalid user alok from 92.222.90.130 port 35826
2020-04-29T13:57:44.639876abusebot-8.cloudsearch.cf sshd[29110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.ip-92-222-90.eu
2020-04-29T13:57:44.633243abusebot-8.cloudsearch.cf sshd[29110]: Invalid user alok from 92.222.90.130 port 35826
2020-04-29T13:57:46.930567abusebot-8.cloudsearch.cf sshd[29110]: Failed password for invalid user alok from 92.222.90.130 port 35826 ssh2
2020-04-29T14:03:03.274672abusebot-8.cloudsearch.cf sshd[29393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.ip-92-222-90.eu  user=root
2020-04-29T14:03:05.362903abusebot-8.cloudsearch.cf sshd[29393]: Failed password for root from 92.222.90.130 port 58990 ssh2
2020-04-29T14:07:12.631368abusebot-8.cloudsearch.cf sshd[29694]: Invalid user tom from 92.222.90.130 port 42760
...
2020-04-30 02:13:44
51.38.186.180 attack
Apr 29 18:33:35 lukav-desktop sshd\[7458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180  user=mysql
Apr 29 18:33:37 lukav-desktop sshd\[7458\]: Failed password for mysql from 51.38.186.180 port 36252 ssh2
Apr 29 18:37:42 lukav-desktop sshd\[9945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180  user=root
Apr 29 18:37:45 lukav-desktop sshd\[9945\]: Failed password for root from 51.38.186.180 port 41948 ssh2
Apr 29 18:41:47 lukav-desktop sshd\[12701\]: Invalid user carla from 51.38.186.180
2020-04-30 01:50:46

Recently Reported IPs

149.187.102.221 8.114.249.78 205.127.230.12 171.216.238.191
64.69.69.122 218.208.93.210 227.197.31.72 182.188.228.72
185.220.26.130 26.252.194.148 146.58.44.209 255.0.172.63
58.223.255.239 125.254.126.205 212.24.164.71 50.197.251.175
100.21.250.86 77.43.244.205 102.120.29.92 235.253.9.53