Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: SURFnet bv

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.149.11.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17341
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.149.11.68.			IN	A

;; AUTHORITY SECTION:
.			2153	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080701 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu Aug 08 04:06:56 CST 2019
;; MSG SIZE  rcvd: 117
Host info
68.11.149.145.in-addr.arpa domain name pointer 145.149.EARLY-REGISTRATION.of.SURFnet.invalid.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
68.11.149.145.in-addr.arpa	name = 145.149.EARLY-REGISTRATION.of.SURFnet.invalid.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
101.255.122.9 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-23 22:09:39
121.131.107.129 attackspam
Unauthorized connection attempt detected from IP address 121.131.107.129 to port 23
2020-02-23 22:24:34
5.38.151.48 attack
Honeypot attack, port: 81, PTR: 05269730.dsl.pool.telekom.hu.
2020-02-23 22:24:08
37.49.225.172 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 37.49.225.172 (-): 5 in the last 3600 secs - Thu Jun 28 17:26:53 2018
2020-02-23 21:56:57
61.187.147.92 attackspambots
Brute force blocker - service: proftpd1, proftpd2 - aantal: 58 - Thu Jun 28 19:40:15 2018
2020-02-23 21:46:25
191.130.1.27 attackspambots
Honeypot attack, port: 445, PTR: 27.1.130.191.isp.timbrasil.com.br.
2020-02-23 22:28:52
37.49.225.250 attack
lfd: (smtpauth) Failed SMTP AUTH login from 37.49.225.250 (NL/Netherlands/-): 5 in the last 3600 secs - Thu Jun 28 07:05:57 2018
2020-02-23 21:58:13
90.73.7.138 attackbots
Feb 23 03:41:14 web9 sshd\[21689\]: Invalid user frodo from 90.73.7.138
Feb 23 03:41:15 web9 sshd\[21689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.73.7.138
Feb 23 03:41:17 web9 sshd\[21689\]: Failed password for invalid user frodo from 90.73.7.138 port 39216 ssh2
Feb 23 03:44:20 web9 sshd\[22143\]: Invalid user cpanellogin from 90.73.7.138
Feb 23 03:44:20 web9 sshd\[22143\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.73.7.138
2020-02-23 21:53:43
66.115.173.18 attackspam
66.115.173.18 - - [23/Feb/2020:13:28:35 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
66.115.173.18 - - [23/Feb/2020:13:28:36 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-02-23 22:31:22
183.91.11.75 attackspambots
Automatic report - XMLRPC Attack
2020-02-23 21:52:50
23.254.209.173 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 23.254.209.173 (US/United States/hwsrv-286745.hostwindsdns.com): 5 in the last 3600 secs - Wed Jun 27 20:07:08 2018
2020-02-23 22:05:43
221.220.109.166 attack
Brute force blocker - service: proftpd1 - aantal: 145 - Wed Jun 27 13:55:16 2018
2020-02-23 22:09:08
222.186.175.181 attackspambots
Feb 23 15:14:30 h2177944 sshd\[20543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.181  user=root
Feb 23 15:14:33 h2177944 sshd\[20543\]: Failed password for root from 222.186.175.181 port 40173 ssh2
Feb 23 15:14:36 h2177944 sshd\[20543\]: Failed password for root from 222.186.175.181 port 40173 ssh2
Feb 23 15:14:39 h2177944 sshd\[20543\]: Failed password for root from 222.186.175.181 port 40173 ssh2
...
2020-02-23 22:27:30
104.245.97.42 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 104.245.97.42 (ns2.racklot.com): 5 in the last 3600 secs - Thu Jun 28 22:57:28 2018
2020-02-23 21:45:55
180.157.90.94 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-23 21:55:11

Recently Reported IPs

31.92.74.185 12.235.155.169 131.253.88.47 213.139.205.242
66.183.235.49 38.183.193.155 12.177.37.163 2001:2d8:6711:64b7::19d:8fa6
210.71.232.140 74.96.149.204 14.7.238.101 17.253.219.44
202.138.248.62 250.230.85.103 97.175.186.6 226.224.214.229
237.112.16.209 32.132.124.4 112.0.210.78 166.225.15.18