Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Morocco

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 105.68.2.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;105.68.2.48.			IN	A

;; AUTHORITY SECTION:
.			293	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 14:27:13 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 48.2.68.105.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.2.68.105.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.33.20.42 attackspam
Automatic report - Port Scan Attack
2020-08-03 22:41:50
152.136.17.25 attackbotsspam
Fail2Ban Ban Triggered
2020-08-03 22:23:43
95.188.120.88 attackbotsspam
Failed password for root from 95.188.120.88 port 34780 ssh2
2020-08-03 22:06:00
60.167.180.216 attackspam
Aug  3 15:15:43 ns382633 sshd\[31485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.180.216  user=root
Aug  3 15:15:46 ns382633 sshd\[31485\]: Failed password for root from 60.167.180.216 port 59360 ssh2
Aug  3 15:45:26 ns382633 sshd\[4670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.180.216  user=root
Aug  3 15:45:28 ns382633 sshd\[4670\]: Failed password for root from 60.167.180.216 port 54662 ssh2
Aug  3 15:47:45 ns382633 sshd\[4913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.167.180.216  user=root
2020-08-03 22:15:22
122.114.234.48 attackbots
Lines containing failures of 122.114.234.48 (max 1000)
Aug  3 03:04:12 localhost sshd[9039]: User r.r from 122.114.234.48 not allowed because listed in DenyUsers
Aug  3 03:04:12 localhost sshd[9039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.234.48  user=r.r
Aug  3 03:04:14 localhost sshd[9039]: Failed password for invalid user r.r from 122.114.234.48 port 56722 ssh2
Aug  3 03:04:16 localhost sshd[9039]: Received disconnect from 122.114.234.48 port 56722:11: Bye Bye [preauth]
Aug  3 03:04:16 localhost sshd[9039]: Disconnected from invalid user r.r 122.114.234.48 port 56722 [preauth]
Aug  3 03:15:41 localhost sshd[12275]: User r.r from 122.114.234.48 not allowed because listed in DenyUsers
Aug  3 03:15:41 localhost sshd[12275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.234.48  user=r.r
Aug  3 03:15:43 localhost sshd[12275]: Failed password for invalid user r.r from ........
------------------------------
2020-08-03 22:46:12
84.138.154.89 attackspambots
Aug  3 14:12:59 pve1 sshd[25667]: Failed password for root from 84.138.154.89 port 46604 ssh2
...
2020-08-03 22:43:23
163.172.61.214 attackspam
Aug  3 15:07:16 rocket sshd[3418]: Failed password for root from 163.172.61.214 port 51686 ssh2
Aug  3 15:13:14 rocket sshd[4289]: Failed password for root from 163.172.61.214 port 57914 ssh2
...
2020-08-03 22:44:22
193.107.75.42 attackspam
Brute-force attempt banned
2020-08-03 22:20:20
188.226.131.171 attackspambots
Aug  3 14:26:36 kh-dev-server sshd[14531]: Failed password for root from 188.226.131.171 port 50714 ssh2
...
2020-08-03 22:15:46
106.53.114.5 attackspambots
Automatic report - Banned IP Access
2020-08-03 22:42:41
180.182.47.132 attack
Aug  3 03:10:47 web9 sshd\[28423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132  user=root
Aug  3 03:10:49 web9 sshd\[28423\]: Failed password for root from 180.182.47.132 port 55939 ssh2
Aug  3 03:14:13 web9 sshd\[28940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132  user=root
Aug  3 03:14:15 web9 sshd\[28940\]: Failed password for root from 180.182.47.132 port 50552 ssh2
Aug  3 03:17:46 web9 sshd\[29405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.182.47.132  user=root
2020-08-03 22:12:45
42.194.144.170 attack
Lines containing failures of 42.194.144.170
Aug  3 02:49:30 ntop sshd[23592]: User r.r from 42.194.144.170 not allowed because not listed in AllowUsers
Aug  3 02:49:30 ntop sshd[23592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.144.170  user=r.r
Aug  3 02:49:32 ntop sshd[23592]: Failed password for invalid user r.r from 42.194.144.170 port 38908 ssh2
Aug  3 02:49:33 ntop sshd[23592]: Received disconnect from 42.194.144.170 port 38908:11: Bye Bye [preauth]
Aug  3 02:49:33 ntop sshd[23592]: Disconnected from invalid user r.r 42.194.144.170 port 38908 [preauth]
Aug  3 03:04:53 ntop sshd[25533]: User r.r from 42.194.144.170 not allowed because not listed in AllowUsers
Aug  3 03:04:53 ntop sshd[25533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.194.144.170  user=r.r
Aug  3 03:04:55 ntop sshd[25533]: Failed password for invalid user r.r from 42.194.144.170 port 52370 ssh2
Aug  ........
------------------------------
2020-08-03 22:33:16
163.172.117.227 attack
163.172.117.227 - - [03/Aug/2020:14:43:03 +0100] "POST /wp-login.php HTTP/1.1" 200 2081 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
163.172.117.227 - - [03/Aug/2020:14:43:04 +0100] "POST /wp-login.php HTTP/1.1" 200 2081 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
163.172.117.227 - - [03/Aug/2020:14:43:05 +0100] "POST /wp-login.php HTTP/1.1" 200 2084 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-03 22:30:52
184.105.247.224 attackbots
Port scan: Attack repeated for 24 hours
2020-08-03 22:08:08
52.81.87.43 attackbotsspam
2020-08-03T17:17:38.926931lavrinenko.info sshd[8933]: Failed password for root from 52.81.87.43 port 35454 ssh2
2020-08-03T17:20:10.135980lavrinenko.info sshd[9026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.81.87.43  user=root
2020-08-03T17:20:12.199930lavrinenko.info sshd[9026]: Failed password for root from 52.81.87.43 port 50778 ssh2
2020-08-03T17:22:48.425248lavrinenko.info sshd[9120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.81.87.43  user=root
2020-08-03T17:22:50.514081lavrinenko.info sshd[9120]: Failed password for root from 52.81.87.43 port 37870 ssh2
...
2020-08-03 22:41:01

Recently Reported IPs

253.117.155.44 160.163.50.28 207.0.181.123 203.119.169.35
138.59.105.211 191.131.97.168 126.139.36.53 23.126.53.118
213.205.197.21 42.25.128.245 91.6.97.147 151.251.61.10
87.223.28.250 165.3.145.14 180.127.131.72 68.101.251.250
133.214.2.111 193.89.253.9 9.207.122.39 171.157.158.215