Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.211.13.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58078
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;114.211.13.68.			IN	A

;; AUTHORITY SECTION:
.			202	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100200 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 02 18:55:15 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 68.13.211.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 68.13.211.114.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
193.29.15.60 attackspam
193.29.15.60 was recorded 12 times by 8 hosts attempting to connect to the following ports: 38082,26969,36968,20332,18081,10332,6588,8180. Incident counter (4h, 24h, all-time): 12, 128, 290
2019-11-07 20:05:24
125.112.47.4 attack
Port 1433 Scan
2019-11-07 20:15:42
180.178.106.85 attack
Unauthorised access (Nov  7) SRC=180.178.106.85 LEN=52 TTL=109 ID=26378 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-07 20:20:36
51.77.148.77 attack
$f2bV_matches
2019-11-07 20:22:19
218.29.42.220 attackspam
Nov  7 10:07:09 localhost sshd\[15765\]: Invalid user vhost from 218.29.42.220 port 48206
Nov  7 10:07:09 localhost sshd\[15765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.29.42.220
Nov  7 10:07:11 localhost sshd\[15765\]: Failed password for invalid user vhost from 218.29.42.220 port 48206 ssh2
2019-11-07 19:59:40
41.180.68.214 attack
Nov  7 07:11:01 venus sshd\[21594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.180.68.214  user=root
Nov  7 07:11:03 venus sshd\[21594\]: Failed password for root from 41.180.68.214 port 41400 ssh2
Nov  7 07:16:06 venus sshd\[21647\]: Invalid user polycom from 41.180.68.214 port 49804
...
2019-11-07 20:08:31
106.13.39.233 attack
Nov  7 10:32:23 ns41 sshd[5859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.39.233
Nov  7 10:32:23 ns41 sshd[5859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.39.233
2019-11-07 20:23:55
180.249.202.128 attack
Unauthorised access (Nov  7) SRC=180.249.202.128 LEN=52 TTL=115 ID=26195 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-07 19:47:09
218.78.53.37 attackspam
no
2019-11-07 19:43:40
188.246.226.71 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-11-07 20:10:18
165.22.103.169 attack
xmlrpc attack
2019-11-07 20:16:39
91.185.193.101 attackbotsspam
invalid user
2019-11-07 20:18:50
45.77.108.40 attackbots
Lines containing failures of 45.77.108.40 (max 1000)
Nov  5 08:04:31 mm sshd[19000]: Invalid user elephant from 45.77.108.40=
 port 53150
Nov  5 08:04:31 mm sshd[19000]: pam_unix(sshd:auth): authentication fai=
lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D45.77.108.=
40
Nov  5 08:04:33 mm sshd[19000]: Failed password for invalid user elepha=
nt from 45.77.108.40 port 53150 ssh2
Nov  5 08:04:35 mm sshd[19000]: Received disconnect from 45.77.108.40 p=
ort 53150:11: Bye Bye [preauth]
Nov  5 08:04:35 mm sshd[19000]: Disconnected from invalid user elephant=
 45.77.108.40 port 53150 [preauth]
Nov  5 08:14:27 mm sshd[19054]: pam_unix(sshd:auth): authentication fai=
lure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D45.77.108.=
40  user=3Dr.r
Nov  5 08:14:28 mm sshd[19054]: Failed password for r.r from 45.77.108=
.40 port 41644 ssh2
Nov  5 08:14:29 mm sshd[19054]: Received disconnect from 45.77.108.40 p=
ort 41644:11: Bye Bye [preauth]
Nov  5 08:14:29 m........
------------------------------
2019-11-07 20:15:57
222.186.190.92 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
Failed password for root from 222.186.190.92 port 39234 ssh2
Failed password for root from 222.186.190.92 port 39234 ssh2
Failed password for root from 222.186.190.92 port 39234 ssh2
Failed password for root from 222.186.190.92 port 39234 ssh2
2019-11-07 20:00:29
139.59.91.176 attackspam
Nov  7 08:26:32 vpn01 sshd[15260]: Failed password for root from 139.59.91.176 port 44660 ssh2
...
2019-11-07 20:11:37

Recently Reported IPs

31.75.190.175 214.247.14.175 162.98.180.199 153.149.110.5
73.180.10.106 103.133.45.151 73.63.194.68 133.127.87.152
211.204.135.71 135.95.158.71 180.71.4.139 18.74.53.104
172.31.90.96 86.99.185.196 176.240.173.150 32.210.213.254
134.255.90.101 162.18.55.154 81.190.140.153 118.17.31.138