Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.109.157.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31954
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.109.157.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:19:24 CST 2025
;; MSG SIZE  rcvd: 107
Host info
68.157.109.114.in-addr.arpa domain name pointer cm-114-109-157-68.revip13.asianet.co.th.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.157.109.114.in-addr.arpa	name = cm-114-109-157-68.revip13.asianet.co.th.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
89.36.222.85 attackspam
Aug 11 18:02:48 MK-Soft-Root1 sshd\[1195\]: Invalid user admin from 89.36.222.85 port 56994
Aug 11 18:02:48 MK-Soft-Root1 sshd\[1195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.222.85
Aug 11 18:02:50 MK-Soft-Root1 sshd\[1195\]: Failed password for invalid user admin from 89.36.222.85 port 56994 ssh2
...
2019-08-12 01:34:34
27.72.105.157 attack
Aug 11 17:50:40 lcl-usvr-02 sshd[1659]: Invalid user amit from 27.72.105.157 port 34476
Aug 11 17:50:40 lcl-usvr-02 sshd[1659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.72.105.157
Aug 11 17:50:40 lcl-usvr-02 sshd[1659]: Invalid user amit from 27.72.105.157 port 34476
Aug 11 17:50:42 lcl-usvr-02 sshd[1659]: Failed password for invalid user amit from 27.72.105.157 port 34476 ssh2
Aug 11 17:55:58 lcl-usvr-02 sshd[2890]: Invalid user dareen from 27.72.105.157 port 58038
...
2019-08-12 01:01:58
175.147.18.204 attack
Telnetd brute force attack detected by fail2ban
2019-08-12 01:33:06
77.85.203.4 attack
Automatic report - Port Scan Attack
2019-08-12 01:41:37
51.38.129.120 attackbots
Aug 11 20:12:41 vibhu-HP-Z238-Microtower-Workstation sshd\[4535\]: Invalid user keith from 51.38.129.120
Aug 11 20:12:41 vibhu-HP-Z238-Microtower-Workstation sshd\[4535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.129.120
Aug 11 20:12:43 vibhu-HP-Z238-Microtower-Workstation sshd\[4535\]: Failed password for invalid user keith from 51.38.129.120 port 59466 ssh2
Aug 11 20:17:03 vibhu-HP-Z238-Microtower-Workstation sshd\[4685\]: Invalid user redmine from 51.38.129.120
Aug 11 20:17:03 vibhu-HP-Z238-Microtower-Workstation sshd\[4685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.129.120
...
2019-08-12 01:28:23
91.200.126.174 attack
Email spam from ngutov92@gmail.com
2019-08-12 01:34:02
221.13.203.135 attackbots
Honeypot attack, port: 5555, PTR: hn.kd.smx.adsl.
2019-08-12 00:51:06
54.38.33.186 attack
Aug 11 14:56:30 SilenceServices sshd[28684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.33.186
Aug 11 14:56:32 SilenceServices sshd[28684]: Failed password for invalid user starbound from 54.38.33.186 port 34922 ssh2
Aug 11 15:00:43 SilenceServices sshd[31821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.33.186
2019-08-12 01:19:49
42.225.120.56 attackspambots
Honeypot attack, port: 23, PTR: hn.kd.ny.adsl.
2019-08-12 00:43:29
59.28.91.30 attackspam
Aug 11 18:50:41 cp sshd[7763]: Failed password for root from 59.28.91.30 port 33768 ssh2
Aug 11 18:50:41 cp sshd[7763]: Failed password for root from 59.28.91.30 port 33768 ssh2
Aug 11 18:55:29 cp sshd[10460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.28.91.30
2019-08-12 01:14:55
182.61.50.25 attack
2019-08-11T14:19:05.284841  sshd[32728]: Invalid user cmveng from 182.61.50.25 port 59236
2019-08-11T14:19:05.297765  sshd[32728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.50.25
2019-08-11T14:19:05.284841  sshd[32728]: Invalid user cmveng from 182.61.50.25 port 59236
2019-08-11T14:19:07.294832  sshd[32728]: Failed password for invalid user cmveng from 182.61.50.25 port 59236 ssh2
2019-08-11T14:24:08.066816  sshd[32759]: Invalid user lilycity from 182.61.50.25 port 44064
...
2019-08-12 01:24:48
185.153.180.38 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-12 00:45:21
197.44.155.182 attackbotsspam
Honeypot attack, port: 23, PTR: host-197.44.155.182-static.tedata.net.
2019-08-12 00:40:16
27.44.204.180 attackbots
22/tcp
[2019-08-11]1pkt
2019-08-12 00:29:15
180.183.116.232 attackbotsspam
Chat Spam
2019-08-12 00:46:00

Recently Reported IPs

53.133.122.254 74.71.78.3 190.241.205.184 235.51.48.134
25.6.190.223 67.63.40.249 201.6.254.211 175.106.119.229
78.196.33.202 93.251.193.14 189.46.111.172 206.57.190.13
117.14.72.63 56.242.201.43 179.46.193.248 104.175.143.37
204.152.111.85 66.149.33.171 55.47.12.194 104.83.27.212