Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ribeirão Preto

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: TELEFÔNICA BRASIL S.A

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.68.104.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29497
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;189.68.104.203.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071601 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 17 03:36:11 CST 2019
;; MSG SIZE  rcvd: 118
Host info
203.104.68.189.in-addr.arpa domain name pointer 189-68-104-203.dsl.telesp.net.br.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
203.104.68.189.in-addr.arpa	name = 189-68-104-203.dsl.telesp.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.103.109.1 attackspam
Unauthorized connection attempt from IP address 190.103.109.1 on Port 445(SMB)
2019-09-07 04:48:24
185.53.88.70 attack
\[2019-09-06 16:06:08\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-06T16:06:08.469-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011970599704264",SessionID="0x7fd9a819fa08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.70/63880",ACLName="no_extension_match"
\[2019-09-06 16:08:20\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-06T16:08:20.833-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011970599704264",SessionID="0x7fd9a8197648",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.70/52894",ACLName="no_extension_match"
\[2019-09-06 16:10:33\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-06T16:10:33.615-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011970599704264",SessionID="0x7fd9a814bb28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.70/52132",ACLName="no_exten
2019-09-07 04:35:19
165.22.16.90 attack
Sep  7 02:56:14 webhost01 sshd[17652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.16.90
Sep  7 02:56:15 webhost01 sshd[17652]: Failed password for invalid user 1 from 165.22.16.90 port 55678 ssh2
...
2019-09-07 04:18:02
179.43.149.11 attackbots
scan r
2019-09-07 04:58:26
103.221.76.99 attackspambots
Unauthorized connection attempt from IP address 103.221.76.99 on Port 445(SMB)
2019-09-07 04:53:21
121.200.61.14 attackbots
Unauthorized connection attempt from IP address 121.200.61.14 on Port 445(SMB)
2019-09-07 05:00:52
203.129.219.198 attackbots
Sep  6 19:11:48 saschabauer sshd[8304]: Failed password for root from 203.129.219.198 port 55774 ssh2
2019-09-07 04:55:09
168.227.91.169 attackspambots
Sep  6 09:13:55 auw2 sshd\[28418\]: Invalid user factorio from 168.227.91.169
Sep  6 09:13:55 auw2 sshd\[28418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.227.91.169
Sep  6 09:13:57 auw2 sshd\[28418\]: Failed password for invalid user factorio from 168.227.91.169 port 48626 ssh2
Sep  6 09:18:51 auw2 sshd\[28834\]: Invalid user steam from 168.227.91.169
Sep  6 09:18:51 auw2 sshd\[28834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.227.91.169
2019-09-07 04:28:22
134.175.80.27 attackbots
Sep  6 21:15:23 areeb-Workstation sshd[6409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.80.27
Sep  6 21:15:25 areeb-Workstation sshd[6409]: Failed password for invalid user ubuntu from 134.175.80.27 port 37006 ssh2
...
2019-09-07 04:18:24
222.186.30.165 attack
2019-09-06T22:44:39.913577centos sshd\[17431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.165  user=root
2019-09-06T22:44:41.835848centos sshd\[17431\]: Failed password for root from 222.186.30.165 port 22484 ssh2
2019-09-06T22:44:44.453872centos sshd\[17431\]: Failed password for root from 222.186.30.165 port 22484 ssh2
2019-09-07 04:45:11
200.160.111.44 attackspambots
Sep  6 22:32:25 fr01 sshd[2881]: Invalid user webadmin from 200.160.111.44
...
2019-09-07 04:50:09
177.84.147.125 attackbots
Mail sent to address hacked/leaked from Last.fm
2019-09-07 04:21:46
91.244.73.228 attack
19/9/6@10:04:57: FAIL: IoT-Telnet address from=91.244.73.228
...
2019-09-07 04:13:43
188.162.38.30 attack
Unauthorized connection attempt from IP address 188.162.38.30 on Port 445(SMB)
2019-09-07 04:40:58
103.54.222.204 attackspam
Unauthorized connection attempt from IP address 103.54.222.204 on Port 445(SMB)
2019-09-07 04:59:26

Recently Reported IPs

54.36.150.186 212.164.79.201 162.235.250.60 212.182.137.103
101.233.151.24 69.67.51.220 80.164.59.215 84.21.25.226
144.171.77.67 49.69.110.10 81.145.92.233 168.255.14.208
72.3.17.40 86.45.102.60 203.177.90.134 47.59.214.56
111.79.11.104 68.172.142.125 23.97.174.247 12.101.149.104