Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.145.194.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32070
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.145.194.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 04:03:51 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 68.194.145.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.194.145.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.162.217.138 attack
Feb 20 21:10:15 wbs sshd\[11528\]: Invalid user vmail from 202.162.217.138
Feb 20 21:10:15 wbs sshd\[11528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.162.217.138
Feb 20 21:10:16 wbs sshd\[11528\]: Failed password for invalid user vmail from 202.162.217.138 port 51454 ssh2
Feb 20 21:11:57 wbs sshd\[11648\]: Invalid user test from 202.162.217.138
Feb 20 21:11:57 wbs sshd\[11648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.162.217.138
2020-02-21 18:55:52
190.185.131.3 attackbots
Port probing on unauthorized port 8080
2020-02-21 18:33:18
198.211.123.196 attackspam
Feb 21 11:07:02 ns382633 sshd\[10765\]: Invalid user mapred from 198.211.123.196 port 40570
Feb 21 11:07:02 ns382633 sshd\[10765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.123.196
Feb 21 11:07:04 ns382633 sshd\[10765\]: Failed password for invalid user mapred from 198.211.123.196 port 40570 ssh2
Feb 21 11:20:07 ns382633 sshd\[13092\]: Invalid user jyc from 198.211.123.196 port 35018
Feb 21 11:20:07 ns382633 sshd\[13092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.123.196
2020-02-21 18:57:55
51.75.18.215 attackspambots
Feb 21 08:09:09 raspberrypi sshd\[19234\]: Invalid user node from 51.75.18.215Feb 21 08:09:10 raspberrypi sshd\[19237\]: Invalid user reyes143 from 51.75.18.215Feb 21 08:09:11 raspberrypi sshd\[19242\]: Invalid user Sarah143 from 51.75.18.215Feb 21 08:09:11 raspberrypi sshd\[19234\]: Failed password for invalid user node from 51.75.18.215 port 38134 ssh2Feb 21 08:09:12 raspberrypi sshd\[19244\]: Invalid user ftpuser from 51.75.18.215
...
2020-02-21 18:30:29
104.156.237.231 attackbots
xmlrpc attack
2020-02-21 18:47:57
192.210.198.178 attackspam
02/20/2020-23:50:48.067268 192.210.198.178 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-21 18:34:27
188.240.220.58 attack
Fail2Ban Ban Triggered
2020-02-21 18:20:02
218.78.10.183 attack
Feb 21 02:58:59 firewall sshd[17932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.10.183
Feb 21 02:58:59 firewall sshd[17932]: Invalid user fangjn from 218.78.10.183
Feb 21 02:59:01 firewall sshd[17932]: Failed password for invalid user fangjn from 218.78.10.183 port 50792 ssh2
...
2020-02-21 18:38:10
61.216.60.126 attackspam
port scan and connect, tcp 23 (telnet)
2020-02-21 18:36:45
139.59.94.225 attack
$f2bV_matches
2020-02-21 18:27:55
153.139.239.41 attack
$f2bV_matches
2020-02-21 18:58:50
83.97.20.213 attackbotsspam
firewall-block, port(s): 11211/udp
2020-02-21 18:43:33
139.28.206.11 attackbotsspam
Brute-force attempt banned
2020-02-21 18:32:28
218.92.0.178 attack
2020-02-21T11:48:38.194733centos sshd\[3019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.178  user=root
2020-02-21T11:48:39.909239centos sshd\[3019\]: Failed password for root from 218.92.0.178 port 29668 ssh2
2020-02-21T11:48:43.025399centos sshd\[3019\]: Failed password for root from 218.92.0.178 port 29668 ssh2
2020-02-21 18:49:31
139.59.128.23 attack
Feb 20 17:47:35 XXX sshd[27452]: Did not receive identification string from 139.59.128.23
Feb 20 17:47:51 XXX sshd[27589]: User r.r from 139.59.128.23 not allowed because none of user's groups are listed in AllowGroups
Feb 20 17:47:51 XXX sshd[27589]: Received disconnect from 139.59.128.23: 11: Normal Shutdown, Thank you for playing [preauth]
Feb 20 17:48:04 XXX sshd[27595]: Invalid user oracle from 139.59.128.23
Feb 20 17:48:04 XXX sshd[27595]: Received disconnect from 139.59.128.23: 11: Normal Shutdown, Thank you for playing [preauth]
Feb 20 17:48:15 XXX sshd[27599]: User r.r from 139.59.128.23 not allowed because none of user's groups are listed in AllowGroups
Feb 20 17:48:15 XXX sshd[27599]: Received disconnect from 139.59.128.23: 11: Normal Shutdown, Thank you for playing [preauth]
Feb 20 17:48:27 XXX sshd[27601]: User postgres from 139.59.128.23 not allowed because none of user's groups are listed in AllowGroups
Feb 20 17:48:27 XXX sshd[27601]: Received disconnect........
-------------------------------
2020-02-21 18:53:27

Recently Reported IPs

62.109.210.248 131.143.124.126 205.141.55.145 36.151.130.89
18.215.89.90 172.44.176.102 171.25.230.20 121.183.161.125
124.200.167.100 219.125.198.10 99.46.84.210 225.125.172.21
95.46.32.23 51.40.125.217 231.102.74.80 169.233.131.89
222.196.223.85 165.177.178.100 163.150.164.217 156.109.190.144