Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bellinzona

Region: Ticino

Country: Switzerland

Internet Service Provider: Swisscom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.14.168.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 253
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.14.168.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024112200 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 22 14:00:31 CST 2024
;; MSG SIZE  rcvd: 106
Host info
145.168.14.46.in-addr.arpa domain name pointer 145.168.14.46.static.wline.lns.sme.cust.swisscom.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.168.14.46.in-addr.arpa	name = 145.168.14.46.static.wline.lns.sme.cust.swisscom.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.26.99.114 attackbotsspam
detected by Fail2Ban
2019-12-14 04:19:08
199.116.78.179 attackbotsspam
Probing for vulnerable PHP code /r222hiqv.php
2019-12-14 04:12:39
104.140.188.26 attackspam
scan r
2019-12-14 04:32:41
193.188.22.146 attackspambots
RDP Bruteforce
2019-12-14 04:18:26
185.62.85.150 attackbotsspam
2019-12-13T12:53:14.541298ns547587 sshd\[26413\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.62.85.150  user=root
2019-12-13T12:53:16.271074ns547587 sshd\[26413\]: Failed password for root from 185.62.85.150 port 52314 ssh2
2019-12-13T12:57:58.297389ns547587 sshd\[1396\]: Invalid user admin from 185.62.85.150 port 60712
2019-12-13T12:57:58.303072ns547587 sshd\[1396\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.62.85.150
...
2019-12-14 04:30:05
83.234.123.199 attackspam
TCP Port Scanning
2019-12-14 04:15:52
137.74.198.126 attack
SSH brutforce
2019-12-14 04:42:27
122.116.201.108 attackspam
Automatic report - Port Scan Attack
2019-12-14 04:42:54
150.95.153.137 attack
Invalid user sundog from 150.95.153.137 port 54042
2019-12-14 04:31:53
92.118.160.1 attackspam
Fail2Ban Ban Triggered
2019-12-14 04:19:40
152.136.104.18 attackspam
Dec 13 16:55:23 mail kernel: [1646128.874548] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=152.136.104.18 DST=77.73.69.240 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=48886 DF PROTO=TCP SPT=55876 DPT=9200 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 13 16:55:24 mail kernel: [1646129.875921] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=152.136.104.18 DST=77.73.69.240 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=48887 DF PROTO=TCP SPT=55876 DPT=9200 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 13 16:55:24 mail kernel: [1646130.087556] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=152.136.104.18 DST=77.73.69.240 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=47083 DF PROTO=TCP SPT=57342 DPT=1433 WINDOW=29200 RES=0x00 SYN URGP=0 
Dec 13 16:55:25 mail kernel: [1646131.089097] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=152.136.104.18 DST=77.73.69.240 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=53584 DF PROTO=TCP SPT=56130 DPT=6380 WINDOW=29200 R
2019-12-14 04:47:20
212.62.61.13 attackspam
TCP Port Scanning
2019-12-14 04:23:48
180.76.159.35 attackspambots
Invalid user hung from 180.76.159.35 port 43824
2019-12-14 04:13:10
121.164.34.90 attack
Invalid user resin from 121.164.34.90 port 46504
2019-12-14 04:46:35
168.0.108.32 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-14 04:36:46

Recently Reported IPs

108.193.200.130 192.168.200.3 12.118.99.99 26.32.101.235
163.149.242.186 172.167.69.35 223.10.67.245 38.71.34.10
109.213.9.99 255.204.20.186 142.60.40.99 125.64.221.194
195.100.178.188 139.103.157.254 43.33.249.10 208.80.171.2
192.168.141.1 237.110.0.2 192.168.86.175 202.2.117.70