Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Calgary

Region: Alberta

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.145.35.228
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62594
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.145.35.228.			IN	A

;; AUTHORITY SECTION:
.			395	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031800 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 18 17:38:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
228.35.145.68.in-addr.arpa domain name pointer S010600238b95d862.cg.shawcable.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
228.35.145.68.in-addr.arpa	name = S010600238b95d862.cg.shawcable.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.69.90 attackbotsspam
Aug 17 08:00:50 vps647732 sshd[18462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.69.90
Aug 17 08:00:52 vps647732 sshd[18462]: Failed password for invalid user zhouqian from 106.12.69.90 port 41386 ssh2
...
2020-08-17 18:25:12
185.43.8.43 attackspam
IP: 185.43.8.43
Ports affected
    Simple Mail Transfer (25) 
Abuse Confidence rating 73%
Found in DNSBL('s)
ASN Details
   AS48573 Limited Liability Company NFS Telecom
   Russia (RU)
   CIDR 185.43.8.0/23
Log Date: 17/08/2020 8:11:44 AM UTC
2020-08-17 18:08:29
171.100.8.82 attackspam
spam
2020-08-17 18:34:53
106.52.64.125 attack
Aug 17 10:33:49 h2427292 sshd\[13617\]: Invalid user dani from 106.52.64.125
Aug 17 10:33:49 h2427292 sshd\[13617\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.64.125 
Aug 17 10:33:51 h2427292 sshd\[13617\]: Failed password for invalid user dani from 106.52.64.125 port 52778 ssh2
...
2020-08-17 18:06:28
147.135.203.181 attackspam
Brute-force attempt banned
2020-08-17 18:09:08
186.193.7.110 attackbots
spam
2020-08-17 18:08:11
110.166.254.71 attackbotsspam
Aug 17 05:48:59 eventyay sshd[11942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.166.254.71
Aug 17 05:49:01 eventyay sshd[11942]: Failed password for invalid user song from 110.166.254.71 port 57900 ssh2
Aug 17 05:55:59 eventyay sshd[12089]: Failed password for root from 110.166.254.71 port 32926 ssh2
...
2020-08-17 18:19:26
170.130.165.87 attackspambots
frecklecollar.guru (checking ip) = 104.24.124.66
2020-08-17 18:22:55
195.211.84.104 attackbots
Unauthorized IMAP connection attempt
2020-08-17 18:26:59
197.155.194.194 attack
spam
2020-08-17 18:04:30
202.142.159.204 attackbotsspam
IP: 202.142.159.204
Ports affected
    Simple Mail Transfer (25) 
Abuse Confidence rating 60%
Found in DNSBL('s)
ASN Details
   AS23750 GERRYS INFORMATION TECHNOLOGY PVT LTD.
   Pakistan (PK)
   CIDR 202.142.158.0/23
Log Date: 17/08/2020 8:07:21 AM UTC
2020-08-17 18:34:32
46.172.69.163 attackspam
spam
2020-08-17 18:20:55
85.175.171.169 attackspam
Repeated brute force against a port
2020-08-17 18:03:40
181.236.224.4 attack
spam
2020-08-17 18:21:43
36.84.100.210 attackbotsspam
spam
2020-08-17 18:18:24

Recently Reported IPs

204.31.156.32 107.195.89.178 217.217.81.193 204.144.9.79
75.196.156.190 174.83.177.6 121.221.192.232 69.20.142.254
47.47.175.183 250.211.188.23 92.143.46.105 153.60.210.155
175.19.66.33 2.97.148.193 197.248.59.146 245.88.216.214
140.75.246.56 135.151.55.205 232.151.138.90 164.203.104.164