Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Aston Mills

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Comcast Cable Communications, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.81.85.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36546
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.81.85.214.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081801 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 19 01:45:43 CST 2019
;; MSG SIZE  rcvd: 116
Host info
214.85.81.68.in-addr.arpa domain name pointer c-68-81-85-214.hsd1.pa.comcast.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
214.85.81.68.in-addr.arpa	name = c-68-81-85-214.hsd1.pa.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
132.232.227.102 attack
ssh failed login
2019-07-01 05:35:26
37.247.108.101 attackspambots
[ssh] SSH attack
2019-07-01 05:40:55
198.108.67.39 attackbotsspam
3503/tcp 3053/tcp 2806/tcp...
[2019-04-30/06-30]97pkt,92pt.(tcp)
2019-07-01 05:47:05
67.227.188.26 attackspambots
Jun 30 22:57:22 MK-Soft-Root2 sshd\[22816\]: Invalid user alexandra from 67.227.188.26 port 44178
Jun 30 22:57:22 MK-Soft-Root2 sshd\[22816\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.227.188.26
Jun 30 22:57:24 MK-Soft-Root2 sshd\[22816\]: Failed password for invalid user alexandra from 67.227.188.26 port 44178 ssh2
...
2019-07-01 05:32:50
185.176.26.25 attackbotsspam
firewall-block, port(s): 4489/tcp, 54321/tcp
2019-07-01 05:49:39
198.108.67.32 attack
firewall-block, port(s): 7788/tcp
2019-07-01 05:48:19
106.57.208.227 attackbotsspam
23/tcp
[2019-06-30]1pkt
2019-07-01 06:04:50
111.15.181.122 attack
" "
2019-07-01 05:26:34
68.14.135.194 attackbots
Many RDP login attempts detected by IDS script
2019-07-01 05:45:43
31.155.227.62 attackbotsspam
http
2019-07-01 05:53:21
187.108.79.176 attackbotsspam
SMTP-sasl brute force
...
2019-07-01 05:38:33
203.174.163.231 attack
1032/tcp 1031/tcp 1030/tcp...
[2019-04-29/06-30]133pkt,89pt.(tcp)
2019-07-01 05:44:49
220.164.2.90 attackbotsspam
Jun 30 13:01:53 mailman dovecot: imap-login: Disconnected (auth failed, 1 attempts): user=, method=PLAIN, rip=220.164.2.90, lip=[munged], TLS: Disconnected
2019-07-01 05:33:54
78.57.231.248 attackbotsspam
Jun 30 15:13:54 xeon sshd[54793]: Invalid user px from 78.57.231.248
2019-07-01 05:39:41
103.97.124.47 attack
SQL Injection Exploit Attempts
2019-07-01 05:49:08

Recently Reported IPs

97.68.10.71 220.96.9.217 223.246.124.88 37.71.14.177
200.76.15.237 3.60.243.139 115.157.165.193 32.40.149.207
213.51.88.145 187.237.188.205 115.58.244.122 60.121.71.246
89.184.53.140 188.103.74.251 64.108.249.115 214.79.62.33
209.121.153.63 198.152.86.194 173.226.144.13 194.179.137.112