Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.38.249.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25884
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.38.249.42.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 10 15:12:48 CST 2019
;; MSG SIZE  rcvd: 116
Host info
42.249.38.68.in-addr.arpa domain name pointer c-68-38-249-42.hsd1.in.comcast.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
42.249.38.68.in-addr.arpa	name = c-68-38-249-42.hsd1.in.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.51.116.169 attackspambots
Nov 20 00:51:31 pkdns2 sshd\[51925\]: Invalid user aaguirre from 122.51.116.169Nov 20 00:51:33 pkdns2 sshd\[51925\]: Failed password for invalid user aaguirre from 122.51.116.169 port 27112 ssh2Nov 20 00:55:39 pkdns2 sshd\[52091\]: Invalid user resve from 122.51.116.169Nov 20 00:55:41 pkdns2 sshd\[52091\]: Failed password for invalid user resve from 122.51.116.169 port 16601 ssh2Nov 20 00:59:43 pkdns2 sshd\[52223\]: Invalid user test from 122.51.116.169Nov 20 00:59:45 pkdns2 sshd\[52223\]: Failed password for invalid user test from 122.51.116.169 port 62571 ssh2
...
2019-11-20 07:57:55
190.67.116.12 attackbots
Nov 20 00:03:50 vtv3 sshd[13644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.67.116.12 
Nov 20 00:03:51 vtv3 sshd[13644]: Failed password for invalid user chuj from 190.67.116.12 port 46974 ssh2
Nov 20 00:10:50 vtv3 sshd[15345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.67.116.12 
Nov 20 00:22:22 vtv3 sshd[17653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.67.116.12 
Nov 20 00:22:24 vtv3 sshd[17653]: Failed password for invalid user vonderscher from 190.67.116.12 port 44160 ssh2
Nov 20 00:28:07 vtv3 sshd[18768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.67.116.12 
Nov 20 00:40:55 vtv3 sshd[21648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.67.116.12 
Nov 20 00:40:57 vtv3 sshd[21648]: Failed password for invalid user balabanian from 190.67.116.12 port 40960 ssh2
Nov 2
2019-11-20 08:17:24
190.218.160.90 attackspam
Spam Timestamp : 19-Nov-19 20:39   BlockList Provider  combined abuse   (635)
2019-11-20 07:54:23
110.43.34.48 attackbots
Nov 19 11:59:39 tdfoods sshd\[24789\]: Invalid user greats from 110.43.34.48
Nov 19 11:59:39 tdfoods sshd\[24789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.34.48
Nov 19 11:59:41 tdfoods sshd\[24789\]: Failed password for invalid user greats from 110.43.34.48 port 32852 ssh2
Nov 19 12:04:21 tdfoods sshd\[25172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.43.34.48  user=root
Nov 19 12:04:23 tdfoods sshd\[25172\]: Failed password for root from 110.43.34.48 port 4002 ssh2
2019-11-20 08:06:51
95.160.157.55 attackbots
Spam Timestamp : 19-Nov-19 20:37   BlockList Provider  combined abuse   (632)
2019-11-20 07:57:27
184.154.74.68 attack
" "
2019-11-20 08:12:59
178.159.127.59 attackspambots
23/tcp 9001/tcp
[2019-10-19/11-19]2pkt
2019-11-20 08:22:08
148.70.250.207 attack
Nov 20 00:16:38 * sshd[14255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.250.207
Nov 20 00:16:40 * sshd[14255]: Failed password for invalid user admin from 148.70.250.207 port 45857 ssh2
2019-11-20 07:55:41
192.236.179.43 attack
2019-11-20T00:01:03.897685stark.klein-stark.info postfix/smtpd\[10825\]: NOQUEUE: reject: RCPT from hwsrv-566880.hostwindsdns.com\[192.236.179.43\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\
2019-11-20T00:22:59.415878stark.klein-stark.info postfix/smtpd\[12771\]: NOQUEUE: reject: RCPT from hwsrv-566880.hostwindsdns.com\[192.236.179.43\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\
...
2019-11-20 08:14:14
47.52.63.66 attackspambots
Unauthorized admin access - /admin//admin/
2019-11-20 08:15:44
77.8.25.14 attackbots
Nov 19 22:02:16 mxgate1 postfix/postscreen[29918]: CONNECT from [77.8.25.14]:28570 to [176.31.12.44]:25
Nov 19 22:02:16 mxgate1 postfix/dnsblog[29994]: addr 77.8.25.14 listed by domain zen.spamhaus.org as 127.0.0.11
Nov 19 22:02:16 mxgate1 postfix/dnsblog[29994]: addr 77.8.25.14 listed by domain zen.spamhaus.org as 127.0.0.4
Nov 19 22:02:16 mxgate1 postfix/dnsblog[29995]: addr 77.8.25.14 listed by domain cbl.abuseat.org as 127.0.0.2
Nov 19 22:02:16 mxgate1 postfix/dnsblog[29996]: addr 77.8.25.14 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 19 22:02:22 mxgate1 postfix/postscreen[29918]: DNSBL rank 4 for [77.8.25.14]:28570
Nov x@x
Nov 19 22:02:24 mxgate1 postfix/postscreen[29918]: HANGUP after 2.2 from [77.8.25.14]:28570 in tests after SMTP handshake
Nov 19 22:02:24 mxgate1 postfix/postscreen[29918]: DISCONNECT [77.8.25.14]:28570


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.8.25.14
2019-11-20 07:49:32
14.172.173.220 attackbots
Automatic report - Port Scan Attack
2019-11-20 08:13:45
51.255.109.164 attackbots
attempt to hack xmlrpc.php on wordpress site
2019-11-20 07:51:48
93.113.111.193 attackbotsspam
ft-1848-fussball.de 93.113.111.193 \[19/Nov/2019:22:11:43 +0100\] "POST /wp-login.php HTTP/1.1" 200 2905 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
ft-1848-fussball.de 93.113.111.193 \[19/Nov/2019:22:11:44 +0100\] "POST /wp-login.php HTTP/1.1" 200 2874 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
ft-1848-fussball.de 93.113.111.193 \[19/Nov/2019:22:11:44 +0100\] "POST /xmlrpc.php HTTP/1.1" 200 514 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-20 07:45:02
192.99.166.243 attack
Nov 18 15:20:07 rb06 sshd[29585]: Failed password for lp from 192.99.166.243 port 58630 ssh2
Nov 18 15:20:07 rb06 sshd[29585]: Received disconnect from 192.99.166.243: 11: Bye Bye [preauth]
Nov 18 15:44:05 rb06 sshd[11867]: Failed password for r.r from 192.99.166.243 port 57242 ssh2
Nov 18 15:44:05 rb06 sshd[11867]: Received disconnect from 192.99.166.243: 11: Bye Bye [preauth]
Nov 18 15:47:50 rb06 sshd[12652]: Failed password for r.r from 192.99.166.243 port 38496 ssh2
Nov 18 15:47:50 rb06 sshd[12652]: Received disconnect from 192.99.166.243: 11: Bye Bye [preauth]
Nov 18 15:51:23 rb06 sshd[13488]: Failed password for invalid user hkami from 192.99.166.243 port 47982 ssh2
Nov 18 15:51:23 rb06 sshd[13488]: Received disconnect from 192.99.166.243: 11: Bye Bye [preauth]
Nov 18 15:55:11 rb06 sshd[29206]: Failed password for invalid user appolhostnameo from 192.99.166.243 port 57434 ssh2
Nov 18 15:55:11 rb06 sshd[29206]: Received disconnect from 192.99.166.243: 11: Bye Bye [........
-------------------------------
2019-11-20 08:19:05

Recently Reported IPs

120.192.146.111 249.0.64.226 192.99.17.189 63.93.120.33
25.215.50.49 239.56.252.98 180.252.198.50 126.55.222.186
123.20.109.185 39.59.73.168 32.199.66.41 142.108.217.5
104.169.21.179 14.244.255.41 183.137.10.169 212.129.55.250
182.87.0.16 120.72.26.12 85.214.199.18 41.42.63.106