Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.113.68.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23200
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.113.68.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 03:44:26 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 136.68.113.194.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.68.113.194.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.87.146.47 attackbots
Oct 14 08:59:46 srv1 sshd[2950]: User r.r from 213.87.146.47 not allowed because not listed in AllowUsers
Oct 14 08:59:46 srv1 sshd[2950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.146.47  user=r.r
Oct 14 08:59:48 srv1 sshd[2950]: Failed password for invalid user r.r from 213.87.146.47 port 24994 ssh2
Oct 14 09:08:11 srv1 sshd[10019]: User r.r from 213.87.146.47 not allowed because not listed in AllowUsers
Oct 14 09:08:11 srv1 sshd[10019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.87.146.47  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.87.146.47
2019-10-14 18:38:41
62.234.68.215 attackbotsspam
ssh failed login
2019-10-14 18:49:57
106.12.183.6 attackspam
Oct 14 12:02:01 icinga sshd[14468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.183.6
Oct 14 12:02:02 icinga sshd[14468]: Failed password for invalid user Proben2017 from 106.12.183.6 port 49642 ssh2
...
2019-10-14 18:52:16
117.50.2.47 attack
Automatic report - Banned IP Access
2019-10-14 18:19:23
23.236.148.54 attackspam
(From highranks4ursite@gmail.com) Hi there!

I've taken a good, long look at your website, its design and code and I'd love to tell you how we can enhance it. These are professional upgrades that will make your website look good and extremely useful and usable to your customers. 

Did you know that this year marks the era of User Intent and User Experience? If you don't know these concepts yet, you are probably missing out - and Google has noticed that, too. I am seasoned Web designer who sees potential for your site to become better in terms of aesthetics and business efficiency. I'd love to know if you've been seeking professional (but affordable) help with redesigning your website or fixing any issues that you have with it if there's any. 

If you're interested, I'll send my portfolio so you can be familiar of what I can accomplish for you. I can also provide you with free consultation to share with you some expert advice and design ideas that might just be fit for the business that you do. I look fo
2019-10-14 18:48:05
103.192.116.156 attack
Unauthorised access (Oct 14) SRC=103.192.116.156 LEN=52 PREC=0x20 TTL=109 ID=8995 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Oct 14) SRC=103.192.116.156 LEN=52 PREC=0x20 TTL=109 ID=7209 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-14 18:26:42
121.136.167.50 attack
2019-10-14T11:15:11.853917stark.klein-stark.info sshd\[25221\]: Invalid user user from 121.136.167.50 port 41424
2019-10-14T11:15:11.858087stark.klein-stark.info sshd\[25221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.136.167.50
2019-10-14T11:15:13.519707stark.klein-stark.info sshd\[25221\]: Failed password for invalid user user from 121.136.167.50 port 41424 ssh2
...
2019-10-14 18:12:55
85.132.100.24 attack
$f2bV_matches
2019-10-14 18:27:34
118.26.22.50 attackbots
2019-10-14T10:17:59.875457abusebot-4.cloudsearch.cf sshd\[23341\]: Invalid user SOLEIL_123 from 118.26.22.50 port 22424
2019-10-14 18:23:33
118.89.33.81 attackspambots
Oct 14 09:22:04 icinga sshd[10555]: Failed password for root from 118.89.33.81 port 54918 ssh2
Oct 14 09:37:49 icinga sshd[20822]: Failed password for root from 118.89.33.81 port 59888 ssh2
...
2019-10-14 18:30:49
95.167.225.81 attackbots
Oct 14 07:52:47 vmd17057 sshd\[27834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.225.81  user=root
Oct 14 07:52:49 vmd17057 sshd\[27834\]: Failed password for root from 95.167.225.81 port 40108 ssh2
Oct 14 07:57:28 vmd17057 sshd\[28175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.167.225.81  user=root
...
2019-10-14 18:46:10
51.68.11.227 attack
14.10.2019 05:47:04 - FTP-Server Bruteforce
 - Detected by FTP-Monster 
(https://www.elinox.de/FTP-Monster)
2019-10-14 18:42:29
50.209.215.142 attack
SSH bruteforce
2019-10-14 18:25:05
183.15.121.242 attackspambots
Oct 14 04:09:39 uapps sshd[19978]: User r.r from 183.15.121.242 not allowed because not listed in AllowUsers
Oct 14 04:09:39 uapps sshd[19978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.15.121.242  user=r.r
Oct 14 04:09:41 uapps sshd[19978]: Failed password for invalid user r.r from 183.15.121.242 port 53886 ssh2
Oct 14 04:09:42 uapps sshd[19978]: Received disconnect from 183.15.121.242: 11: Bye Bye [preauth]
Oct 14 04:34:46 uapps sshd[20066]: User r.r from 183.15.121.242 not allowed because not listed in AllowUsers
Oct 14 04:34:46 uapps sshd[20066]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.15.121.242  user=r.r
Oct 14 04:34:48 uapps sshd[20066]: Failed password for invalid user r.r from 183.15.121.242 port 41162 ssh2
Oct 14 04:34:48 uapps sshd[20066]: Received disconnect from 183.15.121.242: 11: Bye Bye [preauth]
Oct 14 04:40:34 uapps sshd[20137]: User r.r from 183.15.12........
-------------------------------
2019-10-14 18:32:29
94.191.41.77 attackspambots
Oct 14 07:06:43 www sshd\[136525\]: Invalid user Cheese@123 from 94.191.41.77
Oct 14 07:06:43 www sshd\[136525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.41.77
Oct 14 07:06:45 www sshd\[136525\]: Failed password for invalid user Cheese@123 from 94.191.41.77 port 49684 ssh2
...
2019-10-14 18:46:42

Recently Reported IPs

148.61.234.236 30.4.201.122 25.75.151.9 23.32.33.204
198.242.127.141 181.97.26.55 87.48.139.141 40.210.143.250
67.137.227.161 234.236.200.19 205.61.243.239 117.236.111.170
149.212.204.118 100.178.26.186 131.57.146.133 205.227.180.125
107.64.141.51 93.1.109.189 196.129.238.127 30.119.103.51