Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.44.68.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47720
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;145.44.68.67.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 17:39:22 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 67.68.44.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.68.44.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.213.35.211 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:18.
2019-09-28 01:17:53
35.239.114.9 attackbots
mail auth brute force
2019-09-28 01:38:20
103.31.14.122 attack
" "
2019-09-28 02:04:21
120.86.94.184 attackspam
firewall-block, port(s): 22/tcp
2019-09-28 01:14:10
104.199.174.199 attackbotsspam
2019-09-27T11:26:03.9864341495-001 sshd\[52952\]: Failed password for invalid user ts from 104.199.174.199 port 64940 ssh2
2019-09-27T11:37:54.3247991495-001 sshd\[53886\]: Invalid user odoo9 from 104.199.174.199 port 60748
2019-09-27T11:37:54.3317971495-001 sshd\[53886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.174.199.104.bc.googleusercontent.com
2019-09-27T11:37:56.1174481495-001 sshd\[53886\]: Failed password for invalid user odoo9 from 104.199.174.199 port 60748 ssh2
2019-09-27T11:41:54.7321241495-001 sshd\[54189\]: Invalid user um from 104.199.174.199 port 38035
2019-09-27T11:41:54.7351621495-001 sshd\[54189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.174.199.104.bc.googleusercontent.com
...
2019-09-28 01:54:03
180.119.141.35 attackbots
Sep 25 22:34:08 esmtp postfix/smtpd[21515]: lost connection after AUTH from unknown[180.119.141.35]
Sep 25 22:34:09 esmtp postfix/smtpd[21510]: lost connection after AUTH from unknown[180.119.141.35]
Sep 25 22:34:11 esmtp postfix/smtpd[21518]: lost connection after AUTH from unknown[180.119.141.35]
Sep 25 22:34:12 esmtp postfix/smtpd[21607]: lost connection after AUTH from unknown[180.119.141.35]
Sep 25 22:34:13 esmtp postfix/smtpd[21510]: lost connection after AUTH from unknown[180.119.141.35]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=180.119.141.35
2019-09-28 01:38:02
81.4.106.152 attackbotsspam
Sep 27 07:09:10 hanapaa sshd\[12114\]: Invalid user dt from 81.4.106.152
Sep 27 07:09:10 hanapaa sshd\[12114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.106.152
Sep 27 07:09:12 hanapaa sshd\[12114\]: Failed password for invalid user dt from 81.4.106.152 port 33938 ssh2
Sep 27 07:13:07 hanapaa sshd\[12448\]: Invalid user vps from 81.4.106.152
Sep 27 07:13:07 hanapaa sshd\[12448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.4.106.152
2019-09-28 01:41:15
125.212.247.15 attackspam
SSH brutforce
2019-09-28 01:39:58
125.213.135.238 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 27-09-2019 13:10:18.
2019-09-28 01:17:31
144.217.84.164 attackbotsspam
Sep 27 17:13:36 nextcloud sshd\[30725\]: Invalid user marck from 144.217.84.164
Sep 27 17:13:36 nextcloud sshd\[30725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.84.164
Sep 27 17:13:38 nextcloud sshd\[30725\]: Failed password for invalid user marck from 144.217.84.164 port 45298 ssh2
...
2019-09-28 01:53:08
138.68.185.126 attackspam
$f2bV_matches
2019-09-28 01:30:59
92.9.223.10 attackbotsspam
Invalid user manish from 92.9.223.10 port 37588
2019-09-28 02:07:34
108.58.41.139 attack
Sep 27 19:10:11 vps647732 sshd[19800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.58.41.139
Sep 27 19:10:13 vps647732 sshd[19800]: Failed password for invalid user oxy from 108.58.41.139 port 2913 ssh2
...
2019-09-28 01:30:20
203.192.231.218 attackspambots
Sep 27 07:35:58 lcprod sshd\[6264\]: Invalid user admin from 203.192.231.218
Sep 27 07:35:58 lcprod sshd\[6264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.192.231.218
Sep 27 07:36:00 lcprod sshd\[6264\]: Failed password for invalid user admin from 203.192.231.218 port 31459 ssh2
Sep 27 07:40:23 lcprod sshd\[6951\]: Invalid user test from 203.192.231.218
Sep 27 07:40:23 lcprod sshd\[6951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.192.231.218
2019-09-28 01:51:17
193.70.39.175 attack
2019-09-27T15:51:50.786360lon01.zurich-datacenter.net sshd\[15565\]: Invalid user nm from 193.70.39.175 port 32814
2019-09-27T15:51:50.798562lon01.zurich-datacenter.net sshd\[15565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.ip-193-70-39.eu
2019-09-27T15:51:52.899175lon01.zurich-datacenter.net sshd\[15565\]: Failed password for invalid user nm from 193.70.39.175 port 32814 ssh2
2019-09-27T15:55:35.925763lon01.zurich-datacenter.net sshd\[15665\]: Invalid user ts3bot3 from 193.70.39.175 port 45562
2019-09-27T15:55:35.933644lon01.zurich-datacenter.net sshd\[15665\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.ip-193-70-39.eu
...
2019-09-28 01:34:48

Recently Reported IPs

132.70.4.139 248.86.25.196 125.9.211.145 203.191.108.25
145.146.120.4 47.93.157.186 253.82.19.43 45.221.248.2
161.137.5.193 203.159.219.117 213.215.155.83 135.229.235.195
104.189.94.53 65.110.203.11 76.43.164.65 213.237.242.152
99.207.75.189 133.109.121.232 228.75.232.38 21.75.14.235