Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 14.1.204.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2268
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;14.1.204.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 01:49:54 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 68.204.1.14.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.204.1.14.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.75.255.41 attackspam
2020-05-19T11:52:30.919303scmdmz1 sshd[19521]: Invalid user qyc from 51.75.255.41 port 58448
2020-05-19T11:52:32.900427scmdmz1 sshd[19521]: Failed password for invalid user qyc from 51.75.255.41 port 58448 ssh2
2020-05-19T11:56:21.359132scmdmz1 sshd[20018]: Invalid user jinjiayu from 51.75.255.41 port 38476
...
2020-05-19 23:43:41
94.102.51.17 attackspambots
05/16/2020-19:42:35.901150 94.102.51.17 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-17 08:44:18
103.145.12.123 attackspam
 UDP 103.145.12.123:5134 -> port 5088, len 443
2020-05-17 08:42:04
201.161.41.142 attack
201.161.41.142 - - [17/May/2020:10:33:51 +0800] "host" "GET /w00tw00t.at.ISC.SANS.DFind:) HTTP/1.1" 400 570 "-" "-" "-"
2020-05-17 15:20:55
36.46.129.180 attack
36.46.129.180 - - [17/May/2020:07:25:16 +0800] "host" "GET /adv,/cgi-bin/weblogin.cgi?username=admin%27%3Bls%20%23&password=asdf HTTP/1.1" 403 615 "-" "Mozilla/5.0" "-"
2020-05-17 15:19:36
157.230.126.210 attack
Several unsuccessful SSH logins on changed port using password list. 
Caught by fail2ban ;-)
2020-05-18 05:08:53
211.149.232.81 spambotsattackproxy
211.149.232.81 - - [16/May/2020:14:21:59 +0200] "GET /robots.txt HTTP/1.1" 404 1869 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 SE 2.X MetaSr 1.0"
211.149.232.81 - - [16/May/2020:14:22:00 +0200] "POST /Admin30bcab3e/Login.php HTTP/1.1" 404 1869 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 SE 2.X MetaSr 1.0"
211.149.232.81 - - [16/May/2020:14:22:01 +0200] "GET / HTTP/1.1" 200 1120 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:52.0) Gecko/20100101 Firefox/52.0"
211.149.232.81 - - [16/May/2020:14:39:39 +0200] "POST /cgi-bin/php?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%61%62%6C%65%5F%66%75%6E%63%74%69%6F%6E%73%3D%22%22+%2D%64+%6F%70%65%6E%5F%62%61%73%65%64%69%72%3D%6E%6F%6E%65+%2D%64+%61%75%74%6F%5F%70%72%65%70%65%6E%64%5F%66%69%6C%65%3D%70%68%70%3A%2F%2F%69%6E%70%75%74+%2D%64+%63%67%69%2E%66%6F%72%63%65%5F%72%65%64%69%72%65%63%74%3D%30+%2D%64+%63%67%69%2E%72%65%64%69%72%65%63%74%5F%73%74%61%74%75%73%5F%65%6E%76%3D%30+%2D%6E HTTP/1.1" 404 1869 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36"
2020-05-17 09:18:22
222.186.180.41 attackbotsspam
May 19 15:45:42 localhost sshd[18641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
May 19 15:45:45 localhost sshd[18641]: Failed password for root from 222.186.180.41 port 29514 ssh2
May 19 15:45:48 localhost sshd[18641]: Failed password for root from 222.186.180.41 port 29514 ssh2
May 19 15:45:42 localhost sshd[18641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
May 19 15:45:45 localhost sshd[18641]: Failed password for root from 222.186.180.41 port 29514 ssh2
May 19 15:45:48 localhost sshd[18641]: Failed password for root from 222.186.180.41 port 29514 ssh2
May 19 15:45:42 localhost sshd[18641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
May 19 15:45:45 localhost sshd[18641]: Failed password for root from 222.186.180.41 port 29514 ssh2
May 19 15:45:48 localhost sshd[18641]: Fa
...
2020-05-19 23:47:00
222.186.31.127 attack
May 19 11:52:58 OPSO sshd\[26143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.127  user=root
May 19 11:53:00 OPSO sshd\[26143\]: Failed password for root from 222.186.31.127 port 23964 ssh2
May 19 11:53:03 OPSO sshd\[26143\]: Failed password for root from 222.186.31.127 port 23964 ssh2
May 19 11:53:05 OPSO sshd\[26143\]: Failed password for root from 222.186.31.127 port 23964 ssh2
May 19 11:56:42 OPSO sshd\[26819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.127  user=root
2020-05-19 23:45:54
203.245.41.96 attack
no
2020-05-19 23:49:07
190.156.227.27 attack
Unauthorized login to one of my accounts from this IP, probably taking advantage of one of the many data breaches out there
2020-05-18 05:05:43
106.12.48.217 attack
Invalid user testuser from 106.12.48.217 port 39648
2020-05-17 08:40:32
141.98.81.150 attackbotsspam
 TCP (SYN) 141.98.81.150:47922 -> port 1080, len 60
2020-05-17 08:38:21
165.227.88.167 attackbotsspam
May 19 11:56:20 pornomens sshd\[4877\]: Invalid user takazawa from 165.227.88.167 port 44456
May 19 11:56:20 pornomens sshd\[4877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.88.167
May 19 11:56:21 pornomens sshd\[4877\]: Failed password for invalid user takazawa from 165.227.88.167 port 44456 ssh2
...
2020-05-19 23:48:16
222.242.223.75 attackbotsspam
2020-05-19T11:52:42.960548scmdmz1 sshd[19537]: Invalid user hip from 222.242.223.75 port 30370
2020-05-19T11:52:44.895672scmdmz1 sshd[19537]: Failed password for invalid user hip from 222.242.223.75 port 30370 ssh2
2020-05-19T11:56:09.685417scmdmz1 sshd[20010]: Invalid user cmg from 222.242.223.75 port 16450
...
2020-05-19 23:44:39

Recently Reported IPs

59.150.142.181 14.182.131.20 3.40.104.29 24.122.8.76
61.15.61.1 87.10.204.63 69.140.14.94 97.109.33.196
24.100.12.14 19.145.158.240 109.149.147.13 155.103.14.95
208.117.204.216 50.187.107.155 246.177.14.66 33.127.59.147
199.167.109.14 97.67.147.11 217.187.117.121 3.129.94.73