Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shanghai

Region: Shanghai

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.68.205.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20189
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.68.205.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030601 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 12:32:57 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 169.205.68.81.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 169.205.68.81.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.56.117.130 attackbots
Aug 27 01:39:37 rpi sshd[8203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.117.130 
Aug 27 01:39:39 rpi sshd[8203]: Failed password for invalid user jesse from 58.56.117.130 port 30960 ssh2
2019-08-27 10:47:27
94.15.4.86 attackbots
Automatic report - Banned IP Access
2019-08-27 10:36:50
174.138.21.117 attackbots
Aug 27 03:12:40 game-panel sshd[11093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.117
Aug 27 03:12:42 game-panel sshd[11093]: Failed password for invalid user test from 174.138.21.117 port 54594 ssh2
Aug 27 03:17:23 game-panel sshd[11267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.21.117
2019-08-27 11:18:50
123.207.140.248 attackspambots
Aug 26 16:47:31 php2 sshd\[14858\]: Invalid user 123456 from 123.207.140.248
Aug 26 16:47:31 php2 sshd\[14858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.140.248
Aug 26 16:47:33 php2 sshd\[14858\]: Failed password for invalid user 123456 from 123.207.140.248 port 51406 ssh2
Aug 26 16:52:45 php2 sshd\[15260\]: Invalid user cas from 123.207.140.248
Aug 26 16:52:45 php2 sshd\[15260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.140.248
2019-08-27 10:57:50
182.48.106.205 attackbots
Aug 27 04:54:41 v22019058497090703 sshd[12294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.48.106.205
Aug 27 04:54:43 v22019058497090703 sshd[12294]: Failed password for invalid user ubuntu from 182.48.106.205 port 38143 ssh2
Aug 27 04:59:59 v22019058497090703 sshd[12682]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.48.106.205
...
2019-08-27 11:17:43
51.38.133.58 attack
Aug 27 02:40:48 hcbbdb sshd\[19463\]: Invalid user user from 51.38.133.58
Aug 27 02:40:48 hcbbdb sshd\[19463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.ip-51-38-133.eu
Aug 27 02:40:50 hcbbdb sshd\[19463\]: Failed password for invalid user user from 51.38.133.58 port 47064 ssh2
Aug 27 02:44:54 hcbbdb sshd\[19883\]: Invalid user lijy from 51.38.133.58
Aug 27 02:44:54 hcbbdb sshd\[19883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.ip-51-38-133.eu
2019-08-27 10:50:48
107.170.138.54 attackbots
[munged]::443 107.170.138.54 - - [27/Aug/2019:01:39:23 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 107.170.138.54 - - [27/Aug/2019:01:39:26 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 107.170.138.54 - - [27/Aug/2019:01:39:29 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 107.170.138.54 - - [27/Aug/2019:01:39:33 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 107.170.138.54 - - [27/Aug/2019:01:39:35 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
[munged]::443 107.170.138.54 - - [27/Aug/2019:01:39:37 +0200] "POST /[munged]: HTTP/1.1" 200 9080 "-" "Mozilla/5.0 (X11
2019-08-27 10:38:11
139.199.168.184 attackspam
Aug 27 05:45:34 srv-4 sshd\[23448\]: Invalid user P@ssw0rd from 139.199.168.184
Aug 27 05:45:34 srv-4 sshd\[23448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.168.184
Aug 27 05:45:36 srv-4 sshd\[23448\]: Failed password for invalid user P@ssw0rd from 139.199.168.184 port 40960 ssh2
...
2019-08-27 11:13:25
92.222.216.81 attackspam
Aug 26 14:52:49 friendsofhawaii sshd\[1184\]: Invalid user worker1 from 92.222.216.81
Aug 26 14:52:49 friendsofhawaii sshd\[1184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.ip-92-222-216.eu
Aug 26 14:52:50 friendsofhawaii sshd\[1184\]: Failed password for invalid user worker1 from 92.222.216.81 port 34104 ssh2
Aug 26 14:56:45 friendsofhawaii sshd\[1563\]: Invalid user tom from 92.222.216.81
Aug 26 14:56:45 friendsofhawaii sshd\[1563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.ip-92-222-216.eu
2019-08-27 11:14:10
218.104.231.2 attack
Aug 26 21:02:43 vps200512 sshd\[11618\]: Invalid user chu from 218.104.231.2
Aug 26 21:02:43 vps200512 sshd\[11618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.231.2
Aug 26 21:02:45 vps200512 sshd\[11618\]: Failed password for invalid user chu from 218.104.231.2 port 12175 ssh2
Aug 26 21:06:11 vps200512 sshd\[11695\]: Invalid user caj from 218.104.231.2
Aug 26 21:06:11 vps200512 sshd\[11695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.231.2
2019-08-27 10:35:29
165.22.218.93 attackspambots
Aug 26 16:57:39 aiointranet sshd\[22233\]: Invalid user louis from 165.22.218.93
Aug 26 16:57:39 aiointranet sshd\[22233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.218.93
Aug 26 16:57:41 aiointranet sshd\[22233\]: Failed password for invalid user louis from 165.22.218.93 port 52776 ssh2
Aug 26 17:04:34 aiointranet sshd\[22829\]: Invalid user michele from 165.22.218.93
Aug 26 17:04:34 aiointranet sshd\[22829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.218.93
2019-08-27 11:19:59
27.191.209.93 attack
Aug 26 22:56:59 vps200512 sshd\[15421\]: Invalid user weblogic from 27.191.209.93
Aug 26 22:56:59 vps200512 sshd\[15421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.191.209.93
Aug 26 22:57:01 vps200512 sshd\[15421\]: Failed password for invalid user weblogic from 27.191.209.93 port 55403 ssh2
Aug 26 23:01:57 vps200512 sshd\[15545\]: Invalid user guest2 from 27.191.209.93
Aug 26 23:01:57 vps200512 sshd\[15545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.191.209.93
2019-08-27 11:05:44
76.74.170.93 attackspambots
Aug 27 05:42:20 srv-4 sshd\[23278\]: Invalid user cj from 76.74.170.93
Aug 27 05:42:20 srv-4 sshd\[23278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.74.170.93
Aug 27 05:42:22 srv-4 sshd\[23278\]: Failed password for invalid user cj from 76.74.170.93 port 54685 ssh2
...
2019-08-27 10:53:36
83.243.72.173 attackspam
Aug 26 21:15:17 aat-srv002 sshd[1497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.243.72.173
Aug 26 21:15:18 aat-srv002 sshd[1497]: Failed password for invalid user williams from 83.243.72.173 port 57128 ssh2
Aug 26 21:19:34 aat-srv002 sshd[1619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.243.72.173
Aug 26 21:19:36 aat-srv002 sshd[1619]: Failed password for invalid user postgres from 83.243.72.173 port 51490 ssh2
...
2019-08-27 10:45:14
116.202.25.67 attackbots
Wordpress attack
2019-08-27 11:22:25

Recently Reported IPs

16.225.157.222 69.66.33.251 201.89.66.111 41.109.25.8
169.175.131.167 219.103.81.34 15.220.233.253 234.79.237.14
182.131.107.125 79.133.42.40 124.15.223.145 174.26.81.210
90.239.238.148 115.51.230.80 121.239.17.7 30.56.134.171
50.196.72.42 4.41.43.86 182.148.211.3 255.15.1.205