Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: IP Broker Limited

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
Mar 23 00:46:12 ns3042688 courier-pop3d: LOGIN FAILED, user=info@makita-dolmar.es, ip=\[::ffff:145.249.104.45\]
...
2020-03-23 08:33:19
Comments on same subnet:
IP Type Details Datetime
145.249.104.47 attackbotsspam
Brute force blocker - service: exim2 - aantal: 25 - Sun Aug 26 18:30:10 2018
2020-09-26 02:04:05
145.249.104.47 attackspam
Brute force blocker - service: exim2 - aantal: 25 - Sun Aug 26 18:30:10 2018
2020-09-25 17:44:44
145.249.104.232 attackspam
(PERMBLOCK) 145.249.104.232 (NL/Netherlands/-) has had more than 4 temp blocks in the last 86400 secs
2019-09-12 06:53:34
145.249.104.74 attackbots
2019-09-03 01:54:29 dovecot_login authenticator failed for \(ADMIN\) \[145.249.104.74\]: 535 Incorrect authentication data \(set_id=support@opso.it\)
2019-09-03 01:54:47 dovecot_login authenticator failed for \(ADMIN\) \[145.249.104.74\]: 535 Incorrect authentication data \(set_id=support@opso.it\)
2019-09-03 01:54:56 dovecot_login authenticator failed for \(ADMIN\) \[145.249.104.74\]: 535 Incorrect authentication data \(set_id=support@opso.it\)
2019-09-03 01:55:34 dovecot_login authenticator failed for \(ADMIN\) \[145.249.104.74\]: 535 Incorrect authentication data \(set_id=support@opso.it\)
2019-09-03 01:57:14 dovecot_login authenticator failed for \(ADMIN\) \[145.249.104.74\]: 535 Incorrect authentication data \(set_id=support@opso.it\)
2019-09-03 08:34:54
145.249.104.203 attackspam
fire
2019-08-09 13:26:42
145.249.104.198 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-07-25 02:35:07
145.249.104.198 attack
2019-07-06T15:23:43.788780abusebot-7.cloudsearch.cf sshd\[12983\]: Invalid user admin from 145.249.104.198 port 56280
2019-07-07 00:44:42
145.249.104.198 attackspam
SSH invalid-user multiple login try
2019-06-30 05:52:58
145.249.104.198 attackspambots
Jun 29 08:01:49 XXX sshd[11038]: Invalid user admin from 145.249.104.198 port 33888
2019-06-29 17:00:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.249.104.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.249.104.45.			IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032201 1800 900 604800 86400

;; Query time: 393 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 08:33:14 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 45.104.249.145.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 45.104.249.145.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
163.172.50.34 attackspam
Feb 15 00:25:05 h1745522 sshd[21705]: Invalid user [manager] from 163.172.50.34 port 41442
Feb 15 00:25:05 h1745522 sshd[21705]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.50.34
Feb 15 00:25:05 h1745522 sshd[21705]: Invalid user [manager] from 163.172.50.34 port 41442
Feb 15 00:25:07 h1745522 sshd[21705]: Failed password for invalid user [manager] from 163.172.50.34 port 41442 ssh2
Feb 15 00:27:32 h1745522 sshd[21775]: Invalid user admanager from 163.172.50.34 port 40462
Feb 15 00:27:32 h1745522 sshd[21775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.50.34
Feb 15 00:27:32 h1745522 sshd[21775]: Invalid user admanager from 163.172.50.34 port 40462
Feb 15 00:27:34 h1745522 sshd[21775]: Failed password for invalid user admanager from 163.172.50.34 port 40462 ssh2
Feb 15 00:30:08 h1745522 sshd[21837]: Invalid user mie123 from 163.172.50.34 port 39510
...
2020-02-15 09:31:55
222.186.31.83 attack
Feb 15 02:32:10 rotator sshd\[23260\]: Failed password for root from 222.186.31.83 port 59769 ssh2Feb 15 02:32:12 rotator sshd\[23260\]: Failed password for root from 222.186.31.83 port 59769 ssh2Feb 15 02:32:14 rotator sshd\[23260\]: Failed password for root from 222.186.31.83 port 59769 ssh2Feb 15 02:33:15 rotator sshd\[23270\]: Failed password for root from 222.186.31.83 port 31016 ssh2Feb 15 02:33:17 rotator sshd\[23270\]: Failed password for root from 222.186.31.83 port 31016 ssh2Feb 15 02:33:18 rotator sshd\[23270\]: Failed password for root from 222.186.31.83 port 31016 ssh2
...
2020-02-15 09:45:29
37.139.2.218 attackspambots
Feb 14 20:26:11 plusreed sshd[20481]: Invalid user sabin from 37.139.2.218
...
2020-02-15 09:42:29
222.222.2.134 attackbots
1581718978 - 02/14/2020 23:22:58 Host: 222.222.2.134/222.222.2.134 Port: 445 TCP Blocked
2020-02-15 09:17:55
142.93.151.37 attack
Feb 13 14:45:53 hostnameproxy sshd[19287]: Invalid user admin from 142.93.151.37 port 42786
Feb 13 14:45:53 hostnameproxy sshd[19287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.151.37
Feb 13 14:45:55 hostnameproxy sshd[19287]: Failed password for invalid user admin from 142.93.151.37 port 42786 ssh2
Feb 13 14:48:48 hostnameproxy sshd[19428]: Invalid user ovwebusr from 142.93.151.37 port 43608
Feb 13 14:48:49 hostnameproxy sshd[19428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.151.37
Feb 13 14:48:50 hostnameproxy sshd[19428]: Failed password for invalid user ovwebusr from 142.93.151.37 port 43608 ssh2
Feb 13 14:51:39 hostnameproxy sshd[19537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.151.37  user=nobody
Feb 13 14:51:41 hostnameproxy sshd[19537]: Failed password for nobody from 142.93.151.37 port 44430 ssh2
Feb 13 1........
------------------------------
2020-02-15 09:19:49
1.222.165.63 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-15 09:30:17
213.32.22.239 attackbots
Automatic report - Banned IP Access
2020-02-15 09:14:42
211.171.186.98 attackspam
Invalid user fabio from 211.171.186.98 port 34322
2020-02-15 09:57:05
72.221.196.149 attackbotsspam
(imapd) Failed IMAP login from 72.221.196.149 (US/United States/-): 1 in the last 3600 secs
2020-02-15 09:17:17
139.59.58.234 attackspam
Feb 14 23:23:02 sso sshd[16407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.58.234
Feb 14 23:23:04 sso sshd[16407]: Failed password for invalid user sabron from 139.59.58.234 port 53498 ssh2
...
2020-02-15 09:16:59
89.168.152.161 attackspam
Honeypot attack, port: 445, PTR: 89-168-152-161.dynamic.dsl.as9105.com.
2020-02-15 09:29:54
35.208.201.252 attackbotsspam
Sql/code injection probe
2020-02-15 09:43:44
187.177.115.22 attackspambots
Automatic report - Port Scan Attack
2020-02-15 09:15:41
27.115.62.134 attack
$f2bV_matches
2020-02-15 09:46:53
148.70.24.20 attack
frenzy
2020-02-15 09:38:55

Recently Reported IPs

219.90.250.21 120.177.244.165 205.131.169.75 48.19.125.152
67.13.61.42 111.203.111.0 101.51.186.157 91.245.135.112
47.52.174.230 2.61.100.220 200.108.167.80 86.182.224.87
163.44.154.239 203.166.208.206 140.143.247.245 217.112.142.219
217.112.142.175 217.112.142.165 217.112.142.131 217.112.142.125