Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bac Ninh

Region: Tinh Bac Ninh

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: Viettel Group

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.4.119.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41138
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;117.4.119.68.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 26 22:02:18 CST 2019
;; MSG SIZE  rcvd: 116

Host info
68.119.4.117.in-addr.arpa domain name pointer localhost.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
68.119.4.117.in-addr.arpa	name = localhost.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
185.116.156.90 attack
Invalid user sales1 from 185.116.156.90 port 39060
2020-01-22 00:21:14
112.30.100.66 attackbotsspam
Invalid user jiyuan from 112.30.100.66 port 59728
2020-01-22 00:47:50
118.98.121.194 attackspam
Unauthorized connection attempt detected from IP address 118.98.121.194 to port 2220 [J]
2020-01-22 00:42:22
140.143.61.200 attack
Invalid user guest from 140.143.61.200 port 52676
2020-01-22 00:32:34
138.197.113.240 attackbotsspam
Invalid user cip from 138.197.113.240 port 56122
2020-01-22 00:34:04
219.117.193.48 attackspambots
Unauthorized connection attempt detected from IP address 219.117.193.48 to port 22 [T]
2020-01-22 00:09:58
113.190.233.216 attackbotsspam
Invalid user admin from 113.190.233.216 port 48002
2020-01-22 00:45:37
116.97.234.250 attack
Invalid user admin from 116.97.234.250 port 58772
2020-01-22 00:43:45
203.159.249.215 attackbots
Jan 21 15:19:23 XXXXXX sshd[21829]: Invalid user trinity from 203.159.249.215 port 54070
2020-01-22 00:13:31
128.199.126.89 attack
Unauthorized connection attempt detected from IP address 128.199.126.89 to port 2220 [J]
2020-01-22 00:37:30
113.181.60.190 attackspam
Invalid user admin from 113.181.60.190 port 41110
2020-01-22 00:46:01
164.132.54.215 attack
Jan 21 06:07:42 eddieflores sshd\[7498\]: Invalid user angelica from 164.132.54.215
Jan 21 06:07:42 eddieflores sshd\[7498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=215.ip-164-132-54.eu
Jan 21 06:07:44 eddieflores sshd\[7498\]: Failed password for invalid user angelica from 164.132.54.215 port 42458 ssh2
Jan 21 06:11:04 eddieflores sshd\[7962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=215.ip-164-132-54.eu  user=root
Jan 21 06:11:06 eddieflores sshd\[7962\]: Failed password for root from 164.132.54.215 port 45052 ssh2
2020-01-22 00:27:12
178.124.161.75 attackspam
Jan 21 17:06:54 lnxmail61 sshd[18103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.124.161.75
2020-01-22 00:24:36
106.12.179.56 attackbotsspam
ssh brute force
2020-01-22 00:51:19
134.209.90.139 attack
Unauthorized connection attempt detected from IP address 134.209.90.139 to port 2220 [J]
2020-01-22 00:35:15

Recently Reported IPs

195.24.187.138 75.129.34.242 184.219.58.227 249.94.97.204
50.63.197.106 185.122.120.90 32.252.234.231 23.97.14.208
77.132.56.217 36.116.28.121 95.69.163.52 21.202.165.32
81.75.24.189 131.215.200.222 98.158.77.3 173.12.225.121
4.100.58.144 194.104.3.142 206.189.206.155 211.28.68.202