Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kenya

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.68.141.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14195
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.68.141.85.			IN	A

;; AUTHORITY SECTION:
.			60	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100601 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 03:57:26 CST 2022
;; MSG SIZE  rcvd: 106
Host info
85.141.68.102.in-addr.arpa domain name pointer ns4.kemnet.africa.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
85.141.68.102.in-addr.arpa	name = ns4.kemnet.africa.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.248.52.82 attack
sshd: Failed password for invalid user .... from 162.248.52.82 port 34760 ssh2 (7 attempts)
2020-06-13 17:15:00
69.172.94.9 attackbotsspam
Invalid user vcamapp from 69.172.94.9 port 44608
2020-06-13 16:53:44
202.51.74.180 attackbotsspam
Wordpress malicious attack:[sshd]
2020-06-13 17:14:20
118.143.201.168 attackbots
ssh brute force
2020-06-13 17:12:05
64.227.126.134 attack
Jun 13 01:55:31 dignus sshd[18032]: Failed password for root from 64.227.126.134 port 43564 ssh2
Jun 13 01:58:19 dignus sshd[18261]: Invalid user lb from 64.227.126.134 port 39528
Jun 13 01:58:19 dignus sshd[18261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.126.134
Jun 13 01:58:22 dignus sshd[18261]: Failed password for invalid user lb from 64.227.126.134 port 39528 ssh2
Jun 13 02:01:03 dignus sshd[18510]: Invalid user teamspeak3 from 64.227.126.134 port 35494
...
2020-06-13 17:12:56
114.67.94.144 attackspam
Port probing on unauthorized port 6379
2020-06-13 16:42:36
122.224.217.46 attackspam
Failed password for invalid user root from 122.224.217.46 port 33722 ssh2
2020-06-13 17:03:58
159.65.245.182 attackspam
Invalid user test from 159.65.245.182 port 39280
2020-06-13 17:00:11
122.51.253.157 attackbots
Jun 13 04:07:09 scw-6657dc sshd[16379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.253.157
Jun 13 04:07:09 scw-6657dc sshd[16379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.253.157
Jun 13 04:07:10 scw-6657dc sshd[16379]: Failed password for invalid user vh from 122.51.253.157 port 51864 ssh2
...
2020-06-13 17:06:25
180.168.141.246 attackspam
Invalid user ehsan from 180.168.141.246 port 39006
2020-06-13 17:19:54
187.149.40.85 attackbots
Jun 13 08:23:46 ns382633 sshd\[22718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.149.40.85  user=root
Jun 13 08:23:48 ns382633 sshd\[22718\]: Failed password for root from 187.149.40.85 port 38021 ssh2
Jun 13 08:29:53 ns382633 sshd\[23803\]: Invalid user user from 187.149.40.85 port 49977
Jun 13 08:29:53 ns382633 sshd\[23803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.149.40.85
Jun 13 08:29:56 ns382633 sshd\[23803\]: Failed password for invalid user user from 187.149.40.85 port 49977 ssh2
2020-06-13 16:57:32
14.18.118.183 attack
Invalid user hin from 14.18.118.183 port 39728
2020-06-13 16:51:40
51.255.171.172 attack
Jun 13 17:19:05 web1 sshd[27082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.171.172  user=root
Jun 13 17:19:07 web1 sshd[27082]: Failed password for root from 51.255.171.172 port 52026 ssh2
Jun 13 17:29:53 web1 sshd[29722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.171.172  user=root
Jun 13 17:29:55 web1 sshd[29722]: Failed password for root from 51.255.171.172 port 44526 ssh2
Jun 13 17:33:41 web1 sshd[30682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.171.172  user=root
Jun 13 17:33:43 web1 sshd[30682]: Failed password for root from 51.255.171.172 port 47402 ssh2
Jun 13 17:37:17 web1 sshd[31695]: Invalid user hw from 51.255.171.172 port 50294
Jun 13 17:37:17 web1 sshd[31695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.171.172
Jun 13 17:37:17 web1 sshd[31695]: Invalid user hw fro
...
2020-06-13 17:05:04
106.13.50.145 attackspam
Jun 13 06:12:16 vps333114 sshd[15862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.50.145
Jun 13 06:12:18 vps333114 sshd[15862]: Failed password for invalid user testuser from 106.13.50.145 port 36786 ssh2
...
2020-06-13 16:41:08
82.165.65.108 attackbots
ssh brute force
2020-06-13 17:12:24

Recently Reported IPs

159.223.196.26 138.0.116.49 178.128.229.57 128.90.201.160
80.187.74.166 84.154.26.80 128.90.21.222 124.222.253.123
149.18.29.29 20.248.160.226 189.112.47.106 192.64.5.34
142.93.33.122 135.125.158.129 64.227.14.75 49.143.172.22
171.234.113.98 139.198.41.148 61.172.252.171 165.22.215.53