Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Chile

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.211.85.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17975
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.211.85.194.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:42:40 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 194.85.211.68.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.85.211.68.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.115.165.31 attack
9101/tcp 99/tcp 22212/tcp...
[2019-11-04/18]4pkt,4pt.(tcp)
2019-11-20 09:02:37
5.189.132.31 attackspam
WEB Masscan Scanner Activity
2019-11-20 09:02:05
87.197.162.136 attack
23/tcp 8000/tcp 88/tcp...
[2019-09-22/11-19]7pkt,5pt.(tcp)
2019-11-20 08:42:26
41.208.68.28 attackspam
Port scan on 12 port(s): 3332 3354 3355 3356 3365 3372 3373 3381 3386 3389 33389 33589
2019-11-20 09:06:08
92.63.194.115 attack
11/20/2019-05:57:53.013158 92.63.194.115 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-20 13:02:18
109.190.43.165 attackspam
Nov 20 06:18:30 areeb-Workstation sshd[7003]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.190.43.165
Nov 20 06:18:32 areeb-Workstation sshd[7003]: Failed password for invalid user Asdf1234!@#$ from 109.190.43.165 port 51833 ssh2
...
2019-11-20 09:05:19
103.58.57.134 normal
Whether activated or not
2019-11-20 09:41:23
49.235.242.253 attackspambots
Nov 20 05:57:48 vpn01 sshd[9672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.242.253
Nov 20 05:57:50 vpn01 sshd[9672]: Failed password for invalid user master from 49.235.242.253 port 39890 ssh2
...
2019-11-20 13:06:03
128.199.162.108 attackspambots
2019-11-19T22:44:29.635092abusebot-5.cloudsearch.cf sshd\[1971\]: Invalid user vanilla from 128.199.162.108 port 44932
2019-11-20 08:43:31
51.68.70.66 attackbotsspam
...
2019-11-20 08:54:51
125.105.82.168 attackbots
belitungshipwreck.org 125.105.82.168 [20/Nov/2019:05:57:51 +0100] "POST /xmlrpc.php HTTP/1.1" 301 508 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
belitungshipwreck.org 125.105.82.168 [20/Nov/2019:05:57:52 +0100] "POST /xmlrpc.php HTTP/1.1" 301 508 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
2019-11-20 13:03:49
193.56.28.130 attackbotsspam
Nov 19 23:50:30 heicom postfix/smtpd\[4850\]: warning: unknown\[193.56.28.130\]: SASL LOGIN authentication failed: authentication failure
Nov 19 23:50:30 heicom postfix/smtpd\[4850\]: warning: unknown\[193.56.28.130\]: SASL LOGIN authentication failed: authentication failure
Nov 19 23:50:31 heicom postfix/smtpd\[4850\]: warning: unknown\[193.56.28.130\]: SASL LOGIN authentication failed: authentication failure
Nov 19 23:50:31 heicom postfix/smtpd\[4850\]: warning: unknown\[193.56.28.130\]: SASL LOGIN authentication failed: authentication failure
Nov 19 23:50:31 heicom postfix/smtpd\[4850\]: warning: unknown\[193.56.28.130\]: SASL LOGIN authentication failed: authentication failure
...
2019-11-20 09:07:25
195.154.56.58 attackbotsspam
11/20/2019-01:24:51.195827 195.154.56.58 Protocol: 6 ET SCAN NETWORK Incoming Masscan detected
2019-11-20 08:57:54
49.88.112.67 attack
Nov 20 01:54:34 v22018053744266470 sshd[32438]: Failed password for root from 49.88.112.67 port 30833 ssh2
Nov 20 01:56:22 v22018053744266470 sshd[32553]: Failed password for root from 49.88.112.67 port 37970 ssh2
...
2019-11-20 09:01:04
118.97.74.4 attack
118.97.74.4 was recorded 5 times by 2 hosts attempting to connect to the following ports: 80. Incident counter (4h, 24h, all-time): 5, 14, 42
2019-11-20 08:51:53

Recently Reported IPs

180.11.170.215 89.178.119.215 140.167.23.115 84.230.229.115
116.167.25.149 235.248.24.209 198.139.184.188 255.8.62.86
73.178.99.214 244.103.43.73 225.127.87.216 149.241.33.187
79.226.103.147 149.169.22.227 98.184.23.93 67.114.193.103
60.157.0.178 58.52.73.89 203.106.77.118 41.219.37.235