Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Cali

Region: Valle del Cauca

Country: Colombia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.97.68.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37481
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.97.68.14.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100501 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 06 02:16:07 CST 2023
;; MSG SIZE  rcvd: 105
Host info
14.68.97.190.in-addr.arpa domain name pointer adsl_dynamic-bue-14-68-97.ert.com.co.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.68.97.190.in-addr.arpa	name = adsl_dynamic-bue-14-68-97.ert.com.co.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.189.96.135 attackspambots
Unauthorized connection attempt detected from IP address 195.189.96.135 to port 5900
2020-02-04 21:00:02
46.38.144.146 attackbotsspam
Feb  4 14:04:19 v22019058497090703 postfix/smtpd[2394]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 14:05:18 v22019058497090703 postfix/smtpd[2394]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Feb  4 14:07:29 v22019058497090703 postfix/smtpd[2818]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-02-04 21:13:17
218.92.0.212 attackspambots
SSH login attempts
2020-02-04 21:16:21
218.92.0.171 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.171  user=root
Failed password for root from 218.92.0.171 port 8993 ssh2
Failed password for root from 218.92.0.171 port 8993 ssh2
Failed password for root from 218.92.0.171 port 8993 ssh2
Failed password for root from 218.92.0.171 port 8993 ssh2
2020-02-04 20:38:21
121.149.57.217 attack
Unauthorized connection attempt detected from IP address 121.149.57.217 to port 81 [J]
2020-02-04 21:21:10
203.146.170.167 attackbotsspam
Unauthorized connection attempt detected from IP address 203.146.170.167 to port 2220 [J]
2020-02-04 20:46:45
178.47.139.172 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-04 21:19:20
182.72.154.30 attackbots
Unauthorized connection attempt detected from IP address 182.72.154.30 to port 2220 [J]
2020-02-04 21:06:34
134.175.206.12 attack
Automatic report - SSH Brute-Force Attack
2020-02-04 21:09:05
222.186.173.238 attackspam
Feb  4 13:40:26 minden010 sshd[23328]: Failed password for root from 222.186.173.238 port 65254 ssh2
Feb  4 13:40:40 minden010 sshd[23328]: error: maximum authentication attempts exceeded for root from 222.186.173.238 port 65254 ssh2 [preauth]
Feb  4 13:40:47 minden010 sshd[23372]: Failed password for root from 222.186.173.238 port 33036 ssh2
...
2020-02-04 20:44:14
81.84.159.115 attackbots
Feb  4 05:53:05 grey postfix/smtpd\[28639\]: NOQUEUE: reject: RCPT from a81-84-159-115.cpe.netcabo.pt\[81.84.159.115\]: 554 5.7.1 Service unavailable\; Client host \[81.84.159.115\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?81.84.159.115\; from=\ to=\ proto=ESMTP helo=\
...
2020-02-04 21:09:59
124.156.121.233 attackbotsspam
Feb  4 05:52:52 serwer sshd\[22387\]: Invalid user deka from 124.156.121.233 port 49900
Feb  4 05:52:52 serwer sshd\[22387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.121.233
Feb  4 05:52:54 serwer sshd\[22387\]: Failed password for invalid user deka from 124.156.121.233 port 49900 ssh2
Feb  4 06:15:40 serwer sshd\[25080\]: User uucp from 124.156.121.233 not allowed because not listed in AllowUsers
Feb  4 06:15:40 serwer sshd\[25080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.121.233  user=uucp
Feb  4 06:15:42 serwer sshd\[25080\]: Failed password for invalid user uucp from 124.156.121.233 port 59804 ssh2
Feb  4 06:19:00 serwer sshd\[25404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.121.233  user=root
Feb  4 06:19:02 serwer sshd\[25404\]: Failed password for root from 124.156.121.233 port 57950 ssh2
Feb  4 06:23:57
...
2020-02-04 21:19:00
223.30.156.98 attackspam
Feb  4 11:09:35 grey postfix/smtpd\[3210\]: NOQUEUE: reject: RCPT from unknown\[223.30.156.98\]: 554 5.7.1 Service unavailable\; Client host \[223.30.156.98\] blocked using cbl.abuseat.org\; Blocked - see http://www.abuseat.org/lookup.cgi\?ip=223.30.156.98\; from=\ to=\ proto=ESMTP helo=\<\[223.30.156.98\]\>
...
2020-02-04 20:52:33
172.81.129.216 attackspambots
Feb  4 07:45:48 debian-2gb-nbg1-2 kernel: \[3057998.745884\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=172.81.129.216 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=967 PROTO=TCP SPT=50409 DPT=81 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-04 21:15:38
200.52.80.34 attack
Unauthorized connection attempt detected from IP address 200.52.80.34 to port 2220 [J]
2020-02-04 20:48:46

Recently Reported IPs

133.31.6.13 1.47.12.210 63.129.51.130 157.88.54.240
166.202.167.165 52.179.185.145 172.158.208.58 62.110.199.247
63.143.74.178 170.215.250.137 106.75.7.100 187.0.50.189
176.88.31.122 49.18.83.191 238.134.189.36 97.178.74.143
156.40.43.122 158.230.245.2 242.216.162.160 112.113.42.145