Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: Vodafone Italia S.p.A.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Port probing on unauthorized port 23
2020-02-10 23:39:36
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.45.82.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.45.82.140.			IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020021000 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 23:39:16 CST 2020
;; MSG SIZE  rcvd: 115
Host info
140.82.45.2.in-addr.arpa domain name pointer net-2-45-82-140.cust.vodafonedsl.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.82.45.2.in-addr.arpa	name = net-2-45-82-140.cust.vodafonedsl.it.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
176.240.225.179 attack
network attacks
2020-04-22 22:23:57
117.50.2.135 attackbotsspam
Apr 22 09:58:04 firewall sshd[3801]: Invalid user oracle from 117.50.2.135
Apr 22 09:58:06 firewall sshd[3801]: Failed password for invalid user oracle from 117.50.2.135 port 42268 ssh2
Apr 22 10:02:02 firewall sshd[3914]: Invalid user jn from 117.50.2.135
...
2020-04-22 22:09:04
103.91.219.80 attackbots
Apr 22 15:01:21 eventyay sshd[8808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.91.219.80
Apr 22 15:01:23 eventyay sshd[8808]: Failed password for invalid user ubuntu1 from 103.91.219.80 port 34908 ssh2
Apr 22 15:06:56 eventyay sshd[8864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.91.219.80
...
2020-04-22 22:46:37
113.161.57.118 attackspambots
Honeypot attack, port: 81, PTR: static.vnpt.vn.
2020-04-22 22:14:55
87.117.178.105 attackbots
Apr 22 16:25:54 vps sshd[147311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-178-105.static.telecet.ru
Apr 22 16:25:56 vps sshd[147311]: Failed password for invalid user admin from 87.117.178.105 port 34604 ssh2
Apr 22 16:29:28 vps sshd[161358]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-178-105.static.telecet.ru  user=root
Apr 22 16:29:29 vps sshd[161358]: Failed password for root from 87.117.178.105 port 34276 ssh2
Apr 22 16:32:54 vps sshd[179072]: Invalid user ct from 87.117.178.105 port 33950
...
2020-04-22 22:49:56
1.2.155.31 attack
SMB Server BruteForce Attack
2020-04-22 22:42:57
184.105.139.77 attack
Port probing on unauthorized port 6379
2020-04-22 22:15:12
157.245.194.38 attack
Apr 20 06:28:53 mx01 sshd[21902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.194.38  user=r.r
Apr 20 06:28:54 mx01 sshd[21902]: Failed password for r.r from 157.245.194.38 port 47418 ssh2
Apr 20 06:28:54 mx01 sshd[21902]: Received disconnect from 157.245.194.38: 11: Bye Bye [preauth]
Apr 20 06:34:26 mx01 sshd[22774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.194.38  user=r.r
Apr 20 06:34:28 mx01 sshd[22774]: Failed password for r.r from 157.245.194.38 port 43200 ssh2
Apr 20 06:34:28 mx01 sshd[22774]: Received disconnect from 157.245.194.38: 11: Bye Bye [preauth]
Apr 20 06:38:37 mx01 sshd[23160]: Invalid user s from 157.245.194.38
Apr 20 06:38:37 mx01 sshd[23160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.194.38 
Apr 20 06:38:39 mx01 sshd[23160]: Failed password for invalid user s from 157.245.194.38 port 53080 s........
-------------------------------
2020-04-22 22:13:14
111.206.221.99 attack
Bad bot/spoofed identity
2020-04-22 22:18:28
210.9.47.154 attackbots
Apr 22 16:19:07 roki-contabo sshd\[21366\]: Invalid user test from 210.9.47.154
Apr 22 16:19:07 roki-contabo sshd\[21366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.9.47.154
Apr 22 16:19:09 roki-contabo sshd\[21366\]: Failed password for invalid user test from 210.9.47.154 port 38196 ssh2
Apr 22 16:35:39 roki-contabo sshd\[21853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.9.47.154  user=root
Apr 22 16:35:41 roki-contabo sshd\[21853\]: Failed password for root from 210.9.47.154 port 44680 ssh2
...
2020-04-22 22:49:21
173.249.63.202 attack
Apr 22 14:06:12 h2829583 sshd[3829]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.249.63.202
2020-04-22 22:12:31
187.188.90.141 attackbotsspam
Apr 22 16:08:58 ns382633 sshd\[19591\]: Invalid user jun from 187.188.90.141 port 36860
Apr 22 16:08:58 ns382633 sshd\[19591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.90.141
Apr 22 16:09:00 ns382633 sshd\[19591\]: Failed password for invalid user jun from 187.188.90.141 port 36860 ssh2
Apr 22 16:14:48 ns382633 sshd\[20564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.90.141  user=root
Apr 22 16:14:50 ns382633 sshd\[20564\]: Failed password for root from 187.188.90.141 port 41852 ssh2
2020-04-22 22:38:56
51.75.246.176 attackspam
Apr 22 15:19:01 pve1 sshd[23652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.246.176 
Apr 22 15:19:03 pve1 sshd[23652]: Failed password for invalid user lu from 51.75.246.176 port 41248 ssh2
...
2020-04-22 22:10:20
151.69.206.10 attackspam
Apr 22 17:02:20 pkdns2 sshd\[39198\]: Invalid user mk from 151.69.206.10Apr 22 17:02:22 pkdns2 sshd\[39198\]: Failed password for invalid user mk from 151.69.206.10 port 38994 ssh2Apr 22 17:06:13 pkdns2 sshd\[39410\]: Invalid user ta from 151.69.206.10Apr 22 17:06:15 pkdns2 sshd\[39410\]: Failed password for invalid user ta from 151.69.206.10 port 47498 ssh2Apr 22 17:10:06 pkdns2 sshd\[39597\]: Invalid user ro from 151.69.206.10Apr 22 17:10:07 pkdns2 sshd\[39597\]: Failed password for invalid user ro from 151.69.206.10 port 56004 ssh2
...
2020-04-22 22:37:52
223.18.77.3 attackspam
Honeypot attack, port: 5555, PTR: 3-77-18-223-on-nets.com.
2020-04-22 22:52:52

Recently Reported IPs

39.100.156.159 171.225.252.180 218.95.250.214 239.75.197.153
177.11.40.59 190.163.145.185 253.239.3.62 201.27.244.13
117.13.46.221 177.186.72.154 193.165.188.156 88.125.208.230
110.14.37.9 93.190.93.47 118.161.49.201 82.200.247.170
122.22.34.229 70.179.186.238 82.117.245.214 243.49.72.254