必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Singapore

运营商(isp): DigitalOcean LLC

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): Data Center/Web Hosting/Transit

用户上报:
类型 评论内容 时间
attackbots
$f2bV_matches
2020-07-27 14:08:39
attackbots
Jul 13 17:23:20 ws12vmsma01 sshd[46941]: Invalid user openvpn from 68.183.236.29
Jul 13 17:23:22 ws12vmsma01 sshd[46941]: Failed password for invalid user openvpn from 68.183.236.29 port 60898 ssh2
Jul 13 17:29:27 ws12vmsma01 sshd[47850]: Invalid user hd from 68.183.236.29
...
2020-07-14 06:17:52
attack
Jul  6 23:30:01 inter-technics sshd[9825]: Invalid user szk from 68.183.236.29 port 43102
Jul  6 23:30:01 inter-technics sshd[9825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29
Jul  6 23:30:01 inter-technics sshd[9825]: Invalid user szk from 68.183.236.29 port 43102
Jul  6 23:30:03 inter-technics sshd[9825]: Failed password for invalid user szk from 68.183.236.29 port 43102 ssh2
Jul  6 23:33:14 inter-technics sshd[10063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29  user=root
Jul  6 23:33:16 inter-technics sshd[10063]: Failed password for root from 68.183.236.29 port 40374 ssh2
...
2020-07-07 07:02:25
attackspam
Jun 30 08:41:29 ajax sshd[21935]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29 
Jun 30 08:41:31 ajax sshd[21935]: Failed password for invalid user minecraft from 68.183.236.29 port 50094 ssh2
2020-06-30 15:58:23
attackspam
Jun 22 04:54:54 l02a sshd[18084]: Invalid user test10 from 68.183.236.29
Jun 22 04:54:54 l02a sshd[18084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29 
Jun 22 04:54:54 l02a sshd[18084]: Invalid user test10 from 68.183.236.29
Jun 22 04:54:56 l02a sshd[18084]: Failed password for invalid user test10 from 68.183.236.29 port 49716 ssh2
2020-06-22 13:00:50
attackbots
Bruteforce detected by fail2ban
2020-06-11 07:40:40
attackspambots
<6 unauthorized SSH connections
2020-06-04 15:10:42
attackbotsspam
Jun  1 12:35:25 web8 sshd\[26927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29  user=root
Jun  1 12:35:27 web8 sshd\[26927\]: Failed password for root from 68.183.236.29 port 45062 ssh2
Jun  1 12:39:32 web8 sshd\[29214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29  user=root
Jun  1 12:39:34 web8 sshd\[29214\]: Failed password for root from 68.183.236.29 port 51282 ssh2
Jun  1 12:43:40 web8 sshd\[31169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29  user=root
2020-06-02 03:43:16
attack
2020-05-30 09:58:35 server sshd[7087]: Failed password for invalid user root from 68.183.236.29 port 49068 ssh2
2020-05-31 05:35:10
attackspam
May 28 06:05:10 propaganda sshd[2792]: Connection from 68.183.236.29 port 42152 on 10.0.0.161 port 22 rdomain ""
May 28 06:05:10 propaganda sshd[2792]: Connection closed by 68.183.236.29 port 42152 [preauth]
2020-05-28 23:00:25
attackspambots
(sshd) Failed SSH login from 68.183.236.29 (SG/Singapore/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 28 14:00:41 amsweb01 sshd[31272]: Invalid user guoyifan from 68.183.236.29 port 37900
Apr 28 14:00:43 amsweb01 sshd[31272]: Failed password for invalid user guoyifan from 68.183.236.29 port 37900 ssh2
Apr 28 14:07:40 amsweb01 sshd[31920]: Invalid user docker from 68.183.236.29 port 50808
Apr 28 14:07:43 amsweb01 sshd[31920]: Failed password for invalid user docker from 68.183.236.29 port 50808 ssh2
Apr 28 14:12:06 amsweb01 sshd[32497]: Invalid user wc from 68.183.236.29 port 33324
2020-04-28 23:43:20
attack
Apr 20 06:35:23 nextcloud sshd\[5374\]: Invalid user test from 68.183.236.29
Apr 20 06:35:23 nextcloud sshd\[5374\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29
Apr 20 06:35:25 nextcloud sshd\[5374\]: Failed password for invalid user test from 68.183.236.29 port 45172 ssh2
2020-04-20 12:38:44
attackspambots
$f2bV_matches
2020-04-04 09:13:59
attackbots
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-03-31 18:39:08
attack
Mar 25 18:56:09 plex sshd[4949]: Invalid user mathilda from 68.183.236.29 port 35042
2020-03-26 02:07:15
attackspam
SSH brute force attempt
2020-03-24 07:55:20
attackbots
SSH Brute-Force Attack
2020-02-29 04:16:01
attackspambots
detected by Fail2Ban
2020-02-17 15:16:50
attackspambots
Feb 11 05:38:58 web9 sshd\[9496\]: Invalid user khl from 68.183.236.29
Feb 11 05:38:58 web9 sshd\[9496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29
Feb 11 05:39:00 web9 sshd\[9496\]: Failed password for invalid user khl from 68.183.236.29 port 59386 ssh2
Feb 11 05:41:21 web9 sshd\[9865\]: Invalid user xu from 68.183.236.29
Feb 11 05:41:21 web9 sshd\[9865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29
2020-02-11 23:48:01
attack
Feb 10 15:57:42 legacy sshd[20684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29
Feb 10 15:57:44 legacy sshd[20684]: Failed password for invalid user bvf from 68.183.236.29 port 42932 ssh2
Feb 10 16:01:13 legacy sshd[20981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29
...
2020-02-10 23:20:56
attackbotsspam
Jan 25 14:25:17 meumeu sshd[25978]: Failed password for root from 68.183.236.29 port 47432 ssh2
Jan 25 14:27:34 meumeu sshd[26292]: Failed password for git from 68.183.236.29 port 39848 ssh2
...
2020-01-25 21:35:09
attackbots
Unauthorized connection attempt detected from IP address 68.183.236.29 to port 2220 [J]
2020-01-21 06:05:30
attack
Jan 19 18:19:26 mout sshd[17691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29  user=root
Jan 19 18:19:28 mout sshd[17691]: Failed password for root from 68.183.236.29 port 51930 ssh2
2020-01-20 03:22:26
attackspam
Jan 18 17:49:35 sso sshd[21449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.29
Jan 18 17:49:38 sso sshd[21449]: Failed password for invalid user bmm from 68.183.236.29 port 33838 ssh2
...
2020-01-19 01:18:19
attackspam
Unauthorized connection attempt detected from IP address 68.183.236.29 to port 2220 [J]
2020-01-18 03:50:37
attackspam
Unauthorized connection attempt detected from IP address 68.183.236.29 to port 2220 [J]
2020-01-16 22:50:30
attackbotsspam
Unauthorized connection attempt detected from IP address 68.183.236.29 to port 2220 [J]
2020-01-14 04:42:33
attack
Unauthorized connection attempt detected from IP address 68.183.236.29 to port 2220 [J]
2020-01-08 08:21:18
attack
...
2020-01-04 15:41:54
attackspambots
$f2bV_matches
2020-01-01 17:56:10
相同子网IP讨论:
IP 类型 评论内容 时间
68.183.236.92 attackbots
2020-10-09 03:09:30 server sshd[49636]: Failed password for invalid user wwwrun from 68.183.236.92 port 50176 ssh2
2020-10-10 01:24:47
68.183.236.92 attackspam
ssh brute force
2020-10-09 17:10:17
68.183.236.92 attack
5x Failed Password
2020-10-06 03:49:23
68.183.236.92 attackspambots
Oct  5 04:02:57 mockhub sshd[533560]: Failed password for root from 68.183.236.92 port 47874 ssh2
Oct  5 04:06:52 mockhub sshd[533678]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92  user=root
Oct  5 04:06:54 mockhub sshd[533678]: Failed password for root from 68.183.236.92 port 53896 ssh2
...
2020-10-05 19:45:19
68.183.236.92 attackbots
Invalid user git from 68.183.236.92 port 60604
2020-09-30 09:10:35
68.183.236.92 attackbotsspam
Invalid user git from 68.183.236.92 port 60604
2020-09-30 02:01:55
68.183.236.92 attackbotsspam
Automatic report BANNED IP
2020-09-29 18:03:26
68.183.236.92 attackspam
Automatic Fail2ban report - Trying login SSH
2020-09-26 03:25:41
68.183.236.92 attack
Sep 25 13:17:21 h2829583 sshd[4352]: Failed password for root from 68.183.236.92 port 35378 ssh2
2020-09-25 19:17:47
68.183.236.92 attackspam
Sep 23 15:32:23 sip sshd[31154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92
Sep 23 15:32:25 sip sshd[31154]: Failed password for invalid user test from 68.183.236.92 port 42268 ssh2
Sep 23 15:41:10 sip sshd[1171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92
2020-09-24 00:33:55
68.183.236.92 attackbotsspam
Sep 23 08:23:33 onepixel sshd[1989773]: Invalid user jenkins from 68.183.236.92 port 45730
Sep 23 08:23:33 onepixel sshd[1989773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92 
Sep 23 08:23:33 onepixel sshd[1989773]: Invalid user jenkins from 68.183.236.92 port 45730
Sep 23 08:23:35 onepixel sshd[1989773]: Failed password for invalid user jenkins from 68.183.236.92 port 45730 ssh2
Sep 23 08:26:49 onepixel sshd[1990245]: Invalid user nagios from 68.183.236.92 port 38634
2020-09-23 16:40:54
68.183.236.92 attackspam
$f2bV_matches
2020-09-23 08:38:31
68.183.236.92 attackbots
Aug 25 15:38:03 pornomens sshd\[18963\]: Invalid user probe from 68.183.236.92 port 54514
Aug 25 15:38:03 pornomens sshd\[18963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.236.92
Aug 25 15:38:05 pornomens sshd\[18963\]: Failed password for invalid user probe from 68.183.236.92 port 54514 ssh2
...
2020-08-25 23:59:55
68.183.236.92 attackspam
Aug 20 23:31:25 server sshd[15224]: Failed password for invalid user jordan from 68.183.236.92 port 34174 ssh2
Aug 20 23:35:26 server sshd[20318]: Failed password for invalid user cmy from 68.183.236.92 port 42494 ssh2
Aug 20 23:39:23 server sshd[25465]: Failed password for root from 68.183.236.92 port 50832 ssh2
2020-08-21 05:44:12
68.183.236.92 attack
Invalid user hyd from 68.183.236.92 port 33908
2020-08-18 14:21:28
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.183.236.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17271
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;68.183.236.29.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070401 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 05 06:27:03 CST 2019
;; MSG SIZE  rcvd: 117
HOST信息:
Host 29.236.183.68.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 29.236.183.68.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
106.12.241.109 attack
Nov 20 23:05:01 home sshd[20986]: Invalid user admin from 106.12.241.109 port 42912
Nov 20 23:05:01 home sshd[20986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.241.109
Nov 20 23:05:01 home sshd[20986]: Invalid user admin from 106.12.241.109 port 42912
Nov 20 23:05:03 home sshd[20986]: Failed password for invalid user admin from 106.12.241.109 port 42912 ssh2
Nov 20 23:13:43 home sshd[21029]: Invalid user guest from 106.12.241.109 port 51324
Nov 20 23:13:43 home sshd[21029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.241.109
Nov 20 23:13:43 home sshd[21029]: Invalid user guest from 106.12.241.109 port 51324
Nov 20 23:13:45 home sshd[21029]: Failed password for invalid user guest from 106.12.241.109 port 51324 ssh2
Nov 20 23:18:13 home sshd[21057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.241.109  user=root
Nov 20 23:18:15 home sshd[21057]: Failed passwor
2019-11-21 14:57:58
134.175.11.143 attack
Nov 18 14:27:13 eola sshd[1713]: Invalid user ozhogin_o from 134.175.11.143 port 43682
Nov 18 14:27:13 eola sshd[1713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.11.143 
Nov 18 14:27:16 eola sshd[1713]: Failed password for invalid user ozhogin_o from 134.175.11.143 port 43682 ssh2
Nov 18 14:27:16 eola sshd[1713]: Received disconnect from 134.175.11.143 port 43682:11: Bye Bye [preauth]
Nov 18 14:27:16 eola sshd[1713]: Disconnected from 134.175.11.143 port 43682 [preauth]
Nov 18 14:46:38 eola sshd[2671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.11.143  user=r.r
Nov 18 14:46:40 eola sshd[2671]: Failed password for r.r from 134.175.11.143 port 45854 ssh2
Nov 18 14:46:40 eola sshd[2671]: Received disconnect from 134.175.11.143 port 45854:11: Bye Bye [preauth]
Nov 18 14:46:40 eola sshd[2671]: Disconnected from 134.175.11.143 port 45854 [preauth]
Nov 18 14:50:26 eola ss........
-------------------------------
2019-11-21 15:13:49
185.176.27.6 attackbots
Nov 21 07:59:54 mc1 kernel: \[5605843.701162\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=56683 PROTO=TCP SPT=49226 DPT=9972 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 21 08:01:57 mc1 kernel: \[5605966.073946\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=18221 PROTO=TCP SPT=49226 DPT=54748 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov 21 08:03:06 mc1 kernel: \[5606035.486818\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.6 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=58019 PROTO=TCP SPT=49226 DPT=37549 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-21 15:15:13
183.16.211.155 attack
Nov2107:29:51server4pure-ftpd:\(\?@183.16.211.155\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2107:29:16server4pure-ftpd:\(\?@183.16.211.155\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2107:29:58server4pure-ftpd:\(\?@183.16.211.155\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2107:30:02server4pure-ftpd:\(\?@183.16.211.155\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2107:29:10server4pure-ftpd:\(\?@183.16.211.155\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2107:29:29server4pure-ftpd:\(\?@183.16.211.155\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2106:38:11server4pure-ftpd:\(\?@110.53.234.166\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2107:29:38server4pure-ftpd:\(\?@183.16.211.155\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2107:29:23server4pure-ftpd:\(\?@183.16.211.155\)[WARNING]Authenticationfailedforuser[yex-swiss]Nov2107:29:45server4pure-ftpd:\(\?@183.16.211.155\)[WARNING]Authenticationfailedforuser[yex-swiss]IPAddressesBlocked:
2019-11-21 15:03:38
103.114.26.18 attack
Automatic report - Port Scan Attack
2019-11-21 15:19:34
201.174.182.159 attackspambots
Nov 21 01:30:30 TORMINT sshd\[10217\]: Invalid user parvesh from 201.174.182.159
Nov 21 01:30:30 TORMINT sshd\[10217\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.174.182.159
Nov 21 01:30:32 TORMINT sshd\[10217\]: Failed password for invalid user parvesh from 201.174.182.159 port 56840 ssh2
...
2019-11-21 14:48:58
181.62.248.12 attackbotsspam
Automatic report - Banned IP Access
2019-11-21 14:51:20
152.136.50.26 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-11-21 15:10:50
111.177.32.83 attackbots
2019-11-21T05:58:07.006364abusebot-4.cloudsearch.cf sshd\[31283\]: Invalid user dilip from 111.177.32.83 port 37308
2019-11-21 14:29:49
116.74.187.42 attackbots
PHI,WP GET /wp-login.php
2019-11-21 15:09:27
52.59.177.95 attack
<7901VHO5.7901VHO5.7901VHO5.JavaMail.tomcat@pdr8-services-05v.prod.affpartners.com> 

Date de création :
20 novembre 2019 
𝐊𝐄𝐓𝐎 𝐁𝐨𝐝𝐲 𝐓𝐨𝐧𝐞  
𝐄̂𝐭𝐞𝐬-𝐯𝐨𝐮𝐬 𝐏𝐫𝐞̂𝐭 𝐏𝐨𝐮𝐫 𝐋𝐚 𝐂𝐞́𝐭𝐨𝐬𝐞 𝐎𝐩𝐭𝐢𝐦𝐚𝐥𝐞 𝐄𝐭 𝐔𝐧𝐞 𝐏𝐞𝐫𝐭𝐞 𝐃𝐞 𝐏𝐨𝐢𝐝𝐬 𝐆𝐚𝐫𝐚𝐧𝐭𝐢𝐞? 
IP 52.59.177.95
2019-11-21 15:21:32
103.56.79.2 attackspam
Nov 21 06:25:55 localhost sshd\[19176\]: Invalid user marlena from 103.56.79.2 port 21850
Nov 21 06:25:55 localhost sshd\[19176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.79.2
Nov 21 06:25:56 localhost sshd\[19176\]: Failed password for invalid user marlena from 103.56.79.2 port 21850 ssh2
Nov 21 06:30:44 localhost sshd\[19313\]: Invalid user 123456 from 103.56.79.2 port 23666
Nov 21 06:30:44 localhost sshd\[19313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.79.2
...
2019-11-21 14:58:15
115.98.237.159 attack
TCP Port Scanning
2019-11-21 14:54:45
220.141.173.70 attackspambots
19/11/21@01:31:00: FAIL: IoT-Telnet address from=220.141.173.70
...
2019-11-21 14:40:05
216.109.50.34 attackspam
Nov 21 08:22:32 pkdns2 sshd\[65352\]: Invalid user 1qaz2xsw3edc from 216.109.50.34Nov 21 08:22:34 pkdns2 sshd\[65352\]: Failed password for invalid user 1qaz2xsw3edc from 216.109.50.34 port 50502 ssh2Nov 21 08:26:16 pkdns2 sshd\[306\]: Invalid user pass321 from 216.109.50.34Nov 21 08:26:18 pkdns2 sshd\[306\]: Failed password for invalid user pass321 from 216.109.50.34 port 59310 ssh2Nov 21 08:29:57 pkdns2 sshd\[414\]: Invalid user nobody1234678 from 216.109.50.34Nov 21 08:29:59 pkdns2 sshd\[414\]: Failed password for invalid user nobody1234678 from 216.109.50.34 port 39880 ssh2
...
2019-11-21 15:04:47

最近上报的IP列表

197.210.55.225 67.205.177.123 45.122.221.122 21.214.90.140
221.140.3.123 137.74.119.106 24.219.27.123 91.246.130.159
89.208.136.134 89.43.23.174 79.118.199.6 54.36.148.80
34.210.3.137 187.62.124.229 12.9.107.85 220.181.108.114
143.171.202.49 80.68.2.48 69.68.129.29 202.47.70.130