Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.202.119.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43373
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.202.119.68.			IN	A

;; AUTHORITY SECTION:
.			317	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 02:22:13 CST 2022
;; MSG SIZE  rcvd: 107
Host info
68.119.202.116.in-addr.arpa domain name pointer static.68.119.202.116.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.119.202.116.in-addr.arpa	name = static.68.119.202.116.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.91.254.143 attackbots
Feb 21 15:07:04 ift sshd\[60953\]: Invalid user gitlab-runner from 51.91.254.143Feb 21 15:07:06 ift sshd\[60953\]: Failed password for invalid user gitlab-runner from 51.91.254.143 port 44662 ssh2Feb 21 15:10:12 ift sshd\[61566\]: Invalid user cpanelphpmyadmin from 51.91.254.143Feb 21 15:10:14 ift sshd\[61566\]: Failed password for invalid user cpanelphpmyadmin from 51.91.254.143 port 45702 ssh2Feb 21 15:13:33 ift sshd\[61968\]: Invalid user tom from 51.91.254.143
...
2020-02-22 02:47:39
170.84.48.82 attackbots
Unauthorized connection attempt from IP address 170.84.48.82 on Port 445(SMB)
2020-02-22 03:12:03
185.209.0.32 attackspam
firewall-block, port(s): 3513/tcp, 3704/tcp
2020-02-22 02:46:16
79.124.62.34 attackbots
02/21/2020-13:28:01.269723 79.124.62.34 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-22 03:15:01
223.99.248.117 attackspambots
Feb 21 14:43:42 firewall sshd[6477]: Invalid user linqj from 223.99.248.117
Feb 21 14:43:44 firewall sshd[6477]: Failed password for invalid user linqj from 223.99.248.117 port 43222 ssh2
Feb 21 14:47:28 firewall sshd[6585]: Invalid user javier from 223.99.248.117
...
2020-02-22 02:51:10
191.112.150.54 attackbotsspam
Unauthorised access (Feb 21) SRC=191.112.150.54 LEN=40 TTL=52 ID=51797 TCP DPT=23 WINDOW=39141 SYN
2020-02-22 03:20:44
96.77.77.53 attack
proto=tcp  .  spt=48944  .  dpt=25  .     Listed on    dnsbl-sorbs plus abuseat-org and barracuda     (240)
2020-02-22 03:14:07
103.76.52.132 attackspam
Unauthorized connection attempt from IP address 103.76.52.132 on Port 445(SMB)
2020-02-22 03:02:51
59.127.235.92 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-22 02:49:19
37.49.226.114 attack
Unauthorised access (Feb 21) SRC=37.49.226.114 LEN=40 TTL=57 ID=22388 TCP DPT=8080 WINDOW=59083 SYN 
Unauthorised access (Feb 21) SRC=37.49.226.114 LEN=40 TTL=57 ID=12134 TCP DPT=8080 WINDOW=59083 SYN 
Unauthorised access (Feb 21) SRC=37.49.226.114 LEN=40 TTL=57 ID=23333 TCP DPT=8080 WINDOW=52204 SYN 
Unauthorised access (Feb 21) SRC=37.49.226.114 LEN=40 TTL=57 ID=47922 TCP DPT=8080 WINDOW=59083 SYN 
Unauthorised access (Feb 21) SRC=37.49.226.114 LEN=40 TTL=57 ID=60481 TCP DPT=8080 WINDOW=15644 SYN
2020-02-22 02:42:01
92.118.160.9 attackbotsspam
firewall-block, port(s): 5904/tcp
2020-02-22 02:40:49
14.143.223.82 attackbotsspam
Unauthorized connection attempt from IP address 14.143.223.82 on Port 445(SMB)
2020-02-22 03:01:15
180.253.238.224 attack
Unauthorized connection attempt from IP address 180.253.238.224 on Port 445(SMB)
2020-02-22 03:07:25
113.31.98.20 attack
Invalid user news from 113.31.98.20 port 43902
2020-02-22 02:54:48
119.97.221.82 attackspambots
Unauthorised access (Feb 21) SRC=119.97.221.82 LEN=40 TTL=241 ID=65142 TCP DPT=1433 WINDOW=1024 SYN
2020-02-22 02:52:04

Recently Reported IPs

217.15.155.152 181.213.8.157 198.132.153.109 168.156.227.118
249.7.49.207 13.245.49.151 169.214.129.2 234.96.178.199
0.242.222.163 150.173.51.221 232.37.12.129 254.200.74.32
115.192.7.146 210.206.179.165 136.103.51.75 131.24.184.11
105.149.82.169 249.96.175.29 108.46.208.213 101.227.101.73