Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.55.42.132
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32610
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.55.42.132.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 23:07:48 CST 2025
;; MSG SIZE  rcvd: 105
Host info
132.42.55.68.in-addr.arpa domain name pointer c-68-55-42-132.hsd1.mi.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
132.42.55.68.in-addr.arpa	name = c-68-55-42-132.hsd1.mi.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
63.81.93.134 attackbots
Jun 18 05:06:43 mail.srvfarm.net postfix/smtpd[1339035]: NOQUEUE: reject: RCPT from damage.ketabaneh.com[63.81.93.134]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun 18 05:08:42 mail.srvfarm.net postfix/smtpd[1337050]: NOQUEUE: reject: RCPT from unknown[63.81.93.134]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun 18 05:12:49 mail.srvfarm.net postfix/smtpd[1337375]: NOQUEUE: reject: RCPT from damage.ketabaneh.com[63.81.93.134]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Jun 18 05:13:53 mail.srvfarm.net postfix/smtpd[1339033]: NOQUEUE: reject: RCP
2020-06-18 16:46:56
49.232.106.176 attackspambots
$f2bV_matches
2020-06-18 16:39:27
72.167.224.135 attackbots
Jun 18 09:22:19 zulu412 sshd\[5731\]: Invalid user hk from 72.167.224.135 port 50144
Jun 18 09:22:19 zulu412 sshd\[5731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.167.224.135
Jun 18 09:22:21 zulu412 sshd\[5731\]: Failed password for invalid user hk from 72.167.224.135 port 50144 ssh2
...
2020-06-18 16:51:44
97.90.110.160 attackspam
*Port Scan* detected from 97.90.110.160 (US/United States/Oregon/Grants Pass/097-090-110-160.biz.spectrum.com). 4 hits in the last 75 seconds
2020-06-18 16:50:55
213.92.204.213 attackbotsspam
(PL/Poland/-) SMTP Bruteforcing attempts
2020-06-18 16:29:39
46.38.145.4 attackbots
Rude login attack (374 tries in 1d)
2020-06-18 16:49:51
91.121.164.188 attackbotsspam
Jun 18 09:39:14 localhost sshd\[3883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.164.188  user=root
Jun 18 09:39:17 localhost sshd\[3883\]: Failed password for root from 91.121.164.188 port 54494 ssh2
Jun 18 09:42:24 localhost sshd\[4136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.164.188  user=root
Jun 18 09:42:25 localhost sshd\[4136\]: Failed password for root from 91.121.164.188 port 53270 ssh2
Jun 18 09:45:44 localhost sshd\[4394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.164.188  user=root
...
2020-06-18 16:26:09
157.245.124.160 attackspambots
Jun 18 08:59:19 eventyay sshd[23317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.124.160
Jun 18 08:59:21 eventyay sshd[23317]: Failed password for invalid user test123 from 157.245.124.160 port 57748 ssh2
Jun 18 09:02:24 eventyay sshd[23527]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.124.160
...
2020-06-18 17:02:50
13.80.116.138 attackspambots
Jun 17 09:05:14 izar postfix/smtpd[18087]: connect from unknown[13.80.116.138]
Jun 17 09:05:14 izar postfix/smtpd[18087]: warning: unknown[13.80.116.138]: SASL LOGIN authentication failed: authentication failure
Jun 17 09:05:14 izar postfix/smtpd[18087]: disconnect from unknown[13.80.116.138]
Jun 17 09:22:37 izar postfix/smtpd[20502]: connect from unknown[13.80.116.138]
Jun 17 09:22:38 izar postfix/smtpd[20502]: warning: unknown[13.80.116.138]: SASL LOGIN authentication failed: authentication failure
Jun 17 09:22:38 izar postfix/smtpd[20502]: disconnect from unknown[13.80.116.138]
Jun 17 09:23:59 izar postfix/smtpd[20426]: connect from unknown[13.80.116.138]
Jun 17 09:23:59 izar postfix/smtpd[20426]: warning: unknown[13.80.116.138]: SASL LOGIN authentication failed: authentication failure
Jun 17 09:23:59 izar postfix/smtpd[20426]: disconnect from unknown[13.80.116.138]
Jun 17 09:27:37 izar postfix/smtpd[20426]: connect from unknown[13.80.116.138]
Jun 17 09:27:37 izar po........
-------------------------------
2020-06-18 16:50:25
104.168.71.152 attackspam
(sshd) Failed SSH login from 104.168.71.152 (US/United States/104-168-71-152-host.colocrossing.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 18 09:34:51 amsweb01 sshd[10984]: Invalid user www-data from 104.168.71.152 port 56111
Jun 18 09:34:53 amsweb01 sshd[10984]: Failed password for invalid user www-data from 104.168.71.152 port 56111 ssh2
Jun 18 09:40:33 amsweb01 sshd[11763]: Invalid user sftp_user from 104.168.71.152 port 55927
Jun 18 09:40:35 amsweb01 sshd[11763]: Failed password for invalid user sftp_user from 104.168.71.152 port 55927 ssh2
Jun 18 09:51:31 amsweb01 sshd[13339]: Invalid user ninja from 104.168.71.152 port 55567
2020-06-18 16:19:44
165.22.61.82 attackbotsspam
21 attempts against mh-ssh on echoip
2020-06-18 16:19:02
124.158.150.98 attackspam
DATE:2020-06-18 05:51:20, IP:124.158.150.98, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-06-18 16:51:19
170.0.48.177 attackspam
Jun 18 05:31:52 mail.srvfarm.net postfix/smtps/smtpd[1340853]: warning: unknown[170.0.48.177]: SASL PLAIN authentication failed: 
Jun 18 05:31:52 mail.srvfarm.net postfix/smtps/smtpd[1340853]: lost connection after AUTH from unknown[170.0.48.177]
Jun 18 05:36:58 mail.srvfarm.net postfix/smtpd[1342867]: warning: unknown[170.0.48.177]: SASL PLAIN authentication failed: 
Jun 18 05:36:58 mail.srvfarm.net postfix/smtpd[1342867]: lost connection after AUTH from unknown[170.0.48.177]
Jun 18 05:41:29 mail.srvfarm.net postfix/smtps/smtpd[1343122]: warning: unknown[170.0.48.177]: SASL PLAIN authentication failed:
2020-06-18 16:34:09
91.246.211.43 attack
Jun 18 04:58:52 mail.srvfarm.net postfix/smtps/smtpd[1335606]: warning: unknown[91.246.211.43]: SASL PLAIN authentication failed: 
Jun 18 04:58:52 mail.srvfarm.net postfix/smtps/smtpd[1335606]: lost connection after AUTH from unknown[91.246.211.43]
Jun 18 05:07:44 mail.srvfarm.net postfix/smtps/smtpd[1338900]: warning: unknown[91.246.211.43]: SASL PLAIN authentication failed: 
Jun 18 05:07:44 mail.srvfarm.net postfix/smtps/smtpd[1338900]: lost connection after AUTH from unknown[91.246.211.43]
Jun 18 05:07:59 mail.srvfarm.net postfix/smtps/smtpd[1338971]: warning: unknown[91.246.211.43]: SASL PLAIN authentication failed:
2020-06-18 16:46:27
51.38.188.63 attackbots
Jun 18 09:25:39 ns382633 sshd\[23774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.63  user=root
Jun 18 09:25:42 ns382633 sshd\[23774\]: Failed password for root from 51.38.188.63 port 55576 ssh2
Jun 18 09:30:29 ns382633 sshd\[24949\]: Invalid user work from 51.38.188.63 port 35916
Jun 18 09:30:29 ns382633 sshd\[24949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.63
Jun 18 09:30:31 ns382633 sshd\[24949\]: Failed password for invalid user work from 51.38.188.63 port 35916 ssh2
2020-06-18 17:01:20

Recently Reported IPs

68.248.146.157 212.174.174.246 212.58.13.100 186.247.182.87
126.199.117.37 253.105.155.237 187.94.73.211 121.115.91.5
127.92.201.94 96.71.48.236 188.111.66.222 96.53.145.102
18.12.142.216 153.54.214.139 174.219.10.15 63.46.98.220
246.14.241.189 222.13.122.154 165.182.126.82 57.30.191.230