Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.212.68.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4662
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.212.68.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 17:25:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
137.68.212.157.in-addr.arpa domain name pointer h157-212-68-137.mdsnwi.tisp.static.tds.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
137.68.212.157.in-addr.arpa	name = h157-212-68-137.mdsnwi.tisp.static.tds.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
194.87.237.105 attack
Lines containing failures of 194.87.237.105
Feb 27 13:27:04 nexus sshd[19302]: Did not receive identification string from 194.87.237.105 port 42874
Feb 27 13:27:04 nexus sshd[19301]: Did not receive identification string from 194.87.237.105 port 34542
Feb 27 13:28:31 nexus sshd[19605]: Did not receive identification string from 194.87.237.105 port 46402
Feb 27 13:28:31 nexus sshd[19604]: Did not receive identification string from 194.87.237.105 port 38136
Feb 27 13:29:05 nexus sshd[19717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.87.237.105  user=r.r
Feb 27 13:29:06 nexus sshd[19723]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.87.237.105  user=r.r
Feb 27 13:29:08 nexus sshd[19717]: Failed password for r.r from 194.87.237.105 port 42404 ssh2
Feb 27 13:29:08 nexus sshd[19717]: Received disconnect from 194.87.237.105 port 42404:11: Normal Shutdown, Thank you for playing [prea........
------------------------------
2020-02-28 03:21:45
125.224.24.167 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-28 03:18:56
84.45.251.243 attackspambots
2020-02-28T05:35:07.707881luisaranguren sshd[1956193]: Invalid user etrust from 84.45.251.243 port 42676
2020-02-28T05:35:09.462546luisaranguren sshd[1956193]: Failed password for invalid user etrust from 84.45.251.243 port 42676 ssh2
...
2020-02-28 03:12:34
104.248.21.221 attack
Feb 27 14:58:41 hostnameghostname sshd[14925]: Invalid user developer from 104.248.21.221
Feb 27 14:58:44 hostnameghostname sshd[14925]: Failed password for invalid user developer from 104.248.21.221 port 53012 ssh2
Feb 27 15:01:07 hostnameghostname sshd[15365]: Invalid user ihc from 104.248.21.221
Feb 27 15:01:08 hostnameghostname sshd[15365]: Failed password for invalid user ihc from 104.248.21.221 port 40036 ssh2
Feb 27 15:03:37 hostnameghostname sshd[15764]: Invalid user ranjhostname from 104.248.21.221
Feb 27 15:03:38 hostnameghostname sshd[15764]: Failed password for invalid user ranjhostname from 104.248.21.221 port 55292 ssh2
Feb 27 15:06:06 hostnameghostname sshd[16177]: Invalid user libuuid from 104.248.21.221
Feb 27 15:06:08 hostnameghostname sshd[16177]: Failed password for invalid user libuuid from 104.248.21.221 port 42316 ssh2
Feb 27 15:08:33 hostnameghostname sshd[16576]: Invalid user kelly from 104.248.21.221
Feb 27 15:08:36 hostnameghostname sshd[16576]........
------------------------------
2020-02-28 02:58:17
178.205.106.188 attackspam
Unauthorised access (Feb 27) SRC=178.205.106.188 LEN=52 TTL=119 ID=4560 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-28 03:10:41
125.124.143.62 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-02-28 02:56:28
174.138.18.157 attackbots
Invalid user st from 174.138.18.157 port 52236
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.18.157
Failed password for invalid user st from 174.138.18.157 port 52236 ssh2
Invalid user tech from 174.138.18.157 port 47848
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.18.157
2020-02-28 03:07:28
211.75.51.96 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-28 03:29:43
125.224.73.195 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-28 03:14:40
213.131.78.51 attackspam
20/2/27@09:22:57: FAIL: Alarm-Network address from=213.131.78.51
...
2020-02-28 03:06:11
218.92.0.158 attack
Feb 27 09:12:47 hanapaa sshd\[402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
Feb 27 09:12:49 hanapaa sshd\[402\]: Failed password for root from 218.92.0.158 port 58239 ssh2
Feb 27 09:12:52 hanapaa sshd\[402\]: Failed password for root from 218.92.0.158 port 58239 ssh2
Feb 27 09:12:56 hanapaa sshd\[402\]: Failed password for root from 218.92.0.158 port 58239 ssh2
Feb 27 09:13:08 hanapaa sshd\[488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.158  user=root
2020-02-28 03:13:46
178.159.37.13 attack
fake user registration/login attempts
2020-02-28 03:22:36
114.250.189.63 attackbotsspam
Feb 27 18:16:21 xeon sshd[18606]: Failed password for invalid user john from 114.250.189.63 port 60308 ssh2
2020-02-28 03:19:17
49.233.90.200 attack
Feb 27 06:23:41 hanapaa sshd\[17949\]: Invalid user weuser from 49.233.90.200
Feb 27 06:23:41 hanapaa sshd\[17949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.200
Feb 27 06:23:44 hanapaa sshd\[17949\]: Failed password for invalid user weuser from 49.233.90.200 port 41316 ssh2
Feb 27 06:26:14 hanapaa sshd\[18959\]: Invalid user jc3server from 49.233.90.200
Feb 27 06:26:14 hanapaa sshd\[18959\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.200
2020-02-28 03:28:59
128.199.204.26 attack
Feb 27 17:58:19 * sshd[24470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.26
Feb 27 17:58:20 * sshd[24470]: Failed password for invalid user zhup from 128.199.204.26 port 35156 ssh2
2020-02-28 03:32:35

Recently Reported IPs

80.83.198.117 197.200.244.53 5.170.75.27 86.83.58.231
108.252.86.205 174.9.219.159 110.80.116.53 142.146.62.171
149.201.91.123 117.155.65.80 126.36.79.163 66.241.137.167
234.50.40.179 14.210.129.142 205.94.78.157 119.152.168.152
131.130.179.124 119.144.213.207 197.94.36.63 239.166.64.78