Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.137.68.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46259
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;212.137.68.145.			IN	A

;; AUTHORITY SECTION:
.			500	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110102 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 02 07:37:40 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 145.68.137.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.68.137.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.194.116 attack
Sep 23 16:52:37 eventyay sshd[22529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.194.116
Sep 23 16:52:39 eventyay sshd[22529]: Failed password for invalid user gituser from 178.128.194.116 port 49102 ssh2
Sep 23 16:56:23 eventyay sshd[22592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.194.116
...
2019-09-23 23:18:54
51.68.82.218 attack
2019-09-23T11:33:25.5253521495-001 sshd\[60132\]: Invalid user 00 from 51.68.82.218 port 40478
2019-09-23T11:33:25.5285961495-001 sshd\[60132\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.82.218
2019-09-23T11:33:27.4953361495-001 sshd\[60132\]: Failed password for invalid user 00 from 51.68.82.218 port 40478 ssh2
2019-09-23T11:37:44.7782341495-001 sshd\[60411\]: Invalid user ghm from 51.68.82.218 port 53774
2019-09-23T11:37:44.7824801495-001 sshd\[60411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.82.218
2019-09-23T11:37:47.6416771495-001 sshd\[60411\]: Failed password for invalid user ghm from 51.68.82.218 port 53774 ssh2
...
2019-09-23 23:53:47
114.38.16.201 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/114.38.16.201/ 
 TW - 1H : (2829)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 114.38.16.201 
 
 CIDR : 114.38.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 284 
  3H - 1109 
  6H - 2239 
 12H - 2731 
 24H - 2740 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-23 23:42:02
50.31.8.7 attackbotsspam
50.31.8.7 - - [23/Sep/2019:08:19:30 -0400] "GET /?page=products&action=view&manufacturerID=1&productID=../../etc/passwd%00&linkID=3128 HTTP/1.1" 302 - "https://baldwinbrasshardware.com/?page=products&action=view&manufacturerID=1&productID=../../etc/passwd%00&linkID=3128" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-09-23 23:17:35
200.194.15.128 attackbots
Automatic report - Port Scan Attack
2019-09-23 23:44:05
190.144.135.118 attackspam
Automatic report - Banned IP Access
2019-09-23 23:14:07
114.41.30.212 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/114.41.30.212/ 
 TW - 1H : (2830)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 114.41.30.212 
 
 CIDR : 114.41.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 285 
  3H - 1110 
  6H - 2240 
 12H - 2732 
 24H - 2741 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-23 23:40:30
222.186.52.124 attack
Sep 23 17:10:41 MK-Soft-VM7 sshd[21885]: Failed password for root from 222.186.52.124 port 20692 ssh2
Sep 23 17:10:43 MK-Soft-VM7 sshd[21885]: Failed password for root from 222.186.52.124 port 20692 ssh2
...
2019-09-23 23:15:03
218.92.0.204 attack
2019-09-23T15:17:21.463483abusebot-8.cloudsearch.cf sshd\[15515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2019-09-23 23:25:53
36.236.21.120 attackspambots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/36.236.21.120/ 
 TW - 1H : (2826)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 36.236.21.120 
 
 CIDR : 36.236.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 281 
  3H - 1106 
  6H - 2238 
 12H - 2728 
 24H - 2737 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-23 23:59:31
220.76.107.50 attack
Sep 23 15:21:39 hcbbdb sshd\[12999\]: Invalid user ni from 220.76.107.50
Sep 23 15:21:39 hcbbdb sshd\[12999\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
Sep 23 15:21:41 hcbbdb sshd\[12999\]: Failed password for invalid user ni from 220.76.107.50 port 53514 ssh2
Sep 23 15:26:07 hcbbdb sshd\[13518\]: Invalid user eustaces from 220.76.107.50
Sep 23 15:26:07 hcbbdb sshd\[13518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.107.50
2019-09-23 23:29:53
45.55.177.170 attackspam
Sep 23 02:34:50 auw2 sshd\[2174\]: Invalid user nas from 45.55.177.170
Sep 23 02:34:50 auw2 sshd\[2174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.177.170
Sep 23 02:34:53 auw2 sshd\[2174\]: Failed password for invalid user nas from 45.55.177.170 port 39278 ssh2
Sep 23 02:39:18 auw2 sshd\[2722\]: Invalid user administrador from 45.55.177.170
Sep 23 02:39:18 auw2 sshd\[2722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.177.170
2019-09-23 23:23:58
5.3.6.82 attackbotsspam
2019-09-23T15:13:14.579857abusebot-8.cloudsearch.cf sshd\[15490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82  user=root
2019-09-23 23:37:33
106.12.192.240 attackspam
Sep 23 05:07:36 web9 sshd\[23548\]: Invalid user secretar from 106.12.192.240
Sep 23 05:07:36 web9 sshd\[23548\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.192.240
Sep 23 05:07:38 web9 sshd\[23548\]: Failed password for invalid user secretar from 106.12.192.240 port 38790 ssh2
Sep 23 05:13:38 web9 sshd\[24694\]: Invalid user opensuse from 106.12.192.240
Sep 23 05:13:38 web9 sshd\[24694\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.192.240
2019-09-23 23:36:42
74.73.145.47 attackbots
Sep 23 16:55:29 jane sshd[14358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.73.145.47 
Sep 23 16:55:31 jane sshd[14358]: Failed password for invalid user sofia from 74.73.145.47 port 53120 ssh2
...
2019-09-23 23:48:37

Recently Reported IPs

93.43.35.134 77.15.100.238 75.74.93.109 189.59.87.199
232.119.20.9 187.24.26.189 59.119.215.99 253.197.6.78
185.80.55.151 199.88.228.151 104.25.241.156 196.220.237.230
174.11.29.223 156.67.194.106 173.5.181.231 7.167.234.132
23.238.133.144 123.13.173.162 224.168.148.119 219.69.35.227