Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.68.104.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.68.104.67.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:37:10 CST 2022
;; MSG SIZE  rcvd: 106
Host info
67.104.68.116.in-addr.arpa domain name pointer 67.104.68.116.asianet.co.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
67.104.68.116.in-addr.arpa	name = 67.104.68.116.asianet.co.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.64.57.24 attackspam
2019-12-16T14:04:04.713077vps751288.ovh.net sshd\[24850\]: Invalid user whiteaker from 212.64.57.24 port 59864
2019-12-16T14:04:04.720219vps751288.ovh.net sshd\[24850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.24
2019-12-16T14:04:07.243216vps751288.ovh.net sshd\[24850\]: Failed password for invalid user whiteaker from 212.64.57.24 port 59864 ssh2
2019-12-16T14:11:37.340422vps751288.ovh.net sshd\[24964\]: Invalid user 123456 from 212.64.57.24 port 59025
2019-12-16T14:11:37.349165vps751288.ovh.net sshd\[24964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.57.24
2019-12-16 22:14:38
195.78.63.197 attackbots
$f2bV_matches
2019-12-16 22:17:47
104.236.214.8 attack
Dec 16 15:09:27 legacy sshd[32504]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.214.8
Dec 16 15:09:29 legacy sshd[32504]: Failed password for invalid user yourmom from 104.236.214.8 port 39315 ssh2
Dec 16 15:18:22 legacy sshd[526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.214.8
...
2019-12-16 22:24:27
36.63.86.7 attackspambots
Scanning
2019-12-16 22:25:31
117.34.72.226 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-16 21:50:07
106.13.216.134 attackspambots
Dec 16 12:55:40 ns37 sshd[10677]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.216.134
2019-12-16 22:03:36
49.236.203.163 attackspam
$f2bV_matches
2019-12-16 22:16:07
193.70.36.161 attackspambots
Dec 16 13:43:50 srv01 sshd[13199]: Invalid user admin from 193.70.36.161 port 44150
Dec 16 13:43:50 srv01 sshd[13199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.36.161
Dec 16 13:43:50 srv01 sshd[13199]: Invalid user admin from 193.70.36.161 port 44150
Dec 16 13:43:52 srv01 sshd[13199]: Failed password for invalid user admin from 193.70.36.161 port 44150 ssh2
Dec 16 13:51:03 srv01 sshd[13733]: Invalid user nfs from 193.70.36.161 port 47872
...
2019-12-16 22:27:10
80.97.66.135 attackbots
Automatic report - Banned IP Access
2019-12-16 21:51:14
90.163.75.138 attack
WordPress XMLRPC scan :: 90.163.75.138 0.116 - [16/Dec/2019:06:22:39  0000] www.[censored_1] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" "HTTP/1.1"
2019-12-16 22:23:25
147.135.208.234 attackbots
Dec 16 03:51:00 web1 sshd\[20854\]: Invalid user test from 147.135.208.234
Dec 16 03:51:00 web1 sshd\[20854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.208.234
Dec 16 03:51:02 web1 sshd\[20854\]: Failed password for invalid user test from 147.135.208.234 port 46686 ssh2
Dec 16 04:00:17 web1 sshd\[21850\]: Invalid user carole from 147.135.208.234
Dec 16 04:00:17 web1 sshd\[21850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.208.234
2019-12-16 22:26:14
77.20.107.79 attack
Dec 16 14:19:57 tux-35-217 sshd\[7930\]: Invalid user etchell from 77.20.107.79 port 38740
Dec 16 14:19:57 tux-35-217 sshd\[7930\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.20.107.79
Dec 16 14:19:58 tux-35-217 sshd\[7930\]: Failed password for invalid user etchell from 77.20.107.79 port 38740 ssh2
Dec 16 14:26:38 tux-35-217 sshd\[7986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.20.107.79  user=mail
...
2019-12-16 21:50:44
104.131.84.59 attackbots
Dec 16 15:49:41 server sshd\[8002\]: Invalid user lavey from 104.131.84.59
Dec 16 15:49:41 server sshd\[8002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.84.59 
Dec 16 15:49:42 server sshd\[8002\]: Failed password for invalid user lavey from 104.131.84.59 port 55836 ssh2
Dec 16 15:56:24 server sshd\[10230\]: Invalid user curavo from 104.131.84.59
Dec 16 15:56:24 server sshd\[10230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.84.59 
...
2019-12-16 22:00:07
62.210.205.155 attackbotsspam
Dec 16 14:57:56 vps58358 sshd\[3450\]: Invalid user swistak from 62.210.205.155Dec 16 14:57:58 vps58358 sshd\[3450\]: Failed password for invalid user swistak from 62.210.205.155 port 52286 ssh2Dec 16 15:02:52 vps58358 sshd\[3499\]: Invalid user alinus from 62.210.205.155Dec 16 15:02:53 vps58358 sshd\[3499\]: Failed password for invalid user alinus from 62.210.205.155 port 55331 ssh2Dec 16 15:07:39 vps58358 sshd\[3557\]: Invalid user ident from 62.210.205.155Dec 16 15:07:41 vps58358 sshd\[3557\]: Failed password for invalid user ident from 62.210.205.155 port 58377 ssh2
...
2019-12-16 22:10:06
37.59.188.75 attack
Dec 15 23:35:27 uapps sshd[19404]: Address 37.59.188.75 maps to 37.59.188.75.venixhost24.de, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec 15 23:35:29 uapps sshd[19404]: Failed password for invalid user herris from 37.59.188.75 port 34070 ssh2
Dec 15 23:35:29 uapps sshd[19404]: Received disconnect from 37.59.188.75: 11: Bye Bye [preauth]
Dec 15 23:55:32 uapps sshd[19631]: Address 37.59.188.75 maps to 37.59.188.75.venixhost24.de, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec 15 23:55:33 uapps sshd[19631]: Failed password for invalid user lessie from 37.59.188.75 port 60232 ssh2
Dec 15 23:55:33 uapps sshd[19631]: Received disconnect from 37.59.188.75: 11: Bye Bye [preauth]
Dec 16 00:04:25 uapps sshd[19842]: Address 37.59.188.75 maps to 37.59.188.75.venixhost24.de, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Dec 16 00:04:25 uapps sshd[19842]: User r.r from 37.59.188.75 not allowed because ........
-------------------------------
2019-12-16 22:22:18

Recently Reported IPs

220.250.63.72 78.109.53.114 103.41.32.212 191.36.146.173
5.181.171.232 119.49.130.142 45.5.152.232 187.177.165.39
187.162.71.10 1.80.137.253 151.238.127.233 115.58.139.98
184.82.195.144 103.31.83.2 47.103.112.43 111.38.136.211
202.124.224.10 114.34.124.173 83.248.56.78 182.116.31.166