Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.74.68.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15806
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.74.68.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 01:58:29 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 145.68.74.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.68.74.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.220.102.6 attack
Triggered by Fail2Ban at Ares web server
2019-07-10 18:22:53
165.22.244.92 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-10 08:43:52,715 INFO [amun_request_handler] PortScan Detected on Port: 3389 (165.22.244.92)
2019-07-10 18:54:21
179.42.201.18 attackspam
Autoban   179.42.201.18 ABORTED AUTH
2019-07-10 18:14:54
196.52.43.95 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-10 18:25:46
121.9.230.26 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-10 08:45:22,500 INFO [amun_request_handler] PortScan Detected on Port: 445 (121.9.230.26)
2019-07-10 18:41:50
195.154.50.13 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-10 18:14:18
183.82.100.107 attackspambots
Honeypot attack, port: 445, PTR: mail.pchmpl.com.
2019-07-10 18:46:11
209.132.232.95 attackbots
Multiple failed RDP login attempts
2019-07-10 18:09:06
157.55.39.248 attackbots
Automatic report - Web App Attack
2019-07-10 18:13:38
142.93.15.1 attackbots
Fail2Ban Ban Triggered
2019-07-10 18:35:32
31.163.132.45 attackspambots
Honeypot attack, port: 23, PTR: ws45.zone31-163-132.zaural.ru.
2019-07-10 18:31:29
88.249.126.73 attackbots
Honeypot attack, port: 23, PTR: 88.249.126.73.static.ttnet.com.tr.
2019-07-10 18:34:59
190.214.25.146 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-10 08:48:56,274 INFO [amun_request_handler] PortScan Detected on Port: 445 (190.214.25.146)
2019-07-10 18:21:59
198.15.73.90 attackbots
[Wordpress bruteforce]
failed pass=[jetsam?]
2019-07-10 18:38:03
177.21.204.237 attackbotsspam
$f2bV_matches
2019-07-10 18:01:21

Recently Reported IPs

128.241.245.210 116.175.254.101 185.106.222.191 196.223.163.242
210.140.136.115 229.102.249.203 39.18.244.44 199.84.184.80
16.57.170.166 107.194.117.197 164.132.121.77 224.90.239.117
55.254.112.159 152.17.92.109 35.24.234.51 25.92.217.62
134.191.1.45 130.24.226.222 81.133.192.151 128.220.136.17