Whois information
NetRange: 146.0.0.0 - 146.0.255.255
CIDR: 146.0.0.0/16
NetName: RIPE-ERX-146-0-0-0
NetHandle: NET-146-0-0-0-1
Parent: NET146 (NET-146-0-0-0-0)
NetType: Early Registrations, Transferred to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2010-11-03
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/146.0.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net
OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE
ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN
OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN
Most recent complaints
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 146.0.74.234 IP address
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.
Complaint by Tom :
Automatic Pool Cover pool pump https://www.amazon.com/Automatic-Swimming-Cover-Adapters-Drainage/dp/B097SY3TB2/ref=sr_1_14?dchild=1&keywords=Automatic+Swimming+Pool+Cover+Pump&qid=1628498586&sr=8-14
Complaint by Tina :
some weirdo tried sneaky backdoor stuff last night and it popped up in my SIEM. the dashboard puked out a ton of failed logins at 2am so im guessing theyre either bored script kiddies or someone with too much time. if youre out there tinkering, chill out and cover your tracks next time. its hilarious how they forgot to mask their footprint. dont let this lul you into thinking everything is safe cause these creeps aint ever nappin.
Complaint by MZ :
HACKED TM ACCN
Complaint by lesite :
for remote access
Complaint by Erik :
146.0.74.234 is a hacker trying to login on your wp-admin many times a day by brute force.
Complaint by TomS :
146.0.74.234 <- brut force attack to my wp-admin website
Complaint by anon :
Savvy discussion - I loved the insight . Does someone know if my assistant could possibly access a sample a form example to type on ?
Complaint by Henri :
Mass login attempts on Joomla. Multiple ranges: 2013-11-25 14:58:14 INFO 146.0.74.212 Joomla FAILURE: Username and password do not match or you do not have an account yet. 2013-11-25 16:14:50 INFO 146.0.74.234 Joomla FAILURE: Username and password do not match or you do not have an account yet. 2013-11-25 17:32:46 INFO 146.0.73.155 Joomla FAILURE: Username and password do not match or you do not have an account yet. 2013-11-25 18:47:05 INFO 146.0.74.202 Joomla FAILURE: Username and password do not match or you do not have an account yet. 2013-11-25 20:08:30 INFO 146.0.79.23 Joomla FAILURE: Username and password do not match or you do not have an account yet.
Complaint by Jordan :
Trying to brute force Joomla backend which is protected by admin exile. What this one seems to have multiple proxies in netherlands. I doubt I have multiple people trying to brute force me so an educated guess is they are all connected to this ip
Complaint by DJR :
Golf Improvement scam
Complaint by Wts :
Trying brute force against Wordpress Whois says it originates the Netherlands Username: admin IP Address: 146.0.74.234 Attempt Timestamp: 1416976405 Attempt Date/Time: Wed, 26 Nov 2014 04:33:25 +0000 Username: admin IP Address: 121.205.240.184 Attempt Timestamp: 1416977150 Attempt Date/Time: Wed, 26 Nov 2014 04:45:50 +0000