Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Elmhurst

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Charter Communications Inc

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.68.116.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35167
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;74.68.116.108.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082800 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 29 00:10:29 CST 2019
;; MSG SIZE  rcvd: 117
Host info
108.116.68.74.in-addr.arpa domain name pointer cpe-74-68-116-108.nyc.res.rr.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
108.116.68.74.in-addr.arpa	name = cpe-74-68-116-108.nyc.res.rr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
168.205.216.34 attack
Unauthorized connection attempt from IP address 168.205.216.34 on Port 445(SMB)
2019-11-27 00:46:31
111.230.12.192 attackbots
Nov 26 06:42:16 php1 sshd\[10962\]: Invalid user ruscetta from 111.230.12.192
Nov 26 06:42:17 php1 sshd\[10962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.12.192
Nov 26 06:42:18 php1 sshd\[10962\]: Failed password for invalid user ruscetta from 111.230.12.192 port 50390 ssh2
Nov 26 06:47:13 php1 sshd\[11407\]: Invalid user bmike123 from 111.230.12.192
Nov 26 06:47:13 php1 sshd\[11407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.12.192
2019-11-27 00:48:17
52.231.205.120 attackbotsspam
2019-11-26T16:38:14.454647tmaserv sshd\[1778\]: Invalid user nagoor from 52.231.205.120 port 60900
2019-11-26T16:38:14.461137tmaserv sshd\[1778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.205.120
2019-11-26T16:38:16.657746tmaserv sshd\[1778\]: Failed password for invalid user nagoor from 52.231.205.120 port 60900 ssh2
2019-11-26T16:42:17.577643tmaserv sshd\[2033\]: Invalid user backup from 52.231.205.120 port 41086
2019-11-26T16:42:17.584474tmaserv sshd\[2033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.231.205.120
2019-11-26T16:42:19.806885tmaserv sshd\[2033\]: Failed password for invalid user backup from 52.231.205.120 port 41086 ssh2
...
2019-11-27 01:27:27
78.138.184.127 attack
Unauthorized connection attempt from IP address 78.138.184.127 on Port 445(SMB)
2019-11-27 00:59:57
218.94.144.101 attack
Port 1433 Scan
2019-11-27 01:28:05
222.186.180.147 attackspambots
Nov 26 14:09:09 firewall sshd[23095]: Failed password for root from 222.186.180.147 port 9688 ssh2
Nov 26 14:09:12 firewall sshd[23095]: Failed password for root from 222.186.180.147 port 9688 ssh2
Nov 26 14:09:16 firewall sshd[23095]: Failed password for root from 222.186.180.147 port 9688 ssh2
...
2019-11-27 01:15:33
123.233.246.52 attackspambots
Bruteforce on smtp
2019-11-27 00:49:08
175.204.91.168 attackspam
2019-11-26T17:57:37.514762tmaserv sshd\[5577\]: Failed password for root from 175.204.91.168 port 43366 ssh2
2019-11-26T18:57:40.426349tmaserv sshd\[8381\]: Invalid user squid from 175.204.91.168 port 45798
2019-11-26T18:57:40.431262tmaserv sshd\[8381\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.204.91.168
2019-11-26T18:57:42.466755tmaserv sshd\[8381\]: Failed password for invalid user squid from 175.204.91.168 port 45798 ssh2
2019-11-26T19:04:53.181769tmaserv sshd\[8712\]: Invalid user dieplinger from 175.204.91.168 port 53148
2019-11-26T19:04:53.190611tmaserv sshd\[8712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.204.91.168
...
2019-11-27 01:28:56
171.251.36.189 attackbots
Automatic report - Port Scan Attack
2019-11-27 01:08:27
52.35.136.194 attackspam
11/26/2019-18:16:02.795981 52.35.136.194 Protocol: 6 SURICATA TLS invalid record/traffic
2019-11-27 01:16:11
163.5.55.58 attackbotsspam
Lines containing failures of 163.5.55.58
2019-11-26 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=163.5.55.58
2019-11-27 00:47:03
119.196.83.22 attackbots
Nov 26 17:58:07 vpn01 sshd[1601]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.196.83.22
Nov 26 17:58:09 vpn01 sshd[1601]: Failed password for invalid user tui from 119.196.83.22 port 36238 ssh2
...
2019-11-27 01:23:17
112.85.42.176 attackspam
Nov 26 20:23:23 server sshd\[1408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Nov 26 20:23:24 server sshd\[1415\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Nov 26 20:23:24 server sshd\[1417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
Nov 26 20:23:25 server sshd\[1408\]: Failed password for root from 112.85.42.176 port 42400 ssh2
Nov 26 20:23:26 server sshd\[1415\]: Failed password for root from 112.85.42.176 port 48715 ssh2
...
2019-11-27 01:29:32
200.12.213.124 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/200.12.213.124/ 
 
 PA - 1H : (3)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : PA 
 NAME ASN : ASN27796 
 
 IP : 200.12.213.124 
 
 CIDR : 200.12.213.0/24 
 
 PREFIX COUNT : 31 
 
 UNIQUE IP COUNT : 7936 
 
 
 ATTACKS DETECTED ASN27796 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-26 15:44:53 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-11-27 01:22:44
170.239.220.70 attack
Nov 26 17:20:27 ArkNodeAT sshd\[17983\]: Invalid user brian from 170.239.220.70
Nov 26 17:20:27 ArkNodeAT sshd\[17983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.239.220.70
Nov 26 17:20:29 ArkNodeAT sshd\[17983\]: Failed password for invalid user brian from 170.239.220.70 port 50862 ssh2
2019-11-27 01:11:35

Recently Reported IPs

79.243.55.231 36.176.196.252 151.235.40.30 43.248.106.32
114.207.198.107 216.64.93.34 134.39.42.215 160.93.177.0
211.50.112.127 90.199.244.78 120.2.38.57 45.207.152.126
171.108.222.18 105.136.139.189 186.76.196.190 49.185.119.66
79.15.104.14 113.228.183.64 194.242.159.97 207.8.148.148