IP: 146.0.74.208 Netherlands Location: Netherlands
Country:
Netherlands
Latitude:
52.3824
Longitude:
4.8995
NetRange: 146.0.0.0 - 146.0.255.255
CIDR: 146.0.0.0/16
NetName: RIPE-ERX-146-0-0-0
NetHandle: NET-146-0-0-0-1
Parent: NET146 (NET-146-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2010-11-03
Updated: 2010-11-03
Comment: These addresses have been further assigned to users in
Comment: the RIPE NCC region. Contact information can be found in
Comment: the RIPE database at http://www.ripe.net/whois
Ref: https://rdap.arin.net/registry/ip/146.0.0.0

ResourceLink: https://apps.db.ripe.net/search/query.html
ResourceLink: whois.ripe.net

OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE

ReferralServer: whois://whois.ripe.net
ResourceLink: https://apps.db.ripe.net/search/query.html

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
DNS BlackList results:
Most recent complaints on 146.0.74.208
Complaint by Kevin :

This IP is a serial spammer. Please block

Reported on: 24th, Sep. 2013
Complaint by anon :

mass login intrusion into joomla account

Reported on: 4th, Nov. 2013
Complaint by Jordan Webmaster :

This IP tried to hack the back end of my website using brute force methods. This happened after one of my domains was stolen by internet.bs and straight after the brute force attack happened. Although I can't say for sure if these two events are connected but I can make an educated guess it is. All I can say is if you are a Joomla user get yourself admin exile and turn brute force protection on it very well might of saved my website.

Reported on: 24th, Mar. 2014
Complaint by G de Boer :

From this address and other 146.0.x.x I get mass login intrusion into joomla admin accounts using brute force methods

Reported on: 2nd, Jul. 2014
Complaint by Mike :

Trying to break into Wordpress admin

Reported on: 7th, Jul. 2014
Complaint by ute :

attempt to attack my Joomla site

Reported on: 22nd, Sep. 2014
Complaint by TDRonline :

Attempted brute force on Joomla login. Redirected IP to localhost

Reported on: 9th, Oct. 2014
Complaint by Heinrisch Aigner :

This IP and Company performs worldwide cybercrime activities, mass login intrusion into Wordpress, Joomla and other accounts, hacking, hacking into systems, social media accounts and emails They are trying to send a virus, keylogger, trojan. inetnum: 146.0.78.0 - 146.0.78.127 inetnum: 146.0.78.128 - 146.0.78.159 B Class: 146.0.0.0 - 146.0.255.255 inetnum: 5.39.216.0 - 5.39.223.255 Whois Original Data - Hostkey B.v, IP Address: 5.39.218.37 - [5.39.218.0 - 5.39.218.255] netname: martis4-net Gustar Warcov - Netherlands (Russia) Web: http://www.hostkey.com Parent Owner Address: Hostkey B.v. Tussen De Bogen 6, 1013Jb Amsterdam, The Netherlands address: HOSTKEY B.V Mir Telematiki, 19/2 Lva Tolstogo st, Moscow 119034, Russia

Reported on: 20th, Jan. 2015

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 146.0.74.208 IP address


DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.