Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.240.68.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.240.68.145.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:12:52 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 145.68.240.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.68.240.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.69.78.78 attackbotsspam
Tried sshing with brute force.
2019-12-20 19:25:42
81.101.253.42 attack
Dec 20 12:20:14 server sshd\[17252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpc87345-slou4-2-0-cust297.17-4.cable.virginm.net  user=root
Dec 20 12:20:16 server sshd\[17252\]: Failed password for root from 81.101.253.42 port 37916 ssh2
Dec 20 12:31:28 server sshd\[20046\]: Invalid user rpm from 81.101.253.42
Dec 20 12:31:28 server sshd\[20046\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpc87345-slou4-2-0-cust297.17-4.cable.virginm.net 
Dec 20 12:31:30 server sshd\[20046\]: Failed password for invalid user rpm from 81.101.253.42 port 55258 ssh2
...
2019-12-20 18:59:47
37.228.139.62 attackbots
Dec 20 11:22:11 ns3042688 sshd\[8780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.139.62  user=root
Dec 20 11:22:12 ns3042688 sshd\[8780\]: Failed password for root from 37.228.139.62 port 48926 ssh2
Dec 20 11:26:56 ns3042688 sshd\[10965\]: Invalid user lisa from 37.228.139.62
Dec 20 11:26:56 ns3042688 sshd\[10965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.228.139.62 
Dec 20 11:26:57 ns3042688 sshd\[10965\]: Failed password for invalid user lisa from 37.228.139.62 port 38652 ssh2
...
2019-12-20 19:14:00
124.156.121.233 attack
Dec 20 11:10:55 heissa sshd\[8147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.121.233  user=root
Dec 20 11:10:57 heissa sshd\[8147\]: Failed password for root from 124.156.121.233 port 46900 ssh2
Dec 20 11:17:07 heissa sshd\[9058\]: Invalid user ronan from 124.156.121.233 port 53802
Dec 20 11:17:07 heissa sshd\[9058\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.121.233
Dec 20 11:17:09 heissa sshd\[9058\]: Failed password for invalid user ronan from 124.156.121.233 port 53802 ssh2
2019-12-20 19:17:52
81.45.56.199 attackspambots
Dec 20 08:39:00 eventyay sshd[12537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.45.56.199
Dec 20 08:39:02 eventyay sshd[12537]: Failed password for invalid user mandrake91 from 81.45.56.199 port 37986 ssh2
Dec 20 08:41:27 eventyay sshd[12626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.45.56.199
...
2019-12-20 19:33:09
212.47.253.178 attackbots
leo_www
2019-12-20 19:12:05
14.177.182.2 attackbots
Host Scan
2019-12-20 19:00:16
5.89.64.166 attackbotsspam
Dec 20 11:28:43 localhost sshd[21207]: Failed password for invalid user webmaster from 5.89.64.166 port 60874 ssh2
Dec 20 11:39:42 localhost sshd[21666]: Failed password for invalid user home from 5.89.64.166 port 45434 ssh2
Dec 20 11:48:24 localhost sshd[21973]: User daemon from 5.89.64.166 not allowed because not listed in AllowUsers
2019-12-20 19:02:31
138.197.89.212 attackbotsspam
Oct 24 06:52:54 vtv3 sshd[12825]: Failed password for invalid user blaster from 138.197.89.212 port 46110 ssh2
Oct 24 06:56:45 vtv3 sshd[14795]: Invalid user alessandro from 138.197.89.212 port 57040
Oct 24 06:56:45 vtv3 sshd[14795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.212
Oct 24 07:08:26 vtv3 sshd[20466]: Invalid user P455word1 from 138.197.89.212 port 33360
Oct 24 07:08:26 vtv3 sshd[20466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.212
Oct 24 07:08:28 vtv3 sshd[20466]: Failed password for invalid user P455word1 from 138.197.89.212 port 33360 ssh2
Oct 24 07:12:25 vtv3 sshd[22460]: Invalid user pumch from 138.197.89.212 port 44290
Oct 24 07:12:25 vtv3 sshd[22460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.89.212
Dec 20 08:02:56 vtv3 sshd[27463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.19
2019-12-20 18:53:48
85.209.0.141 attack
Host Scan
2019-12-20 19:31:39
49.36.4.189 attackspam
Unauthorized connection attempt detected from IP address 49.36.4.189 to port 445
2019-12-20 19:34:14
86.105.52.90 attackbotsspam
Dec 20 07:26:16 zeus sshd[17072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.52.90 
Dec 20 07:26:17 zeus sshd[17072]: Failed password for invalid user codebreaker from 86.105.52.90 port 42832 ssh2
Dec 20 07:31:42 zeus sshd[17211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.105.52.90 
Dec 20 07:31:44 zeus sshd[17211]: Failed password for invalid user telle from 86.105.52.90 port 50576 ssh2
2019-12-20 19:30:30
51.38.57.78 attackbotsspam
Dec 20 01:11:48 hpm sshd\[21826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3118043.ip-51-38-57.eu  user=root
Dec 20 01:11:50 hpm sshd\[21826\]: Failed password for root from 51.38.57.78 port 33782 ssh2
Dec 20 01:17:10 hpm sshd\[22358\]: Invalid user nestaas from 51.38.57.78
Dec 20 01:17:10 hpm sshd\[22358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3118043.ip-51-38-57.eu
Dec 20 01:17:12 hpm sshd\[22358\]: Failed password for invalid user nestaas from 51.38.57.78 port 57508 ssh2
2019-12-20 19:18:19
46.20.54.211 attack
Unauthorized connection attempt detected from IP address 46.20.54.211 to port 445
2019-12-20 19:07:33
212.25.25.60 attackspambots
TERRORIST SPAM MAIL USED TO GAIN AND MOVE LARGE SUMS OF MONEY FROM FLEXMAIL,COM WITH AN ORIGINATING EMAIL FROM FLEXMAIL.COM OF 
Yovonda.Barefield@arshousing.org  AND A REPLY TO EMAIL AT INTERWAY.CH OF pcf19879@email.ch
2019-12-20 19:19:58

Recently Reported IPs

80.197.118.200 155.3.20.131 7.127.119.145 127.7.59.187
30.184.127.109 243.212.147.139 249.161.150.72 242.13.3.97
78.9.19.145 39.112.23.135 33.130.147.183 59.216.5.10
87.106.71.150 67.187.155.138 250.143.159.224 150.120.146.90
114.187.150.8 197.103.18.134 208.14.194.152 76.161.45.163