Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.54.120.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6306
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.54.120.68.			IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 21:28:44 CST 2022
;; MSG SIZE  rcvd: 106
Host info
68.120.54.117.in-addr.arpa domain name pointer rev-117-54-120-68.indo.net.id.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.120.54.117.in-addr.arpa	name = rev-117-54-120-68.indo.net.id.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.5.240 attackbotsspam
Nov  1 05:59:09 v22019058497090703 sshd[32657]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.5.240
Nov  1 05:59:11 v22019058497090703 sshd[32657]: Failed password for invalid user QAZ1231xsw from 106.13.5.240 port 42062 ssh2
Nov  1 06:04:06 v22019058497090703 sshd[512]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.5.240
...
2019-11-01 13:28:09
80.88.90.86 attackspam
Nov  1 04:55:57 [munged] sshd[4928]: Failed password for root from 80.88.90.86 port 33762 ssh2
2019-11-01 13:05:07
51.254.222.6 attack
Nov  1 06:00:29 dedicated sshd[4131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.222.6  user=root
Nov  1 06:00:31 dedicated sshd[4131]: Failed password for root from 51.254.222.6 port 58402 ssh2
2019-11-01 13:18:33
173.241.21.82 attack
2019-11-01T05:30:40.469010abusebot-2.cloudsearch.cf sshd\[7201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.241.21.82  user=root
2019-11-01 13:54:33
58.210.219.5 attackspam
Helo
2019-11-01 13:52:38
159.65.30.66 attack
Nov  1 06:13:44 lnxded63 sshd[11910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.30.66
2019-11-01 13:54:55
167.71.223.191 attackbots
$f2bV_matches
2019-11-01 13:06:30
167.71.55.1 attackspambots
Oct 31 14:44:15 server sshd\[8664\]: Failed password for invalid user rator from 167.71.55.1 port 59010 ssh2
Nov  1 06:51:55 server sshd\[30845\]: Invalid user postgres from 167.71.55.1
Nov  1 06:51:55 server sshd\[30845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.55.1 
Nov  1 06:51:58 server sshd\[30845\]: Failed password for invalid user postgres from 167.71.55.1 port 32990 ssh2
Nov  1 06:55:46 server sshd\[31735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.55.1  user=root
...
2019-11-01 13:13:46
159.205.82.134 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/159.205.82.134/ 
 
 AU - 1H : (46)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AU 
 NAME ASN : ASN12741 
 
 IP : 159.205.82.134 
 
 CIDR : 159.205.0.0/16 
 
 PREFIX COUNT : 95 
 
 UNIQUE IP COUNT : 1590528 
 
 
 ATTACKS DETECTED ASN12741 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 4 
 24H - 5 
 
 DateTime : 2019-11-01 04:55:33 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-01 13:21:04
139.198.15.74 attackspambots
Nov  1 06:37:18 meumeu sshd[18131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.15.74 
Nov  1 06:37:20 meumeu sshd[18131]: Failed password for invalid user student8 from 139.198.15.74 port 37362 ssh2
Nov  1 06:41:21 meumeu sshd[18746]: Failed password for root from 139.198.15.74 port 45252 ssh2
...
2019-11-01 13:44:01
62.2.148.66 attackbots
Nov  1 06:03:30 legacy sshd[9458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.2.148.66
Nov  1 06:03:32 legacy sshd[9458]: Failed password for invalid user aleksandir from 62.2.148.66 port 57529 ssh2
Nov  1 06:07:51 legacy sshd[9585]: Failed password for root from 62.2.148.66 port 50285 ssh2
...
2019-11-01 13:22:35
165.22.114.237 attackbots
Nov  1 05:47:45 ArkNodeAT sshd\[3361\]: Invalid user stephanie from 165.22.114.237
Nov  1 05:47:45 ArkNodeAT sshd\[3361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.114.237
Nov  1 05:47:47 ArkNodeAT sshd\[3361\]: Failed password for invalid user stephanie from 165.22.114.237 port 47142 ssh2
2019-11-01 13:27:02
140.210.9.80 attackspambots
Nov  1 00:55:55 ny01 sshd[22174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.9.80
Nov  1 00:55:57 ny01 sshd[22174]: Failed password for invalid user ly13198176 from 140.210.9.80 port 51356 ssh2
Nov  1 01:01:20 ny01 sshd[22890]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.9.80
2019-11-01 13:43:39
49.69.244.61 attackspam
2222/tcp 22/tcp...
[2019-09-12/11-01]23pkt,2pt.(tcp)
2019-11-01 13:12:13
221.162.255.86 attack
2019-11-01T04:49:50.867471abusebot-2.cloudsearch.cf sshd\[7033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.162.255.86  user=root
2019-11-01 13:03:50

Recently Reported IPs

117.54.112.22 117.54.124.102 117.54.124.100 114.226.135.94
117.54.13.52 117.54.120.10 117.54.13.181 117.54.13.184
117.54.13.54 117.54.131.54 117.54.132.18 117.54.131.90
117.54.138.118 117.54.134.130 114.226.135.97 117.54.138.131
117.54.138.141 117.54.131.50 117.54.138.134 117.54.138.36