Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.108.14.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.108.14.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 01:54:35 CST 2025
;; MSG SIZE  rcvd: 106
Host info
68.14.108.120.in-addr.arpa domain name pointer host68.ip14.ncut.edu.tw.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.14.108.120.in-addr.arpa	name = host68.ip14.ncut.edu.tw.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.75.26.51 attackbots
Aug 14 12:12:19 OPSO sshd\[18023\]: Invalid user forevermd from 51.75.26.51 port 43464
Aug 14 12:12:19 OPSO sshd\[18023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.26.51
Aug 14 12:12:21 OPSO sshd\[18023\]: Failed password for invalid user forevermd from 51.75.26.51 port 43464 ssh2
Aug 14 12:16:58 OPSO sshd\[18680\]: Invalid user omair from 51.75.26.51 port 35208
Aug 14 12:16:58 OPSO sshd\[18680\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.26.51
2019-08-14 18:17:52
80.82.77.193 attackspambots
[portscan] udp/137 [netbios NS]
*(RWIN=-)(08141159)
2019-08-14 17:35:25
162.213.37.188 attack
Aug 14 08:30:06 vps691689 sshd[15296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.213.37.188
Aug 14 08:30:09 vps691689 sshd[15296]: Failed password for invalid user web2 from 162.213.37.188 port 42678 ssh2
Aug 14 08:35:36 vps691689 sshd[15409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.213.37.188
...
2019-08-14 18:26:23
168.156.237.20 attack
Aug 13 03:14:23 rb06 sshd[10929]: Failed password for invalid user peer from 168.156.237.20 port 6774 ssh2
Aug 13 03:14:23 rb06 sshd[10929]: Received disconnect from 168.156.237.20: 11: Bye Bye [preauth]
Aug 13 03:29:32 rb06 sshd[17076]: Failed password for invalid user minecraftserver from 168.156.237.20 port 4802 ssh2
Aug 13 03:29:32 rb06 sshd[17076]: Received disconnect from 168.156.237.20: 11: Bye Bye [preauth]
Aug 13 03:33:14 rb06 sshd[17025]: Failed password for invalid user lrioland from 168.156.237.20 port 7000 ssh2
Aug 13 03:33:14 rb06 sshd[17025]: Received disconnect from 168.156.237.20: 11: Bye Bye [preauth]
Aug 13 03:36:56 rb06 sshd[16127]: Failed password for invalid user wade from 168.156.237.20 port 3388 ssh2
Aug 13 03:36:57 rb06 sshd[16127]: Received disconnect from 168.156.237.20: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=168.156.237.20
2019-08-14 18:20:18
66.7.148.40 attack
Aug 14 09:29:25  postfix/smtpd: warning: unknown[66.7.148.40]: SASL LOGIN authentication failed
2019-08-14 17:56:51
193.32.161.48 attack
Multiport scan : 12 ports scanned 9523 9524 9525 10891 10892 10893 34402 34403 34404 45790 45791 45792
2019-08-14 18:13:20
167.114.3.44 attack
[portscan] Port scan
2019-08-14 18:00:59
192.3.1.131 attackspam
23/tcp
[2019-08-14]1pkt
2019-08-14 17:47:47
112.85.42.89 attack
Aug 14 05:36:45 123flo sshd[60594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Aug 14 05:36:47 123flo sshd[60594]: Failed password for root from 112.85.42.89 port 31535 ssh2
2019-08-14 18:29:23
81.28.107.217 attack
Lines containing failures of 81.28.107.217
Aug 14 04:45:12 server01 postfix/smtpd[3713]: connect from quick.debramand.com[81.28.107.217]
Aug x@x
Aug x@x
Aug x@x
Aug x@x
Aug 14 04:45:14 server01 postfix/smtpd[3713]: disconnect from quick.debramand.com[81.28.107.217]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=81.28.107.217
2019-08-14 17:52:38
52.231.33.96 attackbotsspam
Aug 14 08:46:11 localhost sshd\[5810\]: Invalid user john from 52.231.33.96 port 37500
Aug 14 08:46:11 localhost sshd\[5810\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.33.96
Aug 14 08:46:13 localhost sshd\[5810\]: Failed password for invalid user john from 52.231.33.96 port 37500 ssh2
2019-08-14 17:57:08
153.36.242.143 attackspambots
Aug 14 15:35:24 areeb-Workstation sshd\[7129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Aug 14 15:35:26 areeb-Workstation sshd\[7129\]: Failed password for root from 153.36.242.143 port 29740 ssh2
Aug 14 15:35:28 areeb-Workstation sshd\[7129\]: Failed password for root from 153.36.242.143 port 29740 ssh2
...
2019-08-14 18:07:07
193.112.55.60 attackbotsspam
Aug 14 12:57:14 lcl-usvr-01 sshd[27291]: Invalid user den from 193.112.55.60
Aug 14 12:57:14 lcl-usvr-01 sshd[27291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.55.60 
Aug 14 12:57:14 lcl-usvr-01 sshd[27291]: Invalid user den from 193.112.55.60
Aug 14 12:57:17 lcl-usvr-01 sshd[27291]: Failed password for invalid user den from 193.112.55.60 port 60746 ssh2
Aug 14 13:03:22 lcl-usvr-01 sshd[29206]: Invalid user viktor from 193.112.55.60
2019-08-14 17:34:54
54.36.108.162 attack
2019-08-14T10:12:11.498064abusebot.cloudsearch.cf sshd\[16351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3112521.ip-54-36-108.eu  user=root
2019-08-14 18:39:38
82.142.121.4 attack
Aug 14 08:43:36 plex sshd[26818]: Invalid user seb from 82.142.121.4 port 25222
2019-08-14 18:41:49

Recently Reported IPs

142.113.64.54 136.50.159.132 38.195.232.246 199.130.47.66
250.5.164.53 182.14.95.249 170.5.236.32 198.129.183.111
240.252.240.6 177.167.248.213 127.231.7.209 96.239.104.246
58.38.138.51 61.9.165.40 235.59.249.165 35.17.17.36
35.34.196.29 24.234.54.47 167.69.31.222 189.135.199.167