Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Campina Grande

Region: Paraíba

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.234.95.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.234.95.68.			IN	A

;; AUTHORITY SECTION:
.			360	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071401 1800 900 604800 86400

;; Query time: 313 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jul 15 09:12:39 CST 2019
;; MSG SIZE  rcvd: 116
Host info
68.95.234.45.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 68.95.234.45.in-addr.arpa.: No answer

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
85.133.69.122 attack
445/tcp
[2019-07-30]1pkt
2019-07-31 03:16:01
89.122.93.157 attack
81/tcp
[2019-07-30]1pkt
2019-07-31 03:04:48
122.242.155.219 attack
Telnet Server BruteForce Attack
2019-07-31 02:48:48
78.128.112.78 attackbots
20 attempts against mh-misbehave-ban on hill.magehost.pro
2019-07-31 03:32:10
45.173.104.18 attack
445/tcp
[2019-07-30]1pkt
2019-07-31 03:03:41
144.135.85.184 attackspambots
Jul 30 18:42:54 MK-Soft-VM5 sshd\[21902\]: Invalid user amit from 144.135.85.184 port 25568
Jul 30 18:42:54 MK-Soft-VM5 sshd\[21902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.135.85.184
Jul 30 18:42:56 MK-Soft-VM5 sshd\[21902\]: Failed password for invalid user amit from 144.135.85.184 port 25568 ssh2
...
2019-07-31 02:54:36
68.41.23.123 attackspam
Jul 30 12:15:52 *** sshd[20402]: Invalid user greg from 68.41.23.123
2019-07-31 03:24:57
113.236.53.232 attackbotsspam
52869/tcp
[2019-07-30]1pkt
2019-07-31 02:53:39
142.93.1.71 attack
Attempt to log in with non-existing username "administrator" /wp-login.php
2019-07-31 03:28:33
180.66.34.140 attack
2019-07-30T14:35:58.517218abusebot.cloudsearch.cf sshd\[19682\]: Invalid user mauricio from 180.66.34.140 port 38102
2019-07-31 03:22:04
176.51.107.157 attackbots
port scan and connect, tcp 23 (telnet)
2019-07-31 03:24:32
216.177.228.31 attackspambots
5431/tcp
[2019-07-30]1pkt
2019-07-31 02:50:51
123.120.29.150 attackspambots
23/tcp
[2019-07-30]1pkt
2019-07-31 02:48:22
80.44.251.181 attackbots
Honeypot attack, port: 23, PTR: 80-44-251-181.dynamic.dsl.as9105.com.
2019-07-31 03:15:03
1.1.229.243 attackbotsspam
445/tcp
[2019-07-30]1pkt
2019-07-31 03:10:17

Recently Reported IPs

88.120.23.184 121.232.8.106 64.104.132.243 95.12.136.240
85.183.68.14 177.44.75.154 124.236.153.64 79.115.173.55
178.32.97.170 218.40.230.194 209.102.231.104 116.192.102.74
120.108.56.219 119.247.167.50 77.247.108.132 104.218.93.207
1.47.1.124 60.191.23.61 145.92.87.183 193.57.67.117