Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Battle Creek

Region: Michigan

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Comcast Cable Communications, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.34.44.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.34.44.42.			IN	A

;; AUTHORITY SECTION:
.			384	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082900 1800 900 604800 86400

;; Query time: 362 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 30 00:32:53 CST 2019
;; MSG SIZE  rcvd: 115

Host info
42.44.34.68.in-addr.arpa domain name pointer c-68-34-44-42.hsd1.mi.comcast.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
42.44.34.68.in-addr.arpa	name = c-68-34-44-42.hsd1.mi.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
179.35.138.29 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 09:59:40,389 INFO [amun_request_handler] PortScan Detected on Port: 445 (179.35.138.29)
2019-09-08 04:05:58
45.80.64.246 attackspam
Sep  7 23:04:16 yabzik sshd[14815]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246
Sep  7 23:04:18 yabzik sshd[14815]: Failed password for invalid user sinusbot from 45.80.64.246 port 41854 ssh2
Sep  7 23:08:34 yabzik sshd[16396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.64.246
2019-09-08 04:08:54
116.12.200.194 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 10:00:44,081 INFO [amun_request_handler] PortScan Detected on Port: 445 (116.12.200.194)
2019-09-08 03:45:17
60.250.23.105 attack
$f2bV_matches_ltvn
2019-09-08 04:11:13
193.17.7.84 attackspam
Received: from shaxiamon.top (193.17.7.84) 
Domain Service
2019-09-08 03:46:51
177.190.170.2 attackbotsspam
Unauthorized connection attempt from IP address 177.190.170.2 on Port 445(SMB)
2019-09-08 03:47:32
167.71.251.2 attackbots
Sep  7 07:36:03 TORMINT sshd\[21465\]: Invalid user mc from 167.71.251.2
Sep  7 07:36:03 TORMINT sshd\[21465\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.251.2
Sep  7 07:36:05 TORMINT sshd\[21465\]: Failed password for invalid user mc from 167.71.251.2 port 46488 ssh2
...
2019-09-08 03:22:44
223.150.153.204 attack
Port 1433 Scan
2019-09-08 04:04:28
80.211.116.102 attackspambots
Sep  7 20:36:42 dedicated sshd[9585]: Invalid user ts3server from 80.211.116.102 port 34447
2019-09-08 03:43:34
14.227.142.51 attackspambots
Unauthorized connection attempt from IP address 14.227.142.51 on Port 445(SMB)
2019-09-08 04:09:51
186.103.197.99 attack
Unauthorized connection attempt from IP address 186.103.197.99 on Port 445(SMB)
2019-09-08 04:10:46
103.1.40.189 attackbots
Sep  7 16:19:41 hb sshd\[26666\]: Invalid user hduser from 103.1.40.189
Sep  7 16:19:41 hb sshd\[26666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.40.189
Sep  7 16:19:43 hb sshd\[26666\]: Failed password for invalid user hduser from 103.1.40.189 port 52815 ssh2
Sep  7 16:28:08 hb sshd\[27529\]: Invalid user minecraft from 103.1.40.189
Sep  7 16:28:08 hb sshd\[27529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.1.40.189
2019-09-08 03:29:40
117.4.32.26 attack
Unauthorized connection attempt from IP address 117.4.32.26 on Port 445(SMB)
2019-09-08 03:41:56
183.181.84.44 attackbotsspam
183.181.84.44 - - [07/Sep/2019:19:24:27 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
183.181.84.44 - - [07/Sep/2019:19:24:28 +0200] "POST /wp-login.php HTTP/1.1" 200 1704 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
183.181.84.44 - - [07/Sep/2019:19:24:28 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
183.181.84.44 - - [07/Sep/2019:19:24:29 +0200] "POST /wp-login.php HTTP/1.1" 200 1710 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
183.181.84.44 - - [07/Sep/2019:19:24:30 +0200] "GET /wp-login.php HTTP/1.1" 200 1301 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
183.181.84.44 - - [07/Sep/2019:19:24:31 +0200] "POST /wp-login.php HTTP/1.1" 200 1710 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-09-08 03:37:29
148.70.116.90 attack
Sep  7 09:27:51 aiointranet sshd\[23638\]: Invalid user developer from 148.70.116.90
Sep  7 09:27:51 aiointranet sshd\[23638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.116.90
Sep  7 09:27:52 aiointranet sshd\[23638\]: Failed password for invalid user developer from 148.70.116.90 port 34402 ssh2
Sep  7 09:32:38 aiointranet sshd\[24062\]: Invalid user postgres from 148.70.116.90
Sep  7 09:32:38 aiointranet sshd\[24062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.116.90
2019-09-08 03:39:48

Recently Reported IPs

216.137.227.0 70.43.14.119 123.234.39.5 65.89.67.102
63.173.157.114 194.83.52.94 2.15.124.51 197.202.149.56
91.20.68.5 140.142.239.85 86.205.107.94 121.194.32.127
116.153.142.192 220.37.230.58 93.81.243.173 220.237.89.91
4.4.241.45 52.240.85.239 141.55.195.129 175.84.6.198