Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: KPN

Hostname: unknown

Organization: KPN B.V.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.68.34.5
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10366
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;92.68.34.5.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019060500 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Jun 06 01:18:56 CST 2019
;; MSG SIZE  rcvd: 114

Host info
5.34.68.92.in-addr.arpa domain name pointer static.kpn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 5.34.68.92.in-addr.arpa.: No answer

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.69 attackbotsspam
2020-07-19T10:01:10.994484shield sshd\[23404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
2020-07-19T10:01:12.807169shield sshd\[23404\]: Failed password for root from 49.88.112.69 port 42193 ssh2
2020-07-19T10:01:15.276962shield sshd\[23404\]: Failed password for root from 49.88.112.69 port 42193 ssh2
2020-07-19T10:01:17.357793shield sshd\[23404\]: Failed password for root from 49.88.112.69 port 42193 ssh2
2020-07-19T10:01:53.586154shield sshd\[23579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.69  user=root
2020-07-19 18:09:43
61.177.172.177 attack
Jul 19 11:53:45 roki-contabo sshd\[15157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
Jul 19 11:53:47 roki-contabo sshd\[15157\]: Failed password for root from 61.177.172.177 port 4224 ssh2
Jul 19 11:54:07 roki-contabo sshd\[15159\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
Jul 19 11:54:08 roki-contabo sshd\[15159\]: Failed password for root from 61.177.172.177 port 28687 ssh2
Jul 19 11:54:29 roki-contabo sshd\[15167\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.177  user=root
...
2020-07-19 18:07:44
222.76.203.58 attackbotsspam
(sshd) Failed SSH login from 222.76.203.58 (CN/China/-): 5 in the last 3600 secs
2020-07-19 17:44:40
88.116.119.140 attackspam
Jul 19 11:18:25 fhem-rasp sshd[15209]: Invalid user salvador from 88.116.119.140 port 55712
...
2020-07-19 17:50:37
203.115.105.94 attack
20/7/19@03:53:42: FAIL: Alarm-Network address from=203.115.105.94
...
2020-07-19 18:12:19
185.143.73.33 attackspambots
2020-07-19 10:14:47 auth_plain authenticator failed for (User) [185.143.73.33]: 535 Incorrect authentication data (set_id=dav@csmailer.org)
2020-07-19 10:15:12 auth_plain authenticator failed for (User) [185.143.73.33]: 535 Incorrect authentication data (set_id=thx1138@csmailer.org)
2020-07-19 10:15:38 auth_plain authenticator failed for (User) [185.143.73.33]: 535 Incorrect authentication data (set_id=discard@csmailer.org)
2020-07-19 10:16:03 auth_plain authenticator failed for (User) [185.143.73.33]: 535 Incorrect authentication data (set_id=widget_number@csmailer.org)
2020-07-19 10:16:24 auth_plain authenticator failed for (User) [185.143.73.33]: 535 Incorrect authentication data (set_id=aulas@csmailer.org)
...
2020-07-19 18:12:37
175.158.55.146 attackspam
175.158.55.146 - - [19/Jul/2020:09:54:21 +0200] "GET /awstats.pl?lang=en&output=main HTTP/1.0" 404 280 "https://oraux.pnzone.net/" "Mozilla/5.0 (X11; CrOS x86_64 10176.72.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.167 Safari/537.36"
2020-07-19 17:41:38
118.24.102.148 attackbotsspam
Jul 19 07:53:56 scw-tender-jepsen sshd[2673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.102.148
Jul 19 07:53:58 scw-tender-jepsen sshd[2673]: Failed password for invalid user daniel from 118.24.102.148 port 55388 ssh2
2020-07-19 18:00:52
180.76.177.2 attackbots
Jul 19 11:33:01 vserver sshd\[6600\]: Invalid user cy from 180.76.177.2Jul 19 11:33:02 vserver sshd\[6600\]: Failed password for invalid user cy from 180.76.177.2 port 37090 ssh2Jul 19 11:37:26 vserver sshd\[6656\]: Invalid user hmsftp from 180.76.177.2Jul 19 11:37:28 vserver sshd\[6656\]: Failed password for invalid user hmsftp from 180.76.177.2 port 56356 ssh2
...
2020-07-19 18:01:57
61.177.172.102 attack
Jul 19 09:44:07 marvibiene sshd[63123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.102  user=root
Jul 19 09:44:09 marvibiene sshd[63123]: Failed password for root from 61.177.172.102 port 37666 ssh2
Jul 19 09:44:11 marvibiene sshd[63123]: Failed password for root from 61.177.172.102 port 37666 ssh2
Jul 19 09:44:07 marvibiene sshd[63123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.102  user=root
Jul 19 09:44:09 marvibiene sshd[63123]: Failed password for root from 61.177.172.102 port 37666 ssh2
Jul 19 09:44:11 marvibiene sshd[63123]: Failed password for root from 61.177.172.102 port 37666 ssh2
...
2020-07-19 17:49:38
185.143.73.48 attack
2020-07-19 09:58:36 auth_plain authenticator failed for (User) [185.143.73.48]: 535 Incorrect authentication data (set_id=finn@csmailer.org)
2020-07-19 09:59:07 auth_plain authenticator failed for (User) [185.143.73.48]: 535 Incorrect authentication data (set_id=angola@csmailer.org)
2020-07-19 09:59:35 auth_plain authenticator failed for (User) [185.143.73.48]: 535 Incorrect authentication data (set_id=beeper@csmailer.org)
2020-07-19 10:00:03 auth_plain authenticator failed for (User) [185.143.73.48]: 535 Incorrect authentication data (set_id=popup@csmailer.org)
2020-07-19 10:00:31 auth_plain authenticator failed for (User) [185.143.73.48]: 535 Incorrect authentication data (set_id=filepath@csmailer.org)
...
2020-07-19 17:58:08
182.162.104.153 attackspambots
2020-07-19T11:37:20.278357afi-git.jinr.ru sshd[25710]: Invalid user bld from 182.162.104.153 port 32701
2020-07-19T11:37:20.281775afi-git.jinr.ru sshd[25710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.104.153
2020-07-19T11:37:20.278357afi-git.jinr.ru sshd[25710]: Invalid user bld from 182.162.104.153 port 32701
2020-07-19T11:37:22.883059afi-git.jinr.ru sshd[25710]: Failed password for invalid user bld from 182.162.104.153 port 32701 ssh2
2020-07-19T11:41:45.773198afi-git.jinr.ru sshd[26810]: Invalid user silvana from 182.162.104.153 port 47084
...
2020-07-19 17:46:23
159.65.30.66 attackbots
Jul 19 08:17:08 scw-tender-jepsen sshd[3347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.30.66
Jul 19 08:17:10 scw-tender-jepsen sshd[3347]: Failed password for invalid user pankaj from 159.65.30.66 port 54274 ssh2
2020-07-19 18:11:15
211.90.39.117 attack
$f2bV_matches
2020-07-19 18:11:57
112.85.42.200 attackbotsspam
$f2bV_matches
2020-07-19 18:05:45

Recently Reported IPs

176.67.84.186 131.90.179.55 14.243.153.98 114.240.66.191
81.148.254.217 117.240.183.251 72.23.92.80 128.199.43.250
124.135.25.11 188.246.51.164 209.125.61.208 144.121.119.222
70.49.200.204 93.34.132.187 136.251.125.133 179.27.70.171
214.138.92.192 31.208.192.15 70.76.185.214 185.94.99.234