Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.55.190.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.55.190.46.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 17:14:16 CST 2025
;; MSG SIZE  rcvd: 105
Host info
46.190.55.68.in-addr.arpa domain name pointer c-68-55-190-46.hsd1.mi.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.190.55.68.in-addr.arpa	name = c-68-55-190-46.hsd1.mi.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.189.109.203 attackspam
Unauthorized connection attempt from IP address 78.189.109.203 on Port 445(SMB)
2019-11-10 04:41:21
125.212.207.205 attack
2019-11-09T16:46:56.226060shield sshd\[10612\]: Invalid user sanfengai6 from 125.212.207.205 port 48208
2019-11-09T16:46:56.231774shield sshd\[10612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.207.205
2019-11-09T16:46:57.534084shield sshd\[10612\]: Failed password for invalid user sanfengai6 from 125.212.207.205 port 48208 ssh2
2019-11-09T16:51:27.741486shield sshd\[11023\]: Invalid user ltelles123 from 125.212.207.205 port 55138
2019-11-09T16:51:27.745704shield sshd\[11023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.207.205
2019-11-10 04:43:09
68.183.110.49 attack
Nov  9 16:41:01 OneL sshd\[21680\]: Invalid user setup from 68.183.110.49 port 55216
Nov  9 16:41:01 OneL sshd\[21680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.110.49
Nov  9 16:41:03 OneL sshd\[21680\]: Failed password for invalid user setup from 68.183.110.49 port 55216 ssh2
Nov  9 16:44:37 OneL sshd\[21716\]: Invalid user Anarchy from 68.183.110.49 port 35236
Nov  9 16:44:37 OneL sshd\[21716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.110.49
...
2019-11-10 04:14:08
104.238.110.156 attack
SSH bruteforce
2019-11-10 04:39:43
83.175.217.26 attack
Failed password for admin from 83.175.217.26 port 40413 ssh2
2019-11-10 04:18:06
196.1.228.149 attack
Unauthorized connection attempt from IP address 196.1.228.149 on Port 445(SMB)
2019-11-10 04:24:42
182.75.29.134 attackspambots
Unauthorized connection attempt from IP address 182.75.29.134 on Port 445(SMB)
2019-11-10 04:44:24
178.128.158.113 attackspambots
Nov  9 04:45:03 *** sshd[9372]: Failed password for invalid user user from 178.128.158.113 port 41232 ssh2
2019-11-10 04:19:35
60.249.193.205 attackspambots
Unauthorized connection attempt from IP address 60.249.193.205 on Port 445(SMB)
2019-11-10 04:27:41
222.186.175.154 attack
Nov  9 12:13:38 ny01 sshd[6052]: Failed password for root from 222.186.175.154 port 3280 ssh2
Nov  9 12:13:55 ny01 sshd[6052]: error: maximum authentication attempts exceeded for root from 222.186.175.154 port 3280 ssh2 [preauth]
Nov  9 12:14:06 ny01 sshd[6090]: Failed password for root from 222.186.175.154 port 24892 ssh2
2019-11-10 04:38:01
167.71.47.231 attackspambots
Nov  9 17:47:49 srv-ubuntu-dev3 sshd[41180]: Invalid user jessica from 167.71.47.231
Nov  9 17:47:49 srv-ubuntu-dev3 sshd[41180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.47.231
Nov  9 17:47:49 srv-ubuntu-dev3 sshd[41180]: Invalid user jessica from 167.71.47.231
Nov  9 17:47:51 srv-ubuntu-dev3 sshd[41180]: Failed password for invalid user jessica from 167.71.47.231 port 38868 ssh2
Nov  9 17:51:22 srv-ubuntu-dev3 sshd[41462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.47.231  user=root
Nov  9 17:51:25 srv-ubuntu-dev3 sshd[41462]: Failed password for root from 167.71.47.231 port 48042 ssh2
Nov  9 17:54:55 srv-ubuntu-dev3 sshd[41698]: Invalid user ftpuser from 167.71.47.231
Nov  9 17:54:55 srv-ubuntu-dev3 sshd[41698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.47.231
Nov  9 17:54:55 srv-ubuntu-dev3 sshd[41698]: Invalid user ftpuser f
...
2019-11-10 04:20:16
212.64.67.116 attackbots
Nov  8 13:45:34 cumulus sshd[31372]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.67.116  user=r.r
Nov  8 13:45:35 cumulus sshd[31372]: Failed password for r.r from 212.64.67.116 port 48770 ssh2
Nov  8 13:45:36 cumulus sshd[31372]: Received disconnect from 212.64.67.116 port 48770:11: Bye Bye [preauth]
Nov  8 13:45:36 cumulus sshd[31372]: Disconnected from 212.64.67.116 port 48770 [preauth]
Nov  8 13:56:01 cumulus sshd[31738]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.67.116  user=r.r
Nov  8 13:56:03 cumulus sshd[31738]: Failed password for r.r from 212.64.67.116 port 37834 ssh2
Nov  8 13:56:03 cumulus sshd[31738]: Received disconnect from 212.64.67.116 port 37834:11: Bye Bye [preauth]
Nov  8 13:56:03 cumulus sshd[31738]: Disconnected from 212.64.67.116 port 37834 [preauth]
Nov  8 14:00:18 cumulus sshd[31859]: pam_unix(sshd:auth): authentication failure; logname= uid=0........
-------------------------------
2019-11-10 04:21:40
43.226.39.249 attackbotsspam
Nov  8 06:00:07 myhostname sshd[18487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.39.249  user=r.r
Nov  8 06:00:09 myhostname sshd[18487]: Failed password for r.r from 43.226.39.249 port 40806 ssh2
Nov  8 06:00:09 myhostname sshd[18487]: Received disconnect from 43.226.39.249 port 40806:11: Bye Bye [preauth]
Nov  8 06:00:09 myhostname sshd[18487]: Disconnected from 43.226.39.249 port 40806 [preauth]
Nov  8 06:34:26 myhostname sshd[19831]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.39.249  user=r.r
Nov  8 06:34:28 myhostname sshd[19831]: Failed password for r.r from 43.226.39.249 port 41876 ssh2
Nov  8 06:34:28 myhostname sshd[19831]: Received disconnect from 43.226.39.249 port 41876:11: Bye Bye [preauth]
Nov  8 06:34:28 myhostname sshd[19831]: Disconnected from 43.226.39.249 port 41876 [preauth]
Nov  8 06:39:37 myhostname sshd[24914]: Invalid user vnc from 43.226.39.........
-------------------------------
2019-11-10 04:28:28
111.223.73.20 attack
Nov  9 18:09:24 localhost sshd\[5030\]: Invalid user engine from 111.223.73.20 port 54446
Nov  9 18:09:24 localhost sshd\[5030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.223.73.20
Nov  9 18:09:27 localhost sshd\[5030\]: Failed password for invalid user engine from 111.223.73.20 port 54446 ssh2
2019-11-10 04:22:28
197.45.75.194 attackspambots
Unauthorized connection attempt from IP address 197.45.75.194 on Port 445(SMB)
2019-11-10 04:34:44

Recently Reported IPs

196.89.183.47 66.3.133.159 208.127.201.0 88.130.157.217
26.128.16.93 168.221.243.51 88.38.148.192 22.136.28.212
227.6.183.110 52.96.77.165 215.159.128.66 83.213.185.67
154.248.219.53 130.13.243.35 169.64.167.154 82.162.3.105
114.183.8.124 66.143.57.10 125.6.212.202 200.170.23.10