Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: TOT Public Company Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
1593170655 - 06/26/2020 13:24:15 Host: 1.1.204.145/1.1.204.145 Port: 445 TCP Blocked
2020-06-27 02:02:25
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.1.204.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.1.204.145.			IN	A

;; AUTHORITY SECTION:
.			551	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062600 1800 900 604800 86400

;; Query time: 917 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 27 02:02:22 CST 2020
;; MSG SIZE  rcvd: 115
Host info
145.204.1.1.in-addr.arpa domain name pointer node-f4h.pool-1-1.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.204.1.1.in-addr.arpa	name = node-f4h.pool-1-1.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.197.179.111 attackbots
2020-06-04T23:37:29.873965ns386461 sshd\[20732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.111  user=root
2020-06-04T23:37:31.516339ns386461 sshd\[20732\]: Failed password for root from 138.197.179.111 port 45424 ssh2
2020-06-04T23:43:10.633907ns386461 sshd\[26448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.111  user=root
2020-06-04T23:43:12.757575ns386461 sshd\[26448\]: Failed password for root from 138.197.179.111 port 41376 ssh2
2020-06-04T23:46:57.408663ns386461 sshd\[29917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.111  user=root
...
2020-06-05 07:12:50
95.181.131.153 attack
...
2020-06-05 07:27:45
190.133.161.247 attackspam
Port probing on unauthorized port 445
2020-06-05 07:00:12
45.76.78.48 attack
Jun  3 12:12:02 our-server-hostname sshd[29735]: reveeclipse mapping checking getaddrinfo for 45.76.78.48.vultr.com [45.76.78.48] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  3 12:12:02 our-server-hostname sshd[29735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.78.48  user=r.r
Jun  3 12:12:03 our-server-hostname sshd[29735]: Failed password for r.r from 45.76.78.48 port 47622 ssh2
Jun  3 12:23:49 our-server-hostname sshd[32534]: reveeclipse mapping checking getaddrinfo for 45.76.78.48.vultr.com [45.76.78.48] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun  3 12:23:49 our-server-hostname sshd[32534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.76.78.48  user=r.r
Jun  3 12:23:51 our-server-hostname sshd[32534]: Failed password for r.r from 45.76.78.48 port 53762 ssh2
Jun  3 12:28:37 our-server-hostname sshd[1089]: reveeclipse mapping checking getaddrinfo for 45.76.78.48.vultr.com [45.76.........
-------------------------------
2020-06-05 06:49:48
106.116.118.89 attack
Jun  4 22:23:52 mail sshd\[14373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.116.118.89  user=root
Jun  4 22:23:54 mail sshd\[14373\]: Failed password for root from 106.116.118.89 port 58044 ssh2
Jun  4 22:24:45 mail sshd\[14379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.116.118.89  user=root
...
2020-06-05 07:16:11
45.143.220.246 attackbots
Jun  4 23:04:09 baguette sshd\[25067\]: Invalid user admin from 45.143.220.246 port 36628
Jun  4 23:04:09 baguette sshd\[25067\]: Invalid user admin from 45.143.220.246 port 36628
Jun  4 23:04:15 baguette sshd\[25069\]: Invalid user admin from 45.143.220.246 port 47782
Jun  4 23:04:15 baguette sshd\[25069\]: Invalid user admin from 45.143.220.246 port 47782
Jun  4 23:04:22 baguette sshd\[25071\]: Invalid user ubnt from 45.143.220.246 port 59797
Jun  4 23:04:22 baguette sshd\[25071\]: Invalid user ubnt from 45.143.220.246 port 59797
...
2020-06-05 07:11:07
162.243.142.155 attack
4-6-2020 22:11:12	Unauthorized connection attempt (Brute-Force).
4-6-2020 22:11:12	Connection from IP address: 162.243.142.155 on port: 465


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=162.243.142.155
2020-06-05 06:54:04
61.147.103.136 attack
TCP Packet - Source:61.147.103.136 Destination:xxx.xxx.xxx.xxx - [PORT SCAN]
2020-06-05 07:27:11
219.150.93.157 attack
Jun  5 00:21:36 vps647732 sshd[26837]: Failed password for root from 219.150.93.157 port 39107 ssh2
...
2020-06-05 07:10:02
201.108.227.106 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-06-05 07:08:40
49.235.97.29 attackspam
Jun  5 00:20:13 cp sshd[30834]: Failed password for root from 49.235.97.29 port 36818 ssh2
Jun  5 00:24:58 cp sshd[810]: Failed password for root from 49.235.97.29 port 36270 ssh2
2020-06-05 06:52:21
178.128.121.137 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-06-05 06:58:59
137.116.128.105 attackbots
Jun  4 22:20:39 v22019038103785759 sshd\[24853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.116.128.105  user=root
Jun  4 22:20:41 v22019038103785759 sshd\[24853\]: Failed password for root from 137.116.128.105 port 2624 ssh2
Jun  4 22:24:22 v22019038103785759 sshd\[25115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.116.128.105  user=root
Jun  4 22:24:24 v22019038103785759 sshd\[25115\]: Failed password for root from 137.116.128.105 port 2624 ssh2
Jun  4 22:28:22 v22019038103785759 sshd\[25424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.116.128.105  user=root
...
2020-06-05 07:01:44
185.12.45.115 attack
Automatic report - Banned IP Access
2020-06-05 07:10:34
94.191.119.176 attack
Jun  5 00:25:55 sso sshd[9073]: Failed password for root from 94.191.119.176 port 49073 ssh2
...
2020-06-05 06:56:25

Recently Reported IPs

217.182.253.249 2600:8800:2f00:1211:9d46:4aae:69a7:49e3 192.144.230.43 188.68.3.177
240.132.195.83 77.111.247.10 52.231.95.220 106.12.132.86
45.195.11.212 157.245.64.116 74.123.21.22 112.35.145.179
155.94.143.112 40.77.202.66 180.76.244.123 109.75.76.234
34.215.22.93 179.96.177.147 51.83.133.24 176.123.6.21