Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.140.114.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10328
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.140.114.112.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091100 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Sep 12 00:57:34 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 112.114.140.68.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 112.114.140.68.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
31.145.209.127 attack
Forbidden directory scan :: 2020/09/09 16:50:15 [error] 1010#1010: *1882345 access forbidden by rule, client: 31.145.209.127, server: [censored_1], request: "GET //.env HTTP/1.1", host: "www.[censored_1]"
2020-09-11 01:45:47
142.4.4.229 attackbots
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-11 02:12:34
71.6.233.241 attackbots
firewall-block, port(s): 7100/tcp
2020-09-11 01:51:02
31.163.178.77 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-09-11 02:02:49
116.196.90.254 attackbotsspam
$f2bV_matches
2020-09-11 02:19:18
223.82.149.6 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-09-11 02:03:35
192.241.234.111 attack
SMB Server BruteForce Attack
2020-09-11 02:17:11
45.145.64.165 attack
Microsoft-Windows-Security-Auditing
2020-09-11 02:15:19
213.32.91.71 attackspambots
WordPress wp-login brute force :: 213.32.91.71 0.100 - [10/Sep/2020:17:27:30  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 2414 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-09-11 01:59:14
185.108.106.251 attackspam
[2020-09-10 13:31:19] NOTICE[1239] chan_sip.c: Registration from '' failed for '185.108.106.251:56218' - Wrong password
[2020-09-10 13:31:19] SECURITY[1264] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-10T13:31:19.078-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="6556",SessionID="0x7f4d480d6c18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.108.106.251/56218",Challenge="4794918a",ReceivedChallenge="4794918a",ReceivedHash="fe9603b1c0bfd0d02dda0c5b8a5bea53"
[2020-09-10 13:31:47] NOTICE[1239] chan_sip.c: Registration from '' failed for '185.108.106.251:54291' - Wrong password
[2020-09-10 13:31:47] SECURITY[1264] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-10T13:31:47.349-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="4127",SessionID="0x7f4d481284c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.108
...
2020-09-11 01:47:18
89.248.168.108 attack
Sep  9 20:43:57 server dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=89.248.168.108, lip=144.91.77.193, session=<6RN01eWuruBZ+Khs>
Sep 10 18:13:09 server dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=89.248.168.108, lip=144.91.77.193, session=
Sep 10 18:45:27 server dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=89.248.168.108, lip=144.91.77.193, session=
Sep 10 19:18:11 server dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=89.248.168.108, lip=144.91.77.193, session=
Sep 10 19:51:05 server dovecot: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=89.248.168.108, lip=144.91.77.193, session=
2020-09-11 02:16:44
194.190.93.136 attackspam
Dovecot Invalid User Login Attempt.
2020-09-11 02:09:39
156.96.44.214 attackspam
Brute forcing email accounts
2020-09-11 02:13:06
134.209.63.140 attackbots
 TCP (SYN) 134.209.63.140:47573 -> port 27666, len 44
2020-09-11 01:45:29
94.102.51.29 attackbotsspam
 TCP (SYN) 94.102.51.29:51751 -> port 3396, len 44
2020-09-11 01:48:50

Recently Reported IPs

223.80.156.112 188.125.133.227 183.93.19.83 137.36.9.63
174.99.202.31 166.169.194.136 137.101.127.130 189.236.55.111
2.205.146.54 110.83.81.103 65.25.88.197 147.31.208.162
177.245.94.20 56.78.128.22 123.215.210.85 1.220.248.21
2.76.118.204 27.203.111.38 108.7.222.2 46.76.152.95