Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.13.68.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22370
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.13.68.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 14:41:40 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 195.68.13.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.68.13.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
211.144.122.42 attack
Nov  9 08:22:28 hcbbdb sshd\[26240\]: Invalid user dude from 211.144.122.42
Nov  9 08:22:28 hcbbdb sshd\[26240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.144.122.42
Nov  9 08:22:30 hcbbdb sshd\[26240\]: Failed password for invalid user dude from 211.144.122.42 port 35766 ssh2
Nov  9 08:28:31 hcbbdb sshd\[26861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.144.122.42  user=root
Nov  9 08:28:33 hcbbdb sshd\[26861\]: Failed password for root from 211.144.122.42 port 39716 ssh2
2019-11-09 16:38:15
222.186.175.140 attackbotsspam
2019-11-09T09:24:57.169667scmdmz1 sshd\[25188\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.140  user=root
2019-11-09T09:24:59.323766scmdmz1 sshd\[25188\]: Failed password for root from 222.186.175.140 port 45720 ssh2
2019-11-09T09:25:03.290890scmdmz1 sshd\[25188\]: Failed password for root from 222.186.175.140 port 45720 ssh2
...
2019-11-09 16:41:46
185.175.93.45 attackspam
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-11-09 17:09:33
138.197.199.249 attack
k+ssh-bruteforce
2019-11-09 16:59:30
61.216.15.225 attackspambots
Nov  9 04:29:27 firewall sshd[23253]: Failed password for invalid user fengjian from 61.216.15.225 port 48160 ssh2
Nov  9 04:33:55 firewall sshd[23318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.15.225  user=root
Nov  9 04:33:57 firewall sshd[23318]: Failed password for root from 61.216.15.225 port 58230 ssh2
...
2019-11-09 17:02:25
222.87.147.62 attack
Nov  9 02:57:00 master sshd[31920]: Failed password for root from 222.87.147.62 port 51846 ssh2
2019-11-09 16:50:57
46.229.168.134 attackbotsspam
Malicious Traffic/Form Submission
2019-11-09 16:43:19
184.168.46.199 attackspam
Automatic report - XMLRPC Attack
2019-11-09 16:26:14
168.232.197.5 attack
2019-11-09T06:26:28.150119homeassistant sshd[19485]: Invalid user zimbra from 168.232.197.5 port 40632
2019-11-09T06:26:28.166307homeassistant sshd[19485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.232.197.5
...
2019-11-09 17:06:41
73.94.192.215 attackspambots
Nov  9 09:43:38 serwer sshd\[28875\]: Invalid user pi from 73.94.192.215 port 57220
Nov  9 09:43:38 serwer sshd\[28875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.94.192.215
Nov  9 09:43:38 serwer sshd\[28877\]: Invalid user pi from 73.94.192.215 port 57226
Nov  9 09:43:38 serwer sshd\[28877\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.94.192.215
...
2019-11-09 17:07:10
46.166.151.47 attackbotsspam
\[2019-11-09 03:48:57\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T03:48:57.087-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146462607509",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/57858",ACLName="no_extension_match"
\[2019-11-09 03:51:56\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T03:51:56.066-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146462607509",SessionID="0x7fdf2c8a8ab8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/51878",ACLName="no_extension_match"
\[2019-11-09 03:54:42\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-09T03:54:42.978-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="00146462607509",SessionID="0x7fdf2cd1cd48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/57877",ACLName="no_exten
2019-11-09 17:01:55
186.236.28.158 attack
Automatic report - Port Scan Attack
2019-11-09 17:08:13
198.8.93.14 attackspam
2019-11-09T09:50:47.486948mail01 postfix/smtpd[26287]: warning: unknown[198.8.93.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-09T09:54:42.263284mail01 postfix/smtpd[26287]: warning: unknown[198.8.93.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-09T09:56:34.114105mail01 postfix/smtpd[26287]: warning: unknown[198.8.93.14]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-09 17:03:25
185.100.251.26 attackspambots
frenzy
2019-11-09 16:49:04
202.51.74.189 attackspam
Nov  9 09:51:04 markkoudstaal sshd[24645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
Nov  9 09:51:07 markkoudstaal sshd[24645]: Failed password for invalid user demodemo from 202.51.74.189 port 50760 ssh2
Nov  9 09:57:27 markkoudstaal sshd[25130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
2019-11-09 17:08:50

Recently Reported IPs

82.67.184.250 31.250.223.104 130.132.119.184 17.181.17.147
93.150.195.23 186.147.186.130 16.62.99.120 136.219.202.136
151.186.32.62 186.250.172.57 218.103.247.62 48.183.240.114
91.219.180.171 216.134.75.29 219.227.167.213 171.54.188.144
205.153.215.235 193.183.171.94 114.253.129.174 177.8.199.246