Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.68.104.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34788
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.68.104.194.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 06:16:34 CST 2022
;; MSG SIZE  rcvd: 107
Host info
194.104.68.116.in-addr.arpa domain name pointer 194.104.68.116.asianet.co.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.104.68.116.in-addr.arpa	name = 194.104.68.116.asianet.co.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.107.154.40 attack
Repeated brute force against a port
2019-08-25 01:13:18
114.34.39.123 attack
Multiple SSH auth failures recorded by fail2ban
2019-08-25 01:59:11
49.88.112.55 attackbotsspam
2019-08-24T17:44:54.4929341240 sshd\[28690\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.55  user=root
2019-08-24T17:44:56.5912881240 sshd\[28690\]: Failed password for root from 49.88.112.55 port 28090 ssh2
2019-08-24T17:44:59.2731481240 sshd\[28690\]: Failed password for root from 49.88.112.55 port 28090 ssh2
...
2019-08-25 01:02:58
190.24.116.15 attack
*Port Scan* detected from 190.24.116.15 (CO/Colombia/static-190-24-116-15.static.etb.net.co). 4 hits in the last 175 seconds
2019-08-25 01:21:56
178.62.194.63 attackbots
Aug 24 16:32:01 debian sshd\[22744\]: Invalid user belea from 178.62.194.63 port 52368
Aug 24 16:32:01 debian sshd\[22744\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.194.63
...
2019-08-25 01:55:08
170.150.155.2 attack
*Port Scan* detected from 170.150.155.2 (AR/Argentina/static.2.155.150.170.cps.com.ar). 4 hits in the last 295 seconds
2019-08-25 01:26:59
182.76.180.34 attackspambots
*Port Scan* detected from 182.76.180.34 (IN/India/nsg-static-34.180.76.182-airtel.com). 4 hits in the last 25 seconds
2019-08-25 01:25:17
106.13.48.157 attackbots
2019-08-24T18:32:20.826342  sshd[2297]: Invalid user elisabetta from 106.13.48.157 port 48754
2019-08-24T18:32:20.840580  sshd[2297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.157
2019-08-24T18:32:20.826342  sshd[2297]: Invalid user elisabetta from 106.13.48.157 port 48754
2019-08-24T18:32:22.978895  sshd[2297]: Failed password for invalid user elisabetta from 106.13.48.157 port 48754 ssh2
2019-08-24T18:58:39.961232  sshd[2634]: Invalid user cathyreis from 106.13.48.157 port 37732
...
2019-08-25 01:48:23
118.25.237.124 attackspambots
Aug 24 16:29:43 OPSO sshd\[3105\]: Invalid user testlab from 118.25.237.124 port 45158
Aug 24 16:29:43 OPSO sshd\[3105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.237.124
Aug 24 16:29:45 OPSO sshd\[3105\]: Failed password for invalid user testlab from 118.25.237.124 port 45158 ssh2
Aug 24 16:32:17 OPSO sshd\[3508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.237.124  user=root
Aug 24 16:32:18 OPSO sshd\[3508\]: Failed password for root from 118.25.237.124 port 35438 ssh2
2019-08-25 01:33:53
216.211.245.95 attackspam
Aug 24 19:54:08 ncomp sshd[17473]: Invalid user thomas from 216.211.245.95
Aug 24 19:54:08 ncomp sshd[17473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.211.245.95
Aug 24 19:54:08 ncomp sshd[17473]: Invalid user thomas from 216.211.245.95
Aug 24 19:54:09 ncomp sshd[17473]: Failed password for invalid user thomas from 216.211.245.95 port 54068 ssh2
2019-08-25 01:57:03
80.211.133.238 attackbots
$f2bV_matches
2019-08-25 01:32:01
37.139.2.218 attackspam
Aug 24 20:34:08 yabzik sshd[27509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.2.218
Aug 24 20:34:10 yabzik sshd[27509]: Failed password for invalid user guest from 37.139.2.218 port 36674 ssh2
Aug 24 20:38:53 yabzik sshd[29272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.139.2.218
2019-08-25 01:50:38
40.73.78.233 attackbotsspam
Aug 24 06:31:02 web9 sshd\[16429\]: Invalid user mi from 40.73.78.233
Aug 24 06:31:02 web9 sshd\[16429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.78.233
Aug 24 06:31:04 web9 sshd\[16429\]: Failed password for invalid user mi from 40.73.78.233 port 2560 ssh2
Aug 24 06:35:18 web9 sshd\[17167\]: Invalid user test01 from 40.73.78.233
Aug 24 06:35:18 web9 sshd\[17167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.78.233
2019-08-25 01:08:36
178.128.42.36 attack
Invalid user bong from 178.128.42.36 port 34848
2019-08-25 01:42:56
119.187.140.11 attackspam
Unauthorised access (Aug 24) SRC=119.187.140.11 LEN=40 TTL=49 ID=45300 TCP DPT=8080 WINDOW=12995 SYN 
Unauthorised access (Aug 24) SRC=119.187.140.11 LEN=40 TTL=49 ID=39056 TCP DPT=8080 WINDOW=60910 SYN
2019-08-25 01:04:01

Recently Reported IPs

116.68.105.22 116.68.110.12 116.68.110.160 116.68.110.27
116.68.110.130 116.68.111.164 116.68.111.38 116.68.96.109
116.68.96.193 116.68.96.252 116.68.96.31 116.68.97.114
116.68.98.180 116.68.97.21 116.68.98.190 116.68.98.83
116.68.98.38 116.7.11.63 116.7.213.44 116.7.214.55