Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.8.68.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50825
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.8.68.114.			IN	A

;; AUTHORITY SECTION:
.			492	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:17:01 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 114.68.8.116.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 114.68.8.116.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
94.32.66.15 attackbotsspam
IDS admin
2020-09-01 15:58:01
91.134.173.100 attack
Sep  1 08:44:58 kh-dev-server sshd[12280]: Failed password for root from 91.134.173.100 port 44556 ssh2
...
2020-09-01 15:35:04
190.96.21.112 attackbots
Port Scan
...
2020-09-01 15:36:29
51.91.157.101 attack
"$f2bV_matches"
2020-09-01 15:38:11
196.52.43.112 attackbotsspam
Unauthorized connection attempt detected from IP address 196.52.43.112 to port 143 [T]
2020-09-01 15:33:18
103.117.237.226 attackbotsspam
20/8/31@23:51:34: FAIL: Alarm-Network address from=103.117.237.226
...
2020-09-01 15:54:22
139.199.4.219 attack
Sep  1 10:08:06 server sshd[24765]: User root from 139.199.4.219 not allowed because listed in DenyUsers
Sep  1 10:08:06 server sshd[24765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.4.219  user=root
Sep  1 10:08:06 server sshd[24765]: User root from 139.199.4.219 not allowed because listed in DenyUsers
Sep  1 10:08:07 server sshd[24765]: Failed password for invalid user root from 139.199.4.219 port 43778 ssh2
Sep  1 10:09:32 server sshd[21253]: Invalid user hfh from 139.199.4.219 port 39306
...
2020-09-01 15:53:50
150.95.138.39 attackbots
Invalid user benjamin from 150.95.138.39 port 36824
Failed password for invalid user benjamin from 150.95.138.39 port 36824 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=v150-95-138-39.a083.g.tyo1.static.cnode.io  user=root
Failed password for root from 150.95.138.39 port 51054 ssh2
Invalid user web from 150.95.138.39 port 37062
2020-09-01 16:09:29
188.131.138.175 attack
Aug 31 20:30:35 web1 sshd\[30572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.138.175  user=root
Aug 31 20:30:37 web1 sshd\[30572\]: Failed password for root from 188.131.138.175 port 46864 ssh2
Aug 31 20:35:59 web1 sshd\[30948\]: Invalid user rona from 188.131.138.175
Aug 31 20:35:59 web1 sshd\[30948\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.138.175
Aug 31 20:36:01 web1 sshd\[30948\]: Failed password for invalid user rona from 188.131.138.175 port 48336 ssh2
2020-09-01 15:37:20
13.71.21.123 attackbotsspam
Sep  1 06:10:48 instance-2 sshd[18773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.21.123 
Sep  1 06:10:50 instance-2 sshd[18773]: Failed password for invalid user terry from 13.71.21.123 port 1024 ssh2
Sep  1 06:15:25 instance-2 sshd[18865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.71.21.123
2020-09-01 15:38:35
142.44.242.38 attackspambots
2020-09-01T04:03:06.879720shield sshd\[2027\]: Invalid user gramm from 142.44.242.38 port 35936
2020-09-01T04:03:06.889301shield sshd\[2027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.ip-142-44-242.net
2020-09-01T04:03:09.121228shield sshd\[2027\]: Failed password for invalid user gramm from 142.44.242.38 port 35936 ssh2
2020-09-01T04:06:50.074133shield sshd\[3301\]: Invalid user ivan from 142.44.242.38 port 42338
2020-09-01T04:06:50.082897shield sshd\[3301\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=38.ip-142-44-242.net
2020-09-01 15:32:57
208.109.54.139 attackbotsspam
208.109.54.139 - - [01/Sep/2020:06:07:07 +0100] "POST /wp-login.php HTTP/1.1" 200 2046 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
208.109.54.139 - - [01/Sep/2020:06:07:09 +0100] "POST /wp-login.php HTTP/1.1" 200 2040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
208.109.54.139 - - [01/Sep/2020:06:07:12 +0100] "POST /wp-login.php HTTP/1.1" 200 2037 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-01 16:12:11
104.131.12.184 attackspambots
Sep  1 09:18:58 server sshd[10645]: Invalid user nfe from 104.131.12.184 port 43420
...
2020-09-01 15:48:00
46.38.235.173 attack
Sep  1 09:39:53 v22019038103785759 sshd\[15333\]: Invalid user boat from 46.38.235.173 port 52314
Sep  1 09:39:53 v22019038103785759 sshd\[15333\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.38.235.173
Sep  1 09:39:56 v22019038103785759 sshd\[15333\]: Failed password for invalid user boat from 46.38.235.173 port 52314 ssh2
Sep  1 09:46:21 v22019038103785759 sshd\[15944\]: Invalid user aly from 46.38.235.173 port 60160
Sep  1 09:46:21 v22019038103785759 sshd\[15944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.38.235.173
...
2020-09-01 16:09:03
62.215.6.11 attack
2020-09-01T09:46:38.957338vps773228.ovh.net sshd[5378]: Invalid user ha from 62.215.6.11 port 41580
2020-09-01T09:46:38.971071vps773228.ovh.net sshd[5378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=out02-tec.fasttelco.net
2020-09-01T09:46:38.957338vps773228.ovh.net sshd[5378]: Invalid user ha from 62.215.6.11 port 41580
2020-09-01T09:46:41.101901vps773228.ovh.net sshd[5378]: Failed password for invalid user ha from 62.215.6.11 port 41580 ssh2
2020-09-01T09:50:53.915366vps773228.ovh.net sshd[5434]: Invalid user informix from 62.215.6.11 port 43551
...
2020-09-01 16:14:41

Recently Reported IPs

210.89.62.65 171.247.71.47 112.91.185.162 223.184.9.96
189.126.51.28 186.33.93.196 187.109.114.232 171.36.6.164
58.44.248.24 142.247.126.237 18.230.134.211 201.150.186.91
124.121.157.53 47.254.239.73 154.201.38.220 45.236.213.118
178.159.37.95 208.168.252.78 123.129.65.236 199.195.254.155