Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.68.80.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29356
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.68.80.194.			IN	A

;; AUTHORITY SECTION:
.			383	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 19:37:06 CST 2022
;; MSG SIZE  rcvd: 106
Host info
194.80.68.116.in-addr.arpa domain name pointer 194.80.68.116.asianet.co.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.80.68.116.in-addr.arpa	name = 194.80.68.116.asianet.co.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
144.172.73.38 attackspam
Jun 17 21:40:23 mail sshd[10922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.172.73.38
Jun 17 21:40:25 mail sshd[10922]: Failed password for invalid user honey from 144.172.73.38 port 53246 ssh2
...
2020-06-18 03:44:04
1.214.215.236 attackspam
SSH Brute-Force reported by Fail2Ban
2020-06-18 03:37:24
201.46.29.184 attack
Invalid user takahashi from 201.46.29.184 port 48765
2020-06-18 03:39:57
196.189.91.166 attack
Invalid user owncloud from 196.189.91.166 port 40850
2020-06-18 03:40:53
185.251.44.193 attackspam
2020-06-17T14:35:47.931597morrigan.ad5gb.com sshd[367098]: Invalid user liuxin from 185.251.44.193 port 36196
2020-06-17T14:35:49.604568morrigan.ad5gb.com sshd[367098]: Failed password for invalid user liuxin from 185.251.44.193 port 36196 ssh2
2020-06-17T14:35:50.485983morrigan.ad5gb.com sshd[367098]: Disconnected from invalid user liuxin 185.251.44.193 port 36196 [preauth]
2020-06-18 03:56:50
155.94.158.21 attackbots
2020-06-17T21:08:50.645833mail.broermann.family sshd[8085]: Failed password for invalid user sekine from 155.94.158.21 port 34428 ssh2
2020-06-17T21:10:38.076465mail.broermann.family sshd[8276]: Invalid user hl from 155.94.158.21 port 41042
2020-06-17T21:10:38.081466mail.broermann.family sshd[8276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=155.94.158.21
2020-06-17T21:10:38.076465mail.broermann.family sshd[8276]: Invalid user hl from 155.94.158.21 port 41042
2020-06-17T21:10:40.257254mail.broermann.family sshd[8276]: Failed password for invalid user hl from 155.94.158.21 port 41042 ssh2
...
2020-06-18 03:59:18
119.73.179.114 attackspam
2020-06-17T16:46:37.372318abusebot.cloudsearch.cf sshd[7799]: Invalid user gnuhealth from 119.73.179.114 port 1187
2020-06-17T16:46:37.378162abusebot.cloudsearch.cf sshd[7799]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.73.179.114
2020-06-17T16:46:37.372318abusebot.cloudsearch.cf sshd[7799]: Invalid user gnuhealth from 119.73.179.114 port 1187
2020-06-17T16:46:39.632170abusebot.cloudsearch.cf sshd[7799]: Failed password for invalid user gnuhealth from 119.73.179.114 port 1187 ssh2
2020-06-17T16:52:05.894472abusebot.cloudsearch.cf sshd[8203]: Invalid user hadoop from 119.73.179.114 port 23562
2020-06-17T16:52:05.900501abusebot.cloudsearch.cf sshd[8203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.73.179.114
2020-06-17T16:52:05.894472abusebot.cloudsearch.cf sshd[8203]: Invalid user hadoop from 119.73.179.114 port 23562
2020-06-17T16:52:07.848479abusebot.cloudsearch.cf sshd[8203]: Failed passw
...
2020-06-18 03:46:04
106.12.28.157 attackspambots
Invalid user josue from 106.12.28.157 port 43020
2020-06-18 04:05:10
18.217.38.247 attack
Invalid user lb from 18.217.38.247 port 54760
2020-06-18 04:11:34
123.207.52.61 attack
Invalid user gas from 123.207.52.61 port 52286
2020-06-18 04:01:14
189.240.62.227 attackspambots
Invalid user test9 from 189.240.62.227 port 58820
2020-06-18 04:17:03
46.10.221.94 attack
Invalid user adam from 46.10.221.94 port 42231
2020-06-18 03:51:37
197.62.175.196 attackspam
Invalid user user2 from 197.62.175.196 port 57819
2020-06-18 03:56:08
58.210.154.140 attackbotsspam
Failed password for invalid user m1 from 58.210.154.140 port 48894 ssh2
2020-06-18 03:50:04
123.30.157.239 attackbotsspam
Invalid user nagios from 123.30.157.239 port 32816
2020-06-18 03:45:34

Recently Reported IPs

116.68.254.241 116.68.254.94 116.68.255.225 116.68.76.50
116.68.80.188 114.107.148.196 116.68.76.98 116.68.80.209
116.68.80.93 116.68.80.212 116.68.96.7 116.68.97.159
116.68.97.190 116.68.80.217 116.68.80.242 250.120.59.93
116.68.98.85 116.68.80.203 116.68.96.40 116.68.99.145