Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Jiangsu

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: No.31,Jin-rong Street

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
49.68.145.190 attackbotsspam
bruteforce detected
2020-07-21 07:02:49
49.68.145.192 attack
$f2bV_matches
2020-06-20 13:19:47
49.68.145.56 attackspambots
Jun  8 22:20:26 tux postfix/smtpd[10558]: connect from unknown[49.68.145.56]
Jun x@x
Jun  8 22:20:30 tux postfix/smtpd[10558]: disconnect from unknown[49.68.145.56]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.68.145.56
2020-06-09 05:02:06
49.68.145.203 attackbotsspam
Brute force attempt
2020-06-03 13:00:42
49.68.145.158 attack
Email rejected due to spam filtering
2020-05-29 22:51:14
49.68.145.178 attackspam
Email rejected due to spam filtering
2020-04-16 16:40:53
49.68.145.27 attackbots
Fail2Ban - FTP Abuse Attempt
2019-08-31 09:48:17
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.68.145.91
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50511
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;49.68.145.91.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061002 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 11 04:38:26 CST 2019
;; MSG SIZE  rcvd: 116

Host info
Host 91.145.68.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 91.145.68.49.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
37.46.255.192 attackbots
Port Scan: TCP/8080
2019-09-03 01:49:24
5.178.244.118 attackbotsspam
Port Scan: TCP/23
2019-09-03 02:18:53
35.238.133.33 attack
Port Scan: TCP/443
2019-09-03 01:49:51
200.100.194.170 attackspambots
Port Scan: TCP/8080
2019-09-03 01:57:56
181.64.187.61 attackspam
Port Scan: TCP/22
2019-09-03 02:03:21
49.83.139.113 attackbotsspam
Port Scan: TCP/22
2019-09-03 02:15:22
71.231.215.219 attack
Port Scan: UDP/80
2019-09-03 02:11:39
5.9.41.107 attackbotsspam
Port Scan: TCP/445
2019-09-03 02:19:11
192.165.228.133 attackbotsspam
Port Scan: TCP/445
2019-09-03 01:59:19
71.204.37.24 attackbots
Port Scan: UDP/80
2019-09-03 02:12:09
180.158.190.173 attackspambots
Port Scan: TCP/445
2019-09-03 02:31:47
12.235.255.106 attackbotsspam
Port Scan: UDP/53
2019-09-03 01:52:54
54.160.200.98 attackbotsspam
Port Scan: TCP/443
2019-09-03 01:46:44
187.106.209.130 attackspam
Port Scan: TCP/81
2019-09-03 02:01:35
149.28.73.177 attackbotsspam
Port Scan: TCP/445
2019-09-03 02:22:17

Recently Reported IPs

183.9.12.91 197.230.216.166 222.147.97.216 152.120.96.146
88.93.241.130 178.121.47.122 219.136.211.98 170.78.82.211
201.150.149.53 18.0.223.81 83.70.224.76 123.232.42.254
41.60.116.78 18.234.198.28 108.40.5.87 111.207.42.96
97.9.45.108 78.36.193.37 36.89.132.161 149.211.243.198