Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Microsoft Corporation

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Oct 26 01:01:57 web1 sshd[21486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.209.45.242  user=r.r
Oct 26 01:01:59 web1 sshd[21486]: Failed password for r.r from 104.209.45.242 port 3776 ssh2
Oct 26 01:01:59 web1 sshd[21486]: Received disconnect from 104.209.45.242: 11: Bye Bye [preauth]
Oct 26 01:08:53 web1 sshd[22225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.209.45.242  user=r.r
Oct 26 01:08:55 web1 sshd[22225]: Failed password for r.r from 104.209.45.242 port 3776 ssh2
Oct 26 01:08:55 web1 sshd[22225]: Received disconnect from 104.209.45.242: 11: Bye Bye [preauth]
Oct x@x
Oct 26 01:12:44 web1 sshd[22786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.209.45.242 
Oct x@x
Oct 26 01:12:46 web1 sshd[22786]: Received disconnect from 104.209.45.242: 11: Bye Bye [preauth]
Oct 26 01:17:19 web1 sshd[23208]: Invalid user adipa123 fro........
-------------------------------
2019-10-26 18:56:32
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.209.45.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.209.45.242.			IN	A

;; AUTHORITY SECTION:
.			332	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102600 1800 900 604800 86400

;; Query time: 99 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 26 18:56:29 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 242.45.209.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.45.209.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.128.71 attack
$f2bV_matches
2019-11-25 21:16:08
189.90.184.19 attack
19/11/25@01:21:15: FAIL: IoT-Telnet address from=189.90.184.19
...
2019-11-25 20:56:03
117.7.7.28 attack
Nov 25 16:26:55 our-server-hostname postfix/smtpd[23949]: connect from unknown[117.7.7.28]
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov x@x
Nov 25 16:26:58 our-server-hostname postfix/smtpd[23949]: disconnect from unknown[117.7.7.28]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.7.7.28
2019-11-25 20:34:20
193.112.44.102 attackbots
Nov 25 07:21:47 localhost sshd\[11030\]: Invalid user hung from 193.112.44.102 port 52640
Nov 25 07:21:47 localhost sshd\[11030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.44.102
Nov 25 07:21:49 localhost sshd\[11030\]: Failed password for invalid user hung from 193.112.44.102 port 52640 ssh2
2019-11-25 20:36:24
113.176.118.14 attackspam
Unauthorised access (Nov 25) SRC=113.176.118.14 LEN=52 TTL=118 ID=20102 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-25 20:59:28
210.210.175.63 attack
Nov 24 22:53:42 web1 sshd\[1766\]: Invalid user c2web from 210.210.175.63
Nov 24 22:53:42 web1 sshd\[1766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.210.175.63
Nov 24 22:53:45 web1 sshd\[1766\]: Failed password for invalid user c2web from 210.210.175.63 port 36294 ssh2
Nov 24 22:57:35 web1 sshd\[2098\]: Invalid user guest from 210.210.175.63
Nov 24 22:57:35 web1 sshd\[2098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.210.175.63
2019-11-25 20:37:13
193.56.28.177 attack
Nov 25 06:34:02 web1 postfix/smtpd[3522]: warning: unknown[193.56.28.177]: SASL LOGIN authentication failed: authentication failure
Nov 25 06:34:02 web1 postfix/smtpd[3522]: warning: unknown[193.56.28.177]: SASL LOGIN authentication failed: authentication failure
...
2019-11-25 20:42:52
206.81.29.166 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-11-25 21:11:03
112.217.225.61 attack
SSH invalid-user multiple login attempts
2019-11-25 20:58:23
152.136.170.148 attackspambots
Nov 25 07:36:11 linuxvps sshd\[47683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.170.148  user=root
Nov 25 07:36:13 linuxvps sshd\[47683\]: Failed password for root from 152.136.170.148 port 55044 ssh2
Nov 25 07:44:43 linuxvps sshd\[52979\]: Invalid user kanakaris from 152.136.170.148
Nov 25 07:44:43 linuxvps sshd\[52979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.170.148
Nov 25 07:44:45 linuxvps sshd\[52979\]: Failed password for invalid user kanakaris from 152.136.170.148 port 34142 ssh2
2019-11-25 21:09:47
79.137.72.121 attack
Invalid user vcsa from 79.137.72.121 port 59274
2019-11-25 21:04:45
165.227.115.93 attackspambots
Nov 25 14:01:37 MK-Soft-VM3 sshd[29217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.115.93 
Nov 25 14:01:38 MK-Soft-VM3 sshd[29217]: Failed password for invalid user Burn2017 from 165.227.115.93 port 33218 ssh2
...
2019-11-25 21:05:44
45.32.44.44 attackspam
Automatic report - XMLRPC Attack
2019-11-25 20:39:01
123.24.0.94 attackbotsspam
Nov 25 07:21:47 arianus postfix/smtps/smtpd\[12969\]: warning: unknown\[123.24.0.94\]: SASL PLAIN authentication failed:
...
2019-11-25 20:38:38
172.81.250.106 attack
2019-11-25T12:34:48.334322abusebot-5.cloudsearch.cf sshd\[26922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.250.106  user=root
2019-11-25 20:59:00

Recently Reported IPs

77.228.171.163 148.251.20.137 52.192.157.251 113.116.96.93
194.20.225.9 120.241.38.215 0.239.246.67 119.123.101.144
248.3.212.94 112.150.158.75 183.75.9.254 201.212.10.33
182.23.104.231 112.175.124.157 84.54.120.31 46.39.23.2
117.157.99.122 115.211.222.125 60.23.130.44 173.194.219.190