Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.130.68.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;120.130.68.214.			IN	A

;; AUTHORITY SECTION:
.			373	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022032300 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 23 16:57:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 214.68.130.120.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 214.68.130.120.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.70.41.33 attackbotsspam
Aug 14 08:08:51 MK-Soft-VM5 sshd\[16516\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.41.33  user=root
Aug 14 08:08:53 MK-Soft-VM5 sshd\[16516\]: Failed password for root from 148.70.41.33 port 46390 ssh2
Aug 14 08:15:20 MK-Soft-VM5 sshd\[16573\]: Invalid user canna from 148.70.41.33 port 37710
...
2019-08-14 18:04:51
185.254.122.200 attack
08/14/2019-03:41:05.398578 185.254.122.200 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-14 17:50:01
115.68.17.58 attackbots
*Port Scan* detected from 115.68.17.58 (KR/South Korea/giduzon.co.kr). 4 hits in the last 245 seconds
2019-08-14 17:55:48
111.230.249.77 attack
Aug 14 11:35:17 webhost01 sshd[31107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.249.77
Aug 14 11:35:19 webhost01 sshd[31107]: Failed password for invalid user servercsgo from 111.230.249.77 port 55698 ssh2
...
2019-08-14 18:05:37
106.13.32.70 attackspam
Aug 14 12:09:07 hosting sshd[32066]: Invalid user laura from 106.13.32.70 port 39346
Aug 14 12:09:07 hosting sshd[32066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.32.70
Aug 14 12:09:07 hosting sshd[32066]: Invalid user laura from 106.13.32.70 port 39346
Aug 14 12:09:09 hosting sshd[32066]: Failed password for invalid user laura from 106.13.32.70 port 39346 ssh2
Aug 14 12:18:33 hosting sshd[376]: Invalid user Bjarne from 106.13.32.70 port 47504
...
2019-08-14 17:30:14
185.127.27.222 attack
" "
2019-08-14 17:32:47
1.119.7.142 attackbotsspam
Aug 13 02:48:10 estefan sshd[18363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.119.7.142  user=r.r
Aug 13 02:48:12 estefan sshd[18363]: Failed password for r.r from 1.119.7.142 port 12368 ssh2
Aug 13 02:48:12 estefan sshd[18364]: Received disconnect from 1.119.7.142: 11: Bye Bye
Aug 13 03:12:26 estefan sshd[19093]: Invalid user cactiuser from 1.119.7.142
Aug 13 03:12:26 estefan sshd[19093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.119.7.142 
Aug 13 03:12:28 estefan sshd[19093]: Failed password for invalid user cactiuser from 1.119.7.142 port 13657 ssh2
Aug 13 03:12:28 estefan sshd[19094]: Received disconnect from 1.119.7.142: 11: Bye Bye
Aug 13 03:17:19 estefan sshd[19158]: Invalid user knox from 1.119.7.142
Aug 13 03:17:19 estefan sshd[19158]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.119.7.142 


........
-----------------------------------------------
https://www.
2019-08-14 17:44:28
167.114.3.44 attack
[portscan] Port scan
2019-08-14 18:00:59
49.88.112.65 attackbots
Aug 14 05:13:03 plusreed sshd[11986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
Aug 14 05:13:05 plusreed sshd[11986]: Failed password for root from 49.88.112.65 port 63317 ssh2
...
2019-08-14 17:22:36
42.2.181.143 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-14 17:08:43
185.156.232.10 attackbots
Aug 14 07:38:17 fr01 sshd[1232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.156.232.10  user=root
Aug 14 07:38:19 fr01 sshd[1232]: Failed password for root from 185.156.232.10 port 53826 ssh2
Aug 14 07:38:21 fr01 sshd[1232]: Failed password for root from 185.156.232.10 port 53826 ssh2
Aug 14 07:38:17 fr01 sshd[1232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.156.232.10  user=root
Aug 14 07:38:19 fr01 sshd[1232]: Failed password for root from 185.156.232.10 port 53826 ssh2
Aug 14 07:38:21 fr01 sshd[1232]: Failed password for root from 185.156.232.10 port 53826 ssh2
Aug 14 07:38:17 fr01 sshd[1232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.156.232.10  user=root
Aug 14 07:38:19 fr01 sshd[1232]: Failed password for root from 185.156.232.10 port 53826 ssh2
Aug 14 07:38:21 fr01 sshd[1232]: Failed password for root from 185.156.232.10 port 53826 ssh2
Aug 14 07:38:23 fr0
2019-08-14 17:36:25
106.12.85.76 attack
Automatic report - Banned IP Access
2019-08-14 17:05:12
88.98.192.83 attack
Aug 14 07:51:12 XXX sshd[48083]: Invalid user apples from 88.98.192.83 port 60948
2019-08-14 18:06:09
80.82.77.193 attackspambots
[portscan] udp/137 [netbios NS]
*(RWIN=-)(08141159)
2019-08-14 17:35:25
101.231.135.146 attackspambots
Aug 14 04:46:01 vps sshd[14172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.135.146 
Aug 14 04:46:02 vps sshd[14172]: Failed password for invalid user isabel from 101.231.135.146 port 55397 ssh2
Aug 14 04:55:09 vps sshd[14570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.231.135.146 
...
2019-08-14 17:48:54

Recently Reported IPs

52.157.123.121 102.126.74.42 30.150.207.175 232.252.182.171
201.101.147.23 154.57.120.129 120.231.140.132 54.220.94.1
114.157.56.160 195.191.184.243 30.25.120.188 13.200.176.177
244.14.243.68 229.204.154.150 67.104.198.27 186.122.111.69
144.9.212.93 192.200.144.18 207.225.10.229 6.164.52.55