Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Viet Nam

Internet Service Provider: Vietnam F Tech. JSC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Jul  2 15:54:39 itv-usvr-02 sshd[13902]: Invalid user 1 from 45.125.239.47 port 49036
Jul  2 15:54:39 itv-usvr-02 sshd[13902]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.125.239.47
Jul  2 15:54:39 itv-usvr-02 sshd[13902]: Invalid user 1 from 45.125.239.47 port 49036
Jul  2 15:54:41 itv-usvr-02 sshd[13902]: Failed password for invalid user 1 from 45.125.239.47 port 49036 ssh2
Jul  2 15:54:54 itv-usvr-02 sshd[13904]: Invalid user 1 from 45.125.239.47 port 53932
2019-07-02 18:42:22
Comments on same subnet:
IP Type Details Datetime
45.125.239.155 attackspam
Brute forcing RDP port 3389
2020-08-19 03:22:32
45.125.239.234 attackspam
WordPress wp-login brute force :: 45.125.239.234 0.092 BYPASS [08/Jan/2020:13:06:23  0000] [censored_4] "POST /wp-login.php HTTP/1.1" 200 2100 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-01-08 21:43:55
45.125.239.234 attackspam
Automatic report generated by Wazuh
2020-01-05 18:13:17
45.125.239.234 attack
45.125.239.234 - - \[30/Dec/2019:07:30:57 +0100\] "POST /wp-login.php HTTP/1.0" 200 7544 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.125.239.234 - - \[30/Dec/2019:07:31:00 +0100\] "POST /wp-login.php HTTP/1.0" 200 7411 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.125.239.234 - - \[30/Dec/2019:07:31:03 +0100\] "POST /wp-login.php HTTP/1.0" 200 7407 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-12-30 15:01:26
45.125.239.234 attack
Wordpress login scanning
2019-12-26 08:38:12
45.125.239.234 attack
SS5,WP GET /cms/wp-login.php
2019-12-26 06:35:42
45.125.239.23 attack
Automatic report - XMLRPC Attack
2019-11-12 18:04:42
45.125.239.95 attackspambots
RDP Brute-Force (Grieskirchen RZ1)
2019-09-07 10:46:37
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.125.239.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58063
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.125.239.47.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050600 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon May 06 16:26:50 +08 2019
;; MSG SIZE  rcvd: 117

Host info
47.239.125.45.in-addr.arpa domain name pointer static.ftech.vn.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
47.239.125.45.in-addr.arpa	name = static.ftech.vn.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
202.51.74.189 attackbots
Automatic report - Banned IP Access
2019-09-20 09:32:45
200.207.220.128 attackbots
Sep 19 15:09:14 hanapaa sshd\[21495\]: Invalid user admin from 200.207.220.128
Sep 19 15:09:14 hanapaa sshd\[21495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-207-220-128.dsl.telesp.net.br
Sep 19 15:09:16 hanapaa sshd\[21495\]: Failed password for invalid user admin from 200.207.220.128 port 34970 ssh2
Sep 19 15:13:44 hanapaa sshd\[21888\]: Invalid user e from 200.207.220.128
Sep 19 15:13:44 hanapaa sshd\[21888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-207-220-128.dsl.telesp.net.br
2019-09-20 09:14:21
109.215.76.59 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 20:29:13.
2019-09-20 08:58:12
198.50.175.247 attack
Sep 19 21:28:22 apollo sshd\[4296\]: Invalid user kafka from 198.50.175.247Sep 19 21:28:24 apollo sshd\[4296\]: Failed password for invalid user kafka from 198.50.175.247 port 59101 ssh2Sep 19 21:41:31 apollo sshd\[4338\]: Invalid user chris from 198.50.175.247
...
2019-09-20 08:45:47
45.80.65.80 attackbots
2019-09-20T01:13:28.821942abusebot-8.cloudsearch.cf sshd\[20189\]: Invalid user docserver from 45.80.65.80 port 46944
2019-09-20 09:29:56
50.63.165.245 attack
Automatic report - Banned IP Access
2019-09-20 09:14:04
51.158.113.194 attack
Sep 20 03:13:20 plex sshd[19057]: Invalid user deluge from 51.158.113.194 port 51156
2019-09-20 09:34:10
54.37.71.235 attack
Sep 20 02:30:49 vps01 sshd[19643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.71.235
Sep 20 02:30:51 vps01 sshd[19643]: Failed password for invalid user budget from 54.37.71.235 port 47538 ssh2
2019-09-20 09:05:27
190.55.63.8 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 19-09-2019 20:29:15.
2019-09-20 08:57:09
136.36.8.172 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-09-20 08:50:13
149.202.55.18 attack
Sep 20 06:43:40 areeb-Workstation sshd[12925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.55.18
Sep 20 06:43:41 areeb-Workstation sshd[12925]: Failed password for invalid user super from 149.202.55.18 port 49976 ssh2
...
2019-09-20 09:17:24
79.95.208.105 attackspambots
TCP Port: 25 _    invalid blocked  abuseat-org  barracudacentral _  _  _ _ (198)
2019-09-20 09:14:44
222.186.180.21 attack
Sep 20 04:20:25 www sshd\[176429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.21  user=root
Sep 20 04:20:27 www sshd\[176429\]: Failed password for root from 222.186.180.21 port 39696 ssh2
Sep 20 04:20:31 www sshd\[176429\]: Failed password for root from 222.186.180.21 port 39696 ssh2
...
2019-09-20 09:21:17
81.243.166.223 attackspambots
Tried sshing with brute force.
2019-09-20 08:54:03
107.180.68.110 attackspam
Sep 19 14:50:32 hpm sshd\[17371\]: Invalid user install from 107.180.68.110
Sep 19 14:50:32 hpm sshd\[17371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-107-180-68-110.ip.secureserver.net
Sep 19 14:50:34 hpm sshd\[17371\]: Failed password for invalid user install from 107.180.68.110 port 51369 ssh2
Sep 19 14:54:08 hpm sshd\[17693\]: Invalid user sinus from 107.180.68.110
Sep 19 14:54:08 hpm sshd\[17693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-107-180-68-110.ip.secureserver.net
2019-09-20 09:06:37

Recently Reported IPs

153.92.4.129 85.236.165.254 182.23.95.52 3.120.246.110
163.172.22.247 47.95.223.159 189.124.138.66 177.8.228.190
122.97.206.13 103.99.0.185 87.251.86.19 81.8.66.202
211.106.110.49 111.93.205.186 148.240.94.16 71.6.233.190
82.221.128.73 113.160.204.73 108.163.151.48 186.193.24.136