199.168.128-191.x IP Lookup - United States
IP addresses in the 199.168.128-191.x range (199.168.0.0 - 199.168.255.255 network). 5 abuse reports have been filed for IPs in this range.
- 199.168.168.160, 199.168.156.119, 199.168.138.48, 199.168.138.126, 199.168.166.164, 199.168.186.240
- 199.168.161.155, 199.168.171.144, 199.168.145.49, 199.168.168.2, 199.168.159.15, 199.168.154.154
- 199.168.170.157, 199.168.187.39, 199.168.155.198, 199.168.167.19, 199.168.159.115, 199.168.148.137
- 199.168.135.7, 199.168.161.131, 199.168.185.212, 199.168.144.66, 199.168.151.158, 199.168.157.101
- 199.168.148.10, 199.168.167.45, 199.168.156.70, 199.168.146.102, 199.168.191.128, 199.168.138.80
- 199.168.156.99, 199.168.144.126, 199.168.184.25, 199.168.150.152, 199.168.171.56, 199.168.172.100
- 199.168.156.175, 199.168.165.127, 199.168.170.136, 199.168.189.132, 199.168.164.254, 199.168.155.221
- 199.168.164.203, 199.168.142.71, 199.168.171.234, 199.168.138.134, 199.168.171.51, 199.168.157.135
- 199.168.186.94, 199.168.143.9, 199.168.143.91, 199.168.141.33, 199.168.150.15, 199.168.146.121
- 199.168.150.193, 199.168.151.164, 199.168.129.97, 199.168.132.224, 199.168.161.61, 199.168.161.91
- 199.168.171.67, 199.168.161.231, 199.168.167.71, 199.168.143.246, 199.168.182.61, 199.168.134.217
- 199.168.167.105, 199.168.183.143, 199.168.144.245, 199.168.177.163, 199.168.189.203, 199.168.176.163
- 199.168.191.78, 199.168.144.47, 199.168.145.166, 199.168.172.103, 199.168.186.227, 199.168.137.127
- 199.168.172.152, 199.168.158.165, 199.168.190.47, 199.168.178.6, 199.168.144.131, 199.168.161.204
- 199.168.163.13, 199.168.164.145, 199.168.140.96, 199.168.129.115, 199.168.135.228, 199.168.144.208
- 199.168.151.98, 199.168.190.146, 199.168.175.108, 199.168.160.12, 199.168.138.174, 199.168.170.68
- 199.168.164.0, 199.168.132.59, 199.168.141.44, 199.168.179.235, 199.168.139.212, 199.168.190.231
- 199.168.135.218, 199.168.181.32, 199.168.143.208, 199.168.155.166, 199.168.175.125, 199.168.146.45
- 199.168.189.255, 199.168.137.12, 199.168.187.35, 199.168.147.32, 199.168.188.17, 199.168.189.69
- 199.168.136.143, 199.168.165.70, 199.168.176.189, 199.168.149.77, 199.168.174.144, 199.168.170.11
- 199.168.152.102, 199.168.137.223, 199.168.178.62, 199.168.153.79, 199.168.157.106, 199.168.189.42
- 199.168.146.157, 199.168.137.124, 199.168.131.210, 199.168.129.192, 199.168.172.203, 199.168.182.120
- 199.168.157.69, 199.168.162.15, 199.168.144.36, 199.168.185.134, 199.168.173.2, 199.168.141.159
- 199.168.133.177, 199.168.139.82, 199.168.129.226, 199.168.183.145, 199.168.181.70, 199.168.174.172
- 199.168.139.39, 199.168.189.110, 199.168.137.249, 199.168.160.126, 199.168.189.126, 199.168.146.132
- 199.168.151.134, 199.168.172.187, 199.168.187.187, 199.168.174.54, 199.168.188.137, 199.168.164.146
- 199.168.176.35, 199.168.182.25, 199.168.132.97, 199.168.136.137, 199.168.151.224, 199.168.147.14
- 199.168.189.78, 199.168.143.71, 199.168.138.94, 199.168.148.113, 199.168.177.205, 199.168.143.74
- 199.168.162.3, 199.168.133.239, 199.168.150.134, 199.168.185.108, 199.168.161.144, 199.168.146.95
- 199.168.158.64, 199.168.191.27, 199.168.167.59, 199.168.133.241, 199.168.129.247, 199.168.168.145
- 199.168.162.47, 199.168.151.218, 199.168.138.36, 199.168.161.226, 199.168.188.92, 199.168.135.88
- 199.168.137.242, 199.168.168.193, 199.168.149.40, 199.168.132.77, 199.168.141.135, 199.168.153.73
- 199.168.187.110, 199.168.137.103, 199.168.139.56, 199.168.191.16, 199.168.182.145, 199.168.147.97
- 199.168.141.81, 199.168.174.168, 199.168.164.233, 199.168.167.158, 199.168.186.207, 199.168.176.252
- 199.168.137.230, 199.168.150.4, 199.168.183.159, 199.168.136.34, 199.168.174.64, 199.168.181.18
- 199.168.175.241, 199.168.154.172, 199.168.176.22, 199.168.174.123, 199.168.149.14, 199.168.159.152
- 199.168.145.187, 199.168.186.236, 199.168.161.108, 199.168.185.56, 199.168.178.165, 199.168.168.132
- 199.168.180.233, 199.168.162.13, 199.168.136.193, 199.168.163.137, 199.168.187.153, 199.168.157.239
- 199.168.171.42, 199.168.155.62, 199.168.164.183, 199.168.183.209, 199.168.136.86, 199.168.183.115
- 199.168.165.236, 199.168.174.12, 199.168.176.166, 199.168.158.26, 199.168.139.30, 199.168.167.173
- 199.168.129.27, 199.168.159.53, 199.168.131.234, 199.168.145.139, 199.168.164.71, 199.168.157.140
- 199.168.176.240, 199.168.179.179, 199.168.144.77, 199.168.164.149, 199.168.178.164, 199.168.182.231
- 199.168.188.198, 199.168.176.159, 199.168.171.251, 199.168.134.104
Showing 256 of 16,384 IPs (199.168.168.160 to 199.168.134.104). Use the pagination below to browse all IPs in this range, or look up any specific IP directly.

199.168.141.203
Complaint by Andrew :
our server has been subjected to sustained brute force attacks from this IP Oct 21 03:52:29 server1 sshd[23621]: Failed password for invalid user testuser from 199.168.141.203 port 52794 ssh2 Oct 21 03:52:29 server1 sshd[23622]: Received disconnect from 199.168.141.203: 11: Bye Bye Oct 21 03:52:29 server1 sshd[23623]: Invalid user testuser from 199.168.141.203 Oct 21 03:52:29 server1 sshd[23624]: input_userauth_request: invalid user testuser Oct 21 03:52:29 server1 sshd[23623]: pam_unix(sshd:auth): check pass; user unknown Oct 21 03:52:29 server1 sshd[23623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.jornalportoalegre.enviosilimitados.com.br Oct 21 03:52:31 server1 sshd[23623]: Failed password for invalid user testuser from 199.168.141.203 port 53478 ssh2 Oct 21 03:52:31 server1 sshd[23624]: Received disconnect from 199.168.141.203: 11: Bye Bye Oct 21 03:52:31 server1 sshd[23626]: Invalid user testuser from 199.168.141.203 Oct 21 03:52:31 server1 sshd[23627]: input_userauth_request: invalid user testuser Oct 21 03:52:31 server1 sshd[23626]: pam_unix(sshd:auth): check pass; user unknown Oct 21 03:52:31 server1 sshd[23626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.jornalportoalegre.enviosilimitados.com.br Oct 21 03:52:33 server1 sshd[23626]: Failed password for invalid user testuser from 199.168.141.203 port 54115 ssh2 Oct 21 03:52:33 server1 sshd[23627]: Received disconnect from 199.168.141.203: 11: Bye Bye Oct 21 03:52:33 server1 sshd[23629]: Invalid user testuser from 199.168.141.203 Oct 21 03:52:33 server1 sshd[23630]: input_userauth_request: invalid user testuser Oct 21 03:52:33 server1 sshd[23629]: pam_unix(sshd:auth): check pass; user unknown Oct 21 03:52:33 server1 sshd[23629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.jornalportoalegre.enviosilimitados.com.br Oct 21 03:52:35 server1 sshd[23629]: Failed password for invalid user testuser from 199.168.141.203 port 54742 ssh2 Oct 21 03:52:35 server1 sshd[23630]: Received disconnect from 199.168.141.203: 11: Bye Bye Oct 21 03:52:35 server1 sshd[23634]: Invalid user testuser from 199.168.141.203 Oct 21 03:52:35 server1 sshd[23635]: input_userauth_request: invalid user testuser Oct 21 03:52:35 server1 sshd[23634]: pam_unix(sshd:auth): check pass; user unknown Oct 21 03:52:35 server1 sshd[23634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.jornalportoalegre.enviosilimitados.com.br Oct 21 03:52:37 server1 sshd[23634]: Failed password for invalid user testuser from 199.168.141.203 port 55484 ssh2 Oct 21 03:52:37 server1 sshd[23635]: Received disconnect from 199.168.141.203: 11: Bye Bye Oct 21 03:52:37 server1 sshd[23637]: Invalid user testuser from 199.168.141.203 Oct 21 03:52:37 server1 sshd[23638]: input_userauth_request: invalid user testuser Oct 21 03:52:37 server1 sshd[23637]: pam_unix(sshd:auth): check pass; user unknown Oct 21 03:52:37 server1 sshd[23637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail1.jornalportoalegre.enviosilimitados.com.br
199.168.175.115
Complaint by Sanjalica :
10:47:51 AM Block IN TCP 199.168.175.115 80 1234 SYN ACK Blocked by IP Blocklist Ultors Trojan, BackDoor-G, SubSeven , Tiles port 1234
199.168.142.11
Complaint by Gunnar :
IP 199.168.142.11 tried to hack my server at 10 Feb 2012.