Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
49.68.145.190 attackbotsspam
bruteforce detected
2020-07-21 07:02:49
49.68.145.192 attack
$f2bV_matches
2020-06-20 13:19:47
49.68.145.56 attackspambots
Jun  8 22:20:26 tux postfix/smtpd[10558]: connect from unknown[49.68.145.56]
Jun x@x
Jun  8 22:20:30 tux postfix/smtpd[10558]: disconnect from unknown[49.68.145.56]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.68.145.56
2020-06-09 05:02:06
49.68.145.203 attackbotsspam
Brute force attempt
2020-06-03 13:00:42
49.68.145.158 attack
Email rejected due to spam filtering
2020-05-29 22:51:14
49.68.145.178 attackspam
Email rejected due to spam filtering
2020-04-16 16:40:53
49.68.145.27 attackbots
Fail2Ban - FTP Abuse Attempt
2019-08-31 09:48:17
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.68.145.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27132
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.68.145.32.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:56:37 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 32.145.68.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 32.145.68.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
50.195.195.230 attack
Unauthorized connection attempt detected from IP address 50.195.195.230 to port 23
2020-07-22 18:42:27
106.111.122.57 attackspam
Unauthorized connection attempt detected from IP address 106.111.122.57 to port 23
2020-07-22 18:37:33
170.106.81.25 attackbotsspam
Unauthorized connection attempt detected from IP address 170.106.81.25 to port 3522
2020-07-22 18:13:23
192.144.189.51 attackbotsspam
Invalid user ben from 192.144.189.51 port 58920
2020-07-22 18:30:29
14.124.9.88 attackspam
Unauthorized connection attempt detected from IP address 14.124.9.88 to port 5555
2020-07-22 18:26:21
109.94.226.18 attack
Unauthorized connection attempt detected from IP address 109.94.226.18 to port 8080
2020-07-22 18:37:08
200.109.215.55 attackspambots
Unauthorized connection attempt detected from IP address 200.109.215.55 to port 445
2020-07-22 18:07:16
115.78.239.217 attack
Unauthorized connection attempt detected from IP address 115.78.239.217 to port 23
2020-07-22 18:36:25
5.55.205.234 attackspam
Unauthorized connection attempt detected from IP address 5.55.205.234 to port 23
2020-07-22 18:45:56
181.40.66.104 attack
Unauthorized connection attempt detected from IP address 181.40.66.104 to port 445
2020-07-22 18:31:47
95.9.201.199 attackspam
Unauthorized connection attempt detected from IP address 95.9.201.199 to port 445
2020-07-22 18:18:43
212.29.219.12 attackbots
Unauthorized connection attempt detected from IP address 212.29.219.12 to port 23
2020-07-22 18:05:16
20.52.37.143 attackbotsspam
Unauthorized connection attempt detected from IP address 20.52.37.143 to port 1433
2020-07-22 18:43:57
180.76.147.221 attackbots
Unauthorized connection attempt detected from IP address 180.76.147.221 to port 4382
2020-07-22 18:11:37
46.101.223.54 attack
SIP/5060 Probe, BF, Hack -
2020-07-22 18:23:47

Recently Reported IPs

137.184.20.178 151.48.204.232 201.184.167.109 193.93.193.148
210.210.217.11 45.134.186.204 194.50.13.23 76.79.110.53
45.190.158.177 1.12.238.212 177.128.54.196 45.10.165.243
103.245.204.213 111.123.196.235 139.99.40.153 193.233.83.23
5.43.214.72 112.134.31.101 200.73.112.67 117.218.46.180