Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Red Deer

Region: Alberta

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.145.239.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.145.239.2.			IN	A

;; AUTHORITY SECTION:
.			499	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022070300 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 03 16:59:57 CST 2022
;; MSG SIZE  rcvd: 105
Host info
2.239.145.68.in-addr.arpa domain name pointer S0106a0ff703c9980.rd.shawcable.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.239.145.68.in-addr.arpa	name = S0106a0ff703c9980.rd.shawcable.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.25.44.66 attackspambots
May  6 11:41:09 ws26vmsma01 sshd[105358]: Failed password for root from 118.25.44.66 port 35872 ssh2
...
2020-05-07 04:14:09
46.38.144.179 attackspam
May  6 22:04:30 vmanager6029 postfix/smtpd\[30167\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  6 22:05:06 vmanager6029 postfix/smtpd\[30176\]: warning: unknown\[46.38.144.179\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-07 04:06:13
47.31.145.152 attack
May  6 22:23:25 vpn01 sshd[4513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.31.145.152
May  6 22:23:27 vpn01 sshd[4513]: Failed password for invalid user pi from 47.31.145.152 port 33155 ssh2
...
2020-05-07 04:35:39
35.227.108.34 attackbots
May  6 12:44:17 ny01 sshd[17563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.227.108.34
May  6 12:44:19 ny01 sshd[17563]: Failed password for invalid user admin from 35.227.108.34 port 42606 ssh2
May  6 12:48:07 ny01 sshd[18050]: Failed password for root from 35.227.108.34 port 51134 ssh2
2020-05-07 03:56:20
203.215.48.78 attack
May  7 06:14:10 web1 sshd[9367]: Invalid user debian from 203.215.48.78 port 39444
May  7 06:14:10 web1 sshd[9367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.215.48.78
May  7 06:14:10 web1 sshd[9367]: Invalid user debian from 203.215.48.78 port 39444
May  7 06:14:12 web1 sshd[9367]: Failed password for invalid user debian from 203.215.48.78 port 39444 ssh2
May  7 06:20:35 web1 sshd[10940]: Invalid user purple from 203.215.48.78 port 54550
May  7 06:20:35 web1 sshd[10940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.215.48.78
May  7 06:20:35 web1 sshd[10940]: Invalid user purple from 203.215.48.78 port 54550
May  7 06:20:37 web1 sshd[10940]: Failed password for invalid user purple from 203.215.48.78 port 54550 ssh2
May  7 06:23:19 web1 sshd[11548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.215.48.78  user=root
May  7 06:23:21 web1 sshd[11548
...
2020-05-07 04:38:34
187.16.43.242 attackspambots
2020-05-06T13:57:11.675359scrat postfix/smtpd[3443604]: NOQUEUE: reject: RCPT from unknown[187.16.43.242]: 450 4.7.25 Client host rejected: cannot find your hostname, [187.16.43.242]; from= to= proto=ESMTP helo=
2020-05-06T13:57:14.961700scrat postfix/smtpd[3443604]: NOQUEUE: reject: RCPT from unknown[187.16.43.242]: 450 4.7.25 Client host rejected: cannot find your hostname, [187.16.43.242]; from= to= proto=ESMTP helo=
2020-05-06T13:57:18.396788scrat postfix/smtpd[3443604]: NOQUEUE: reject: RCPT from unknown[187.16.43.242]: 450 4.7.25 Client host rejected: cannot find your hostname, [187.16.43.242]; from= to= proto=ESMTP helo=
2020-05-06T13:57:22.399735scrat postfix/smtpd[3443604]: NOQUEUE: reject: RCPT from unknown[187.16.43.242]: 450 4.7.25 Client host rejected: cannot find your hostname, [187.16.
...
2020-05-07 04:18:26
121.142.172.106 attackbotsspam
1588766257 - 05/06/2020 18:57:37 Host: 121.142.172.106/121.142.172.106 Port: 10 TCP Blocked
...
2020-05-07 04:11:47
129.211.65.70 attack
srv02 SSH BruteForce Attacks 22 ..
2020-05-07 04:26:20
163.44.150.247 attack
May  6 19:18:14 lukav-desktop sshd\[17815\]: Invalid user zookeeper from 163.44.150.247
May  6 19:18:14 lukav-desktop sshd\[17815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247
May  6 19:18:16 lukav-desktop sshd\[17815\]: Failed password for invalid user zookeeper from 163.44.150.247 port 58356 ssh2
May  6 19:20:40 lukav-desktop sshd\[19194\]: Invalid user has from 163.44.150.247
May  6 19:20:40 lukav-desktop sshd\[19194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.150.247
2020-05-07 04:21:19
113.193.243.35 attackspambots
May  6 17:01:25 firewall sshd[7576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.193.243.35
May  6 17:01:25 firewall sshd[7576]: Invalid user zav from 113.193.243.35
May  6 17:01:27 firewall sshd[7576]: Failed password for invalid user zav from 113.193.243.35 port 60280 ssh2
...
2020-05-07 04:17:13
50.54.141.121 attack
May  6 22:10:43 vps687878 sshd\[13032\]: Invalid user carlita from 50.54.141.121 port 45112
May  6 22:10:43 vps687878 sshd\[13032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.54.141.121
May  6 22:10:45 vps687878 sshd\[13032\]: Failed password for invalid user carlita from 50.54.141.121 port 45112 ssh2
May  6 22:11:47 vps687878 sshd\[13082\]: Invalid user naveen from 50.54.141.121 port 55412
May  6 22:11:47 vps687878 sshd\[13082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.54.141.121
...
2020-05-07 04:25:50
122.170.108.228 attackspambots
May  6 22:23:23 cloud sshd[2251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.170.108.228 
May  6 22:23:25 cloud sshd[2251]: Failed password for invalid user telnet from 122.170.108.228 port 60498 ssh2
2020-05-07 04:35:53
123.103.51.49 attack
Fail2Ban - SSH Bruteforce Attempt
2020-05-07 03:56:47
192.144.218.143 attackbots
Unauthorized SSH login attempts
2020-05-07 04:15:57
185.50.149.12 attackspambots
May  6 21:38:31 web01.agentur-b-2.de postfix/smtpd[292743]: warning: unknown[185.50.149.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May  6 21:38:31 web01.agentur-b-2.de postfix/smtpd[292743]: lost connection after AUTH from unknown[185.50.149.12]
May  6 21:38:40 web01.agentur-b-2.de postfix/smtpd[300659]: lost connection after AUTH from unknown[185.50.149.12]
May  6 21:38:47 web01.agentur-b-2.de postfix/smtpd[290689]: lost connection after AUTH from unknown[185.50.149.12]
May  6 21:38:55 web01.agentur-b-2.de postfix/smtpd[292743]: warning: unknown[185.50.149.12]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-05-07 04:02:57

Recently Reported IPs

180.76.90.202 181.89.95.26 47.181.141.57 47.136.47.230
47.152.215.122 50.5.140.48 189.245.106.18 106.11.158.101
169.229.232.233 169.229.233.185 180.76.49.165 180.76.67.47
180.76.157.104 169.229.232.71 180.76.11.152 180.76.5.114
169.229.232.216 169.229.216.160 180.76.227.247 180.76.235.120