Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Highland

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.199.114.30
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42761
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.199.114.30.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:07:15 CST 2025
;; MSG SIZE  rcvd: 106
Host info
30.114.199.68.in-addr.arpa domain name pointer ool-44c7721e.dyn.optonline.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
30.114.199.68.in-addr.arpa	name = ool-44c7721e.dyn.optonline.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.247.214.67 attack
2019-12-18T14:36:40.368659shield sshd\[4980\]: Invalid user crisanto from 49.247.214.67 port 46638
2019-12-18T14:36:40.373185shield sshd\[4980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.214.67
2019-12-18T14:36:42.066544shield sshd\[4980\]: Failed password for invalid user crisanto from 49.247.214.67 port 46638 ssh2
2019-12-18T14:38:04.806028shield sshd\[5239\]: Invalid user mathildasu from 49.247.214.67 port 56854
2019-12-18T14:38:04.811087shield sshd\[5239\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.214.67
2019-12-18 22:55:10
197.52.245.157 attackbots
Unauthorized connection attempt detected from IP address 197.52.245.157 to port 22
2019-12-18 22:31:32
51.75.195.222 attackspam
Dec 18 16:38:09 sauna sshd[33050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.195.222
Dec 18 16:38:12 sauna sshd[33050]: Failed password for invalid user elisen from 51.75.195.222 port 50010 ssh2
...
2019-12-18 22:47:56
222.186.173.238 attackspambots
Dec 18 15:19:12 eventyay sshd[4608]: Failed password for root from 222.186.173.238 port 25848 ssh2
Dec 18 15:19:15 eventyay sshd[4608]: Failed password for root from 222.186.173.238 port 25848 ssh2
Dec 18 15:19:19 eventyay sshd[4608]: Failed password for root from 222.186.173.238 port 25848 ssh2
Dec 18 15:19:22 eventyay sshd[4608]: Failed password for root from 222.186.173.238 port 25848 ssh2
...
2019-12-18 22:21:33
103.205.58.186 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-18 22:23:00
63.237.48.34 attackbotsspam
1433
2019-12-18 22:54:48
221.6.15.178 attackbotsspam
Dec 17 02:09:51 srv01 sshd[12239]: Invalid user iwanyk from 221.6.15.178
Dec 17 02:09:51 srv01 sshd[12239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.6.15.178 
Dec 17 02:09:54 srv01 sshd[12239]: Failed password for invalid user iwanyk from 221.6.15.178 port 2249 ssh2
Dec 17 02:09:54 srv01 sshd[12239]: Received disconnect from 221.6.15.178: 11: Bye Bye [preauth]
Dec 17 02:23:56 srv01 sshd[12722]: Invalid user admin from 221.6.15.178
Dec 17 02:23:56 srv01 sshd[12722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.6.15.178 
Dec 17 02:23:58 srv01 sshd[12722]: Failed password for invalid user admin from 221.6.15.178 port 2250 ssh2
Dec 17 02:23:59 srv01 sshd[12722]: Received disconnect from 221.6.15.178: 11: Bye Bye [preauth]
Dec 17 02:30:40 srv01 sshd[13070]: Connection closed by 221.6.15.178 [preauth]
Dec 17 02:37:35 srv01 sshd[13293]: Invalid user mfajre from 221.6.15.178
Dec 17........
-------------------------------
2019-12-18 22:25:20
189.115.106.3 attackbotsspam
Dec 18 14:28:57 vtv3 sshd[9988]: Failed password for root from 189.115.106.3 port 52586 ssh2
Dec 18 14:36:11 vtv3 sshd[14270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.115.106.3 
Dec 18 14:36:13 vtv3 sshd[14270]: Failed password for invalid user ftpsecure from 189.115.106.3 port 43879 ssh2
Dec 18 14:50:53 vtv3 sshd[21045]: Failed password for root from 189.115.106.3 port 59585 ssh2
Dec 18 14:57:59 vtv3 sshd[24181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.115.106.3 
Dec 18 14:58:00 vtv3 sshd[24181]: Failed password for invalid user aurore from 189.115.106.3 port 23106 ssh2
Dec 18 15:13:13 vtv3 sshd[31365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.115.106.3 
Dec 18 15:13:15 vtv3 sshd[31365]: Failed password for invalid user melusi from 189.115.106.3 port 59515 ssh2
Dec 18 15:20:41 vtv3 sshd[2874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui
2019-12-18 22:57:20
122.128.107.148 attackspam
Triggered by Fail2Ban at Vostok web server
2019-12-18 22:23:48
193.56.28.244 attackbotsspam
SMTP AUTH LOGIN
2019-12-18 22:52:34
211.192.167.36 attackbots
Invalid user server from 211.192.167.36 port 42790
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.192.167.36
Failed password for invalid user server from 211.192.167.36 port 42790 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.192.167.36  user=root
Failed password for root from 211.192.167.36 port 51822 ssh2
2019-12-18 22:48:56
123.30.235.108 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2019-12-18 22:32:24
212.64.89.221 attack
Dec 18 12:16:07 vpn01 sshd[19838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.89.221
Dec 18 12:16:09 vpn01 sshd[19838]: Failed password for invalid user dacasin from 212.64.89.221 port 54984 ssh2
...
2019-12-18 22:29:31
194.153.189.98 attackspambots
RDP Bruteforce
2019-12-18 22:31:59
195.143.103.194 attackspam
SSH Brute Force
2019-12-18 22:25:41

Recently Reported IPs

13.244.10.175 205.183.248.237 89.249.148.206 219.210.185.69
177.52.121.74 47.87.213.183 232.32.52.24 16.229.161.158
198.204.0.22 80.18.31.125 164.221.151.143 209.241.133.209
40.96.26.243 162.43.75.161 222.233.38.230 134.118.169.149
73.88.116.206 149.218.129.214 76.254.21.200 166.161.87.150