Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.114.80.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.114.80.4.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:37:20 CST 2025
;; MSG SIZE  rcvd: 104
Host info
4.80.114.68.in-addr.arpa domain name pointer syn-068-114-080-004.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
4.80.114.68.in-addr.arpa	name = syn-068-114-080-004.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.190.69 attackbotsspam
Sep 22 06:59:00 site2 sshd\[39109\]: Invalid user wandojo from 139.59.190.69Sep 22 06:59:02 site2 sshd\[39109\]: Failed password for invalid user wandojo from 139.59.190.69 port 36503 ssh2Sep 22 07:03:02 site2 sshd\[39224\]: Invalid user edineide123 from 139.59.190.69Sep 22 07:03:04 site2 sshd\[39224\]: Failed password for invalid user edineide123 from 139.59.190.69 port 56997 ssh2Sep 22 07:07:08 site2 sshd\[39393\]: Invalid user xbot_premium123 from 139.59.190.69
...
2019-09-22 14:08:07
49.146.8.113 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 04:55:24.
2019-09-22 13:51:12
222.186.15.101 attackbotsspam
2019-09-22T13:16:27.880406enmeeting.mahidol.ac.th sshd\[15290\]: User root from 222.186.15.101 not allowed because not listed in AllowUsers
2019-09-22T13:16:28.293746enmeeting.mahidol.ac.th sshd\[15290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.101  user=root
2019-09-22T13:16:30.475789enmeeting.mahidol.ac.th sshd\[15290\]: Failed password for invalid user root from 222.186.15.101 port 22824 ssh2
...
2019-09-22 14:21:25
69.162.110.226 attackbots
Trying ports that it shouldn't be.
2019-09-22 13:47:37
69.162.98.68 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 04:55:25.
2019-09-22 13:49:55
222.186.31.144 attackspambots
2019-09-22T06:18:00.511086abusebot-4.cloudsearch.cf sshd\[20918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.144  user=root
2019-09-22 14:20:17
165.22.78.222 attackspam
*Port Scan* detected from 165.22.78.222 (DE/Germany/-). 4 hits in the last 270 seconds
2019-09-22 14:14:03
27.148.205.75 attack
Sep 22 02:09:24 xtremcommunity sshd\[350166\]: Invalid user recovery from 27.148.205.75 port 49904
Sep 22 02:09:24 xtremcommunity sshd\[350166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.148.205.75
Sep 22 02:09:26 xtremcommunity sshd\[350166\]: Failed password for invalid user recovery from 27.148.205.75 port 49904 ssh2
Sep 22 02:14:40 xtremcommunity sshd\[350286\]: Invalid user admin from 27.148.205.75 port 60880
Sep 22 02:14:40 xtremcommunity sshd\[350286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.148.205.75
...
2019-09-22 14:22:10
41.65.64.36 attackbots
*Port Scan* detected from 41.65.64.36 (EG/Egypt/HOST-36-64.65.41.nile-online.net). 4 hits in the last 266 seconds
2019-09-22 13:54:24
106.51.140.15 attackspambots
Sep 22 08:00:17 MK-Soft-VM4 sshd[10421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.140.15 
Sep 22 08:00:19 MK-Soft-VM4 sshd[10421]: Failed password for invalid user ubuntu from 106.51.140.15 port 14765 ssh2
...
2019-09-22 14:01:00
198.27.90.106 attack
Sep 22 01:43:18 ny01 sshd[25509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.90.106
Sep 22 01:43:20 ny01 sshd[25509]: Failed password for invalid user mhlee from 198.27.90.106 port 50301 ssh2
Sep 22 01:47:53 ny01 sshd[26242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.27.90.106
2019-09-22 14:06:48
176.63.151.209 attackspam
10 attempts against mh-misc-ban on heat.magehost.pro
2019-09-22 14:25:03
95.141.141.190 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 22-09-2019 04:55:26.
2019-09-22 13:49:33
46.38.144.146 attackspambots
Sep 22 07:58:40 mail postfix/smtpd\[5721\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 07:59:57 mail postfix/smtpd\[7493\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 22 08:01:15 mail postfix/smtpd\[5603\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-09-22 14:10:32
68.183.214.5 attackbots
68.183.214.5 - - [22/Sep/2019:06:03:44 +0200] "GET /wp/wp-login.php HTTP/1.1" 301 250 "http://mediaxtend.com/wp/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.214.5 - - [22/Sep/2019:06:03:44 +0200] "GET /wp/wp-login.php HTTP/1.1" 404 4264 "http://www.mediaxtend.com/wp/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-22 14:14:48

Recently Reported IPs

12.107.188.132 255.211.223.31 136.180.46.138 18.246.105.48
41.226.150.156 212.134.75.18 162.56.70.51 135.91.70.157
202.83.82.150 201.21.8.75 143.99.59.248 103.150.210.191
42.235.36.67 159.192.170.173 85.46.88.142 184.153.74.240
83.255.212.251 129.242.164.239 131.103.225.118 103.178.169.150