Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hanover

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.69.148.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10073
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.69.148.70.			IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020013101 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 04:24:17 CST 2020
;; MSG SIZE  rcvd: 116
Host info
70.148.69.68.in-addr.arpa is an alias for 70.148.69.68.cpe.wightman.ca.
70.148.69.68.cpe.wightman.ca domain name pointer dhcp-0-19-21-50-ff-4f.cpe.wightman.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.148.69.68.in-addr.arpa	canonical name = 70.148.69.68.cpe.wightman.ca.
70.148.69.68.cpe.wightman.ca	name = dhcp-0-19-21-50-ff-4f.cpe.wightman.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
35.223.122.181 attackspam
From: "Shopper Survey" 
-	UBE - (EHLO mailspamprotection.com) (212.237.17.126) Aruba S.p.a. 
-	Header mailspamprotection.com = 35.223.122.181 
-	Spam link softengins.com = repeat IP 212.237.13.213 
d)	aptrk1.com = 35.204.218.225 
e)	lvptrk.com = 103.28.32.25 
f)	bestvisitor.com = 154.16.136.13 
-	Spam link i.imgur.com = 151.101.120.193
-	Sender domain bestdealsus.club = 80.211.179.118
2020-05-24 08:11:03
222.186.15.115 attackspam
Wordpress malicious attack:[sshd]
2020-05-24 12:07:02
110.39.174.250 attackspam
Brute force attempt
2020-05-24 08:10:00
98.212.139.84 attack
2020-05-24T03:56:26.297Z CLOSE host=98.212.139.84 port=50827 fd=4 time=20.008 bytes=9
...
2020-05-24 12:04:29
49.232.14.216 attackspambots
Invalid user xra from 49.232.14.216 port 51496
2020-05-24 08:04:06
116.105.195.243 attack
May 24 00:58:52 firewall sshd[24040]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.105.195.243
May 24 00:58:51 firewall sshd[24040]: Invalid user admin from 116.105.195.243
May 24 00:58:54 firewall sshd[24040]: Failed password for invalid user admin from 116.105.195.243 port 59878 ssh2
...
2020-05-24 12:03:38
35.239.78.81 attackspam
May 24 01:25:44 server sshd[22121]: Failed password for invalid user xif from 35.239.78.81 port 38722 ssh2
May 24 01:29:00 server sshd[25562]: Failed password for invalid user tpe from 35.239.78.81 port 44060 ssh2
May 24 01:32:12 server sshd[29022]: Failed password for invalid user ves from 35.239.78.81 port 49400 ssh2
2020-05-24 08:09:19
119.31.126.100 attack
Repeated brute force against a port
2020-05-24 08:07:36
181.58.14.19 attackbots
Wordpress malicious attack:[sshd]
2020-05-24 12:08:18
222.186.175.163 attackspambots
May 23 20:01:07 NPSTNNYC01T sshd[2988]: Failed password for root from 222.186.175.163 port 26134 ssh2
May 23 20:01:21 NPSTNNYC01T sshd[2988]: error: maximum authentication attempts exceeded for root from 222.186.175.163 port 26134 ssh2 [preauth]
May 23 20:01:26 NPSTNNYC01T sshd[3002]: Failed password for root from 222.186.175.163 port 35320 ssh2
...
2020-05-24 08:03:21
190.47.136.120 attack
SSH Bruteforce Attempt (failed auth)
2020-05-24 12:14:42
138.68.226.234 attackspam
Invalid user jianqiao1 from 138.68.226.234 port 58358
2020-05-24 08:13:08
96.114.71.147 attackspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-05-24 08:18:09
195.54.160.180 attackbots
$f2bV_matches
2020-05-24 12:06:36
23.92.30.195 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-05-24 08:12:48

Recently Reported IPs

101.21.202.74 231.178.144.164 178.168.156.15 198.108.166.213
104.196.220.148 134.192.35.181 183.137.123.157 37.124.145.242
52.141.81.242 84.254.86.208 137.84.43.168 37.124.47.125
129.119.228.188 37.127.33.237 163.178.170.13 44.251.26.13
122.160.61.100 149.105.213.121 88.203.248.189 65.207.183.139