Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.8.68.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59445
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.8.68.45.			IN	A

;; AUTHORITY SECTION:
.			496	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:17:01 CST 2022
;; MSG SIZE  rcvd: 104
Host info
b'Host 45.68.8.116.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 45.68.8.116.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
193.112.241.141 attackbots
Oct 19 09:17:37 vps01 sshd[23137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.241.141
Oct 19 09:17:39 vps01 sshd[23137]: Failed password for invalid user klaus from 193.112.241.141 port 40510 ssh2
2019-10-19 16:45:24
178.149.114.79 attackspam
Oct 19 02:45:31 Tower sshd[9410]: Connection from 178.149.114.79 port 50524 on 192.168.10.220 port 22
Oct 19 02:45:31 Tower sshd[9410]: Failed password for root from 178.149.114.79 port 50524 ssh2
Oct 19 02:45:32 Tower sshd[9410]: Received disconnect from 178.149.114.79 port 50524:11: Bye Bye [preauth]
Oct 19 02:45:32 Tower sshd[9410]: Disconnected from authenticating user root 178.149.114.79 port 50524 [preauth]
2019-10-19 16:55:05
190.102.251.54 attackspambots
WordPress XMLRPC scan :: 190.102.251.54 0.124 BYPASS [19/Oct/2019:14:50:13  1100] [censored_1] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
2019-10-19 16:59:15
159.203.201.142 attackspambots
firewall-block, port(s): 7443/tcp
2019-10-19 17:01:14
103.210.133.20 attackbots
2019-10-19T03:50:03.061945abusebot.cloudsearch.cf sshd\[2370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.210.133.20  user=root
2019-10-19 17:06:41
182.61.37.144 attackbotsspam
Oct 19 07:09:50 www sshd\[207635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.144  user=root
Oct 19 07:09:52 www sshd\[207635\]: Failed password for root from 182.61.37.144 port 58974 ssh2
Oct 19 07:14:51 www sshd\[207714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.37.144  user=root
...
2019-10-19 16:34:05
185.255.131.78 attackbotsspam
SSH invalid-user multiple login try
2019-10-19 16:59:48
123.27.168.159 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 19-10-2019 04:50:18.
2019-10-19 16:55:50
90.150.199.140 attackspambots
firewall-block, port(s): 23/tcp
2019-10-19 17:04:37
83.246.93.211 attack
2019-10-19T04:36:46.035434shield sshd\[27958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=db1.fos2.thuecom-medien.de  user=root
2019-10-19T04:36:48.477084shield sshd\[27958\]: Failed password for root from 83.246.93.211 port 33277 ssh2
2019-10-19T04:40:46.646732shield sshd\[28698\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=db1.fos2.thuecom-medien.de  user=root
2019-10-19T04:40:48.697182shield sshd\[28698\]: Failed password for root from 83.246.93.211 port 52971 ssh2
2019-10-19T04:44:42.064898shield sshd\[29516\]: Invalid user bot from 83.246.93.211 port 44441
2019-10-19 17:00:54
111.230.247.243 attackbots
2019-10-19T04:52:37.159178hub.schaetter.us sshd\[21928\]: Invalid user abcde12345\^\& from 111.230.247.243 port 36555
2019-10-19T04:52:37.167067hub.schaetter.us sshd\[21928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.243
2019-10-19T04:52:39.154229hub.schaetter.us sshd\[21928\]: Failed password for invalid user abcde12345\^\& from 111.230.247.243 port 36555 ssh2
2019-10-19T04:59:23.324534hub.schaetter.us sshd\[22030\]: Invalid user toku from 111.230.247.243 port 45694
2019-10-19T04:59:23.335121hub.schaetter.us sshd\[22030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.243
...
2019-10-19 16:47:37
151.80.155.98 attack
Invalid user jodie from 151.80.155.98 port 39522
2019-10-19 16:32:45
190.191.194.9 attack
SSH bruteforce (Triggered fail2ban)
2019-10-19 16:42:11
104.236.22.133 attack
Oct 19 10:39:45 MK-Soft-Root2 sshd[31276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.22.133 
Oct 19 10:39:46 MK-Soft-Root2 sshd[31276]: Failed password for invalid user kolenda from 104.236.22.133 port 46388 ssh2
...
2019-10-19 17:04:15
92.100.244.82 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 19-10-2019 04:50:20.
2019-10-19 16:50:37

Recently Reported IPs

189.91.97.76 172.70.250.187 194.50.12.85 113.161.81.186
43.154.205.129 111.18.45.227 218.67.208.49 72.216.67.236
45.83.67.1 167.99.120.28 189.14.55.36 62.84.72.146
177.104.26.222 49.149.109.77 221.145.119.246 190.202.80.214
117.141.246.134 5.32.176.127 110.232.143.53 209.141.39.147