Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Atlanta

Region: Georgia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.234.131.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.234.131.14.			IN	A

;; AUTHORITY SECTION:
.			411	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070102 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 02 04:29:29 CST 2020
;; MSG SIZE  rcvd: 117
Host info
14.131.234.68.in-addr.arpa domain name pointer host-68-234-131-14.gaattob.clients.pavlovmedia.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.131.234.68.in-addr.arpa	name = host-68-234-131-14.gaattob.clients.pavlovmedia.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.248.71.7 attackspambots
2020-06-15T03:49:31.150940dmca.cloudsearch.cf sshd[9593]: Invalid user wp from 104.248.71.7 port 54534
2020-06-15T03:49:31.156537dmca.cloudsearch.cf sshd[9593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.71.7
2020-06-15T03:49:31.150940dmca.cloudsearch.cf sshd[9593]: Invalid user wp from 104.248.71.7 port 54534
2020-06-15T03:49:33.708434dmca.cloudsearch.cf sshd[9593]: Failed password for invalid user wp from 104.248.71.7 port 54534 ssh2
2020-06-15T03:53:05.382633dmca.cloudsearch.cf sshd[10077]: Invalid user ec2-user from 104.248.71.7 port 52528
2020-06-15T03:53:05.388026dmca.cloudsearch.cf sshd[10077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.71.7
2020-06-15T03:53:05.382633dmca.cloudsearch.cf sshd[10077]: Invalid user ec2-user from 104.248.71.7 port 52528
2020-06-15T03:53:07.317751dmca.cloudsearch.cf sshd[10077]: Failed password for invalid user ec2-user from 104.248.71.7 port 525
...
2020-06-15 15:27:00
117.34.99.31 attack
Jun 15 05:53:11 cp sshd[4411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.99.31
2020-06-15 15:23:32
193.218.118.131 attackbotsspam
2,42-02/04 [bc01/m17] PostRequest-Spammer scoring: brussels
2020-06-15 15:10:12
207.148.119.173 attackspam
Jun 15 08:02:14 ms-srv sshd[4068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.148.119.173  user=root
Jun 15 08:02:16 ms-srv sshd[4068]: Failed password for invalid user root from 207.148.119.173 port 58152 ssh2
2020-06-15 15:16:25
62.234.102.25 attack
Jun 15 06:27:21 haigwepa sshd[6378]: Failed password for root from 62.234.102.25 port 47438 ssh2
...
2020-06-15 15:24:03
222.186.180.147 attackbots
Jun 15 07:24:25 ip-172-31-61-156 sshd[12871]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147  user=root
Jun 15 07:24:27 ip-172-31-61-156 sshd[12871]: Failed password for root from 222.186.180.147 port 51396 ssh2
...
2020-06-15 15:26:20
138.68.226.175 attackbots
2020-06-15 06:08:28,312 fail2ban.actions        [937]: NOTICE  [sshd] Ban 138.68.226.175
2020-06-15 06:41:37,027 fail2ban.actions        [937]: NOTICE  [sshd] Ban 138.68.226.175
2020-06-15 07:18:03,817 fail2ban.actions        [937]: NOTICE  [sshd] Ban 138.68.226.175
2020-06-15 07:52:19,283 fail2ban.actions        [937]: NOTICE  [sshd] Ban 138.68.226.175
2020-06-15 08:30:08,920 fail2ban.actions        [937]: NOTICE  [sshd] Ban 138.68.226.175
...
2020-06-15 15:14:12
159.89.236.71 attack
(sshd) Failed SSH login from 159.89.236.71 (US/United States/-): 5 in the last 3600 secs
2020-06-15 15:02:03
92.167.59.199 attackspambots
2020-06-14T23:53:16.233372mail.thespaminator.com sshd[23066]: Invalid user nginxtcp from 92.167.59.199 port 41900
2020-06-14T23:53:18.800807mail.thespaminator.com sshd[23066]: Failed password for invalid user nginxtcp from 92.167.59.199 port 41900 ssh2
...
2020-06-15 15:13:09
157.230.61.132 attack
Jun 15 10:49:59 itv-usvr-01 sshd[1742]: Invalid user deploy from 157.230.61.132
Jun 15 10:49:59 itv-usvr-01 sshd[1742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.61.132
Jun 15 10:49:59 itv-usvr-01 sshd[1742]: Invalid user deploy from 157.230.61.132
Jun 15 10:50:00 itv-usvr-01 sshd[1742]: Failed password for invalid user deploy from 157.230.61.132 port 47066 ssh2
Jun 15 10:52:54 itv-usvr-01 sshd[1850]: Invalid user printer from 157.230.61.132
2020-06-15 15:39:19
138.68.95.204 attack
2020-06-15T09:06:41+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-06-15 15:08:57
152.32.102.188 attack
Automatic report - XMLRPC Attack
2020-06-15 15:27:36
59.9.210.52 attack
Unauthorized SSH login attempts
2020-06-15 15:43:21
82.67.138.184 attackspam
Brute-force attempt banned
2020-06-15 15:38:09
40.72.97.22 attackbots
Jun 15 07:58:49 abendstille sshd\[23699\]: Invalid user randy from 40.72.97.22
Jun 15 07:58:49 abendstille sshd\[23699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.72.97.22
Jun 15 07:58:51 abendstille sshd\[23699\]: Failed password for invalid user randy from 40.72.97.22 port 54642 ssh2
Jun 15 08:02:13 abendstille sshd\[27244\]: Invalid user rtest from 40.72.97.22
Jun 15 08:02:13 abendstille sshd\[27244\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.72.97.22
...
2020-06-15 15:36:35

Recently Reported IPs

31.175.240.138 97.37.24.121 106.150.212.187 59.136.215.127
132.146.252.131 61.96.66.12 152.173.77.17 59.172.31.247
11.100.136.250 15.114.230.2 215.15.221.15 136.160.150.153
63.172.68.8 123.25.238.100 97.116.104.159 82.127.227.222
14.9.89.122 102.59.249.152 34.87.171.187 88.23.45.53