Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.200.68.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.200.68.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021102 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 06:38:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 54.68.200.163.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.68.200.163.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.68.26.48 attackbotsspam
$f2bV_matches
2020-01-12 00:32:38
37.59.98.64 attack
$f2bV_matches
2020-01-12 00:20:57
138.99.6.65 attackspam
$f2bV_matches
2020-01-12 00:29:56
94.158.37.24 attackbots
"Fail2Ban detected SSH brute force attempt"
2020-01-12 00:28:47
171.245.88.135 attackspam
Postfix RBL failed
2020-01-11 23:50:30
139.59.38.169 attack
$f2bV_matches
2020-01-12 00:00:20
106.52.254.33 attackspambots
ssh intrusion attempt
2020-01-12 00:23:08
139.199.84.234 attackspambots
$f2bV_matches
2020-01-12 00:12:52
139.59.180.53 attackbotsspam
Jan 11 06:25:36 server sshd\[23864\]: Failed password for invalid user avis from 139.59.180.53 port 53014 ssh2
Jan 11 19:01:04 server sshd\[19561\]: Invalid user postgres from 139.59.180.53
Jan 11 19:01:04 server sshd\[19561\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.180.53 
Jan 11 19:01:05 server sshd\[19561\]: Failed password for invalid user postgres from 139.59.180.53 port 59310 ssh2
Jan 11 19:03:15 server sshd\[19846\]: Invalid user avis from 139.59.180.53
...
2020-01-12 00:04:38
51.91.212.79 attackspam
Unauthorized connection attempt detected from IP address 51.91.212.79 to port 8088 [T]
2020-01-11 23:57:51
139.59.41.154 attackbotsspam
$f2bV_matches
2020-01-11 23:58:29
139.198.191.86 attack
$f2bV_matches
2020-01-12 00:24:57
139.59.59.187 attackspambots
$f2bV_matches
2020-01-11 23:56:15
139.199.113.2 attackbots
$f2bV_matches
2020-01-12 00:20:35
84.68.68.124 attack
Chat Spam
2020-01-12 00:23:32

Recently Reported IPs

251.107.169.178 197.154.38.197 151.220.155.86 101.148.171.133
209.237.21.61 208.47.182.17 109.57.227.104 191.104.237.147
75.49.40.169 222.21.162.111 222.69.35.122 227.157.216.113
39.73.191.18 208.213.45.249 68.142.101.116 232.160.208.244
27.61.33.25 66.56.226.116 77.134.168.100 199.79.89.156