Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dhaka

Region: Dhaka

Country: Bangladesh

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.125.222.120 attack
Oct  3 23:52:28 ns382633 sshd\[15976\]: Invalid user wp-user from 45.125.222.120 port 43078
Oct  3 23:52:28 ns382633 sshd\[15976\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120
Oct  3 23:52:30 ns382633 sshd\[15976\]: Failed password for invalid user wp-user from 45.125.222.120 port 43078 ssh2
Oct  4 00:03:52 ns382633 sshd\[17282\]: Invalid user deployer from 45.125.222.120 port 60982
Oct  4 00:03:52 ns382633 sshd\[17282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120
2020-10-04 06:05:39
45.125.222.120 attack
Invalid user ftptest from 45.125.222.120 port 41354
2020-10-03 22:06:40
45.125.222.120 attackbots
Invalid user testing from 45.125.222.120 port 49426
2020-10-03 13:51:33
45.125.222.120 attack
Sep 28 16:58:36 ns308116 sshd[545]: Invalid user ftpuser from 45.125.222.120 port 56524
Sep 28 16:58:36 ns308116 sshd[545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120
Sep 28 16:58:38 ns308116 sshd[545]: Failed password for invalid user ftpuser from 45.125.222.120 port 56524 ssh2
Sep 28 17:02:54 ns308116 sshd[10458]: Invalid user ttt from 45.125.222.120 port 56182
Sep 28 17:02:54 ns308116 sshd[10458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120
...
2020-09-29 02:04:13
45.125.222.120 attack
Sep 28 05:33:52 ip106 sshd[26049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120 
Sep 28 05:33:54 ip106 sshd[26049]: Failed password for invalid user ubuntu from 45.125.222.120 port 39236 ssh2
...
2020-09-28 18:10:42
45.125.222.120 attackspam
Invalid user metro from 45.125.222.120 port 37588
2020-09-03 22:59:22
45.125.222.120 attack
Sep  3 06:14:50 cp sshd[2963]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120
2020-09-03 14:35:34
45.125.222.120 attack
Automatic report - Banned IP Access
2020-09-03 06:48:39
45.125.222.120 attack
Aug 29 13:58:53 meumeu sshd[583792]: Invalid user todus from 45.125.222.120 port 47282
Aug 29 13:58:53 meumeu sshd[583792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120 
Aug 29 13:58:53 meumeu sshd[583792]: Invalid user todus from 45.125.222.120 port 47282
Aug 29 13:58:54 meumeu sshd[583792]: Failed password for invalid user todus from 45.125.222.120 port 47282 ssh2
Aug 29 14:03:25 meumeu sshd[584245]: Invalid user administrator from 45.125.222.120 port 51430
Aug 29 14:03:25 meumeu sshd[584245]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120 
Aug 29 14:03:25 meumeu sshd[584245]: Invalid user administrator from 45.125.222.120 port 51430
Aug 29 14:03:28 meumeu sshd[584245]: Failed password for invalid user administrator from 45.125.222.120 port 51430 ssh2
Aug 29 14:07:44 meumeu sshd[584400]: Invalid user inoue from 45.125.222.120 port 55578
...
2020-08-30 00:43:26
45.125.222.120 attackbotsspam
SSH Bruteforce attack
2020-08-28 18:00:52
45.125.222.120 attackspam
Aug 24 12:01:49 firewall sshd[24305]: Invalid user wangjing from 45.125.222.120
Aug 24 12:01:51 firewall sshd[24305]: Failed password for invalid user wangjing from 45.125.222.120 port 41104 ssh2
Aug 24 12:04:17 firewall sshd[24381]: Invalid user apt-mirror from 45.125.222.120
...
2020-08-25 00:11:30
45.125.222.120 attackbots
2020-08-18T14:30:13.671413vps773228.ovh.net sshd[14609]: Failed password for root from 45.125.222.120 port 53012 ssh2
2020-08-18T14:34:45.877162vps773228.ovh.net sshd[14691]: Invalid user tj from 45.125.222.120 port 33296
2020-08-18T14:34:45.884984vps773228.ovh.net sshd[14691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120
2020-08-18T14:34:45.877162vps773228.ovh.net sshd[14691]: Invalid user tj from 45.125.222.120 port 33296
2020-08-18T14:34:48.195485vps773228.ovh.net sshd[14691]: Failed password for invalid user tj from 45.125.222.120 port 33296 ssh2
...
2020-08-18 21:48:26
45.125.222.120 attackspambots
Aug 17 00:34:50 vpn01 sshd[23782]: Failed password for root from 45.125.222.120 port 50274 ssh2
...
2020-08-17 07:12:11
45.125.222.120 attackspam
Jul 31 13:45:24 web8 sshd\[16748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120  user=root
Jul 31 13:45:26 web8 sshd\[16748\]: Failed password for root from 45.125.222.120 port 39158 ssh2
Jul 31 13:48:20 web8 sshd\[18323\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120  user=root
Jul 31 13:48:22 web8 sshd\[18323\]: Failed password for root from 45.125.222.120 port 51658 ssh2
Jul 31 13:51:20 web8 sshd\[19987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.222.120  user=root
2020-07-31 21:58:27
45.125.222.120 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-07-28 23:03:56
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.125.222.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3719
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.125.222.52.			IN	A

;; AUTHORITY SECTION:
.			297	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023050601 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 07 04:47:00 CST 2023
;; MSG SIZE  rcvd: 106
Host info
52.222.125.45.in-addr.arpa domain name pointer 45-125-222-52.dhaka.carnival.com.bd.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.222.125.45.in-addr.arpa	name = 45-125-222-52.dhaka.carnival.com.bd.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.224.240.250 attack
SSH Brute-Force reported by Fail2Ban
2019-10-20 05:27:06
222.186.175.148 attackbotsspam
Oct 19 23:33:21 vpn01 sshd[7892]: Failed password for root from 222.186.175.148 port 51378 ssh2
Oct 19 23:33:32 vpn01 sshd[7892]: Failed password for root from 222.186.175.148 port 51378 ssh2
...
2019-10-20 05:33:43
188.213.49.121 attack
Invalid user scp from 188.213.49.121 port 39808
2019-10-20 05:28:26
54.39.18.237 attackbots
Oct 19 23:19:04 SilenceServices sshd[11129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.18.237
Oct 19 23:19:06 SilenceServices sshd[11129]: Failed password for invalid user zzzzzzz2000 from 54.39.18.237 port 56976 ssh2
Oct 19 23:22:58 SilenceServices sshd[12455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.18.237
2019-10-20 05:34:08
222.186.180.41 attack
2019-10-19T21:22:27.441452abusebot.cloudsearch.cf sshd\[13915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
2019-10-20 05:24:57
46.214.118.175 attack
Attempts to probe for or exploit a Drupal site on url: /wp-login.php. Reported by the module https://www.drupal.org/project/abuseipdb.
2019-10-20 05:08:08
23.95.84.82 attack
Automatic report - Port Scan Attack
2019-10-20 05:11:35
185.209.0.89 attackspambots
Port scan on 11 port(s): 53384 53385 53386 53393 53394 53400 53402 53403 53404 53405 53410
2019-10-20 05:12:25
43.231.61.146 attackspambots
Oct 19 22:48:08 dedicated sshd[14447]: Failed password for root from 43.231.61.146 port 58910 ssh2
Oct 19 22:52:39 dedicated sshd[15004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.231.61.146  user=root
Oct 19 22:52:42 dedicated sshd[15004]: Failed password for root from 43.231.61.146 port 41668 ssh2
Oct 19 22:52:39 dedicated sshd[15004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.231.61.146  user=root
Oct 19 22:52:42 dedicated sshd[15004]: Failed password for root from 43.231.61.146 port 41668 ssh2
2019-10-20 05:02:02
14.21.7.162 attackbotsspam
Oct 19 10:52:38 auw2 sshd\[16890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.21.7.162  user=root
Oct 19 10:52:40 auw2 sshd\[16890\]: Failed password for root from 14.21.7.162 port 8491 ssh2
Oct 19 10:57:09 auw2 sshd\[17265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.21.7.162  user=root
Oct 19 10:57:11 auw2 sshd\[17265\]: Failed password for root from 14.21.7.162 port 8492 ssh2
Oct 19 11:01:42 auw2 sshd\[17649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.21.7.162  user=root
2019-10-20 05:16:09
139.155.105.217 attack
Oct 19 22:52:49 [host] sshd[20081]: Invalid user gmodserv from 139.155.105.217
Oct 19 22:52:49 [host] sshd[20081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.105.217
Oct 19 22:52:50 [host] sshd[20081]: Failed password for invalid user gmodserv from 139.155.105.217 port 34334 ssh2
2019-10-20 05:13:15
222.186.175.150 attackbots
2019-10-19T21:20:25.216565abusebot-8.cloudsearch.cf sshd\[10901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
2019-10-20 05:22:07
122.228.89.67 attackbotsspam
Oct 19 22:12:31 vmanager6029 sshd\[2121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.228.89.67  user=root
Oct 19 22:12:34 vmanager6029 sshd\[2121\]: Failed password for root from 122.228.89.67 port 19108 ssh2
Oct 19 22:16:46 vmanager6029 sshd\[2171\]: Invalid user 123 from 122.228.89.67 port 39076
2019-10-20 05:16:57
202.138.233.162 attackspam
postfix (unknown user, SPF fail or relay access denied)
2019-10-20 05:18:13
187.177.182.221 attack
Automatic report - Port Scan Attack
2019-10-20 05:30:00

Recently Reported IPs

104.229.3.85 188.166.206.211 210.103.234.234 210.109.178.234
203.228.233.106 211.255.225.175 36.237.54.42 232.214.28.156
122.187.70.155 74.226.143.67 78.157.186.220 90.230.249.4
241.233.183.97 126.239.99.110 185.69.24.5 165.193.247.211
162.241.89.24 48.18.196.109 14.183.174.229 180.41.145.254