Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Lithuania

Internet Service Provider: Tele Asia Limited

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbotsspam
Dec 24 06:39:03 web1 postfix/smtpd[21423]: warning: unknown[45.125.66.35]: SASL LOGIN authentication failed: authentication failure
...
2019-12-24 20:49:27
attackbotsspam
2019-12-06 dovecot_login authenticator failed for \(User\) \[45.125.66.35\]: 535 Incorrect authentication data \(set_id=reception12@**REMOVED**.**REMOVED**\)
2019-12-06 dovecot_login authenticator failed for \(User\) \[45.125.66.35\]: 535 Incorrect authentication data \(set_id=reception12@**REMOVED**.**REMOVED**\)
2019-12-06 dovecot_login authenticator failed for \(User\) \[45.125.66.35\]: 535 Incorrect authentication data \(set_id=reception12@**REMOVED**.**REMOVED**\)
2019-12-07 01:51:07
attackbots
Oct 17 16:01:20 vmanager6029 postfix/smtpd\[3651\]: warning: unknown\[45.125.66.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 17 16:09:28 vmanager6029 postfix/smtpd\[3566\]: warning: unknown\[45.125.66.35\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-10-17 22:49:08
Comments on same subnet:
IP Type Details Datetime
45.125.66.22 attackbots
(ftpd) Failed FTP login from 45.125.66.22 (LT/Republic of Lithuania/-): 5 in the last 3600 secs; Ports: 20,21; Direction: in; Trigger: LF_FTPD; Logs: Oct 14 01:10:24 hostingremote proftpd[702140]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading (Login failed): Incorrect password
Oct 14 01:10:25 hostingremote proftpd[702141]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21
Oct 14 01:10:25 hostingremote proftpd[702142]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER admin@akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21
Oct 14 01:10:25 hostingremote proftpd[702144]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading@akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21
Oct 14 01:10:25 hostingremote proftpd[702145]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttradi: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21
2020-10-14 03:56:58
45.125.66.22 attackspambots
proto=tcp  .  spt=61669  .  dpt=110  .  src=45.125.66.22  .  dst=xx.xx.4.1  .       Found on   Github Combined on 3 lists      (58)
2020-10-13 19:17:53
45.125.66.21 attackspambots
Tried our host z.
2020-09-28 02:06:03
45.125.66.21 attackbots
Tried our host z.
2020-09-27 18:10:29
45.125.66.137 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018
2020-09-26 08:00:09
45.125.66.137 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018
2020-09-26 01:15:10
45.125.66.137 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018
2020-09-25 16:52:35
45.125.66.26 attackbotsspam
Firewall Dropped Connection
2020-08-26 02:29:25
45.125.66.22 attackbots
(ftpd) Failed FTP login from 45.125.66.22 (LT/Republic of Lithuania/-): 10 in the last 3600 secs
2020-08-13 19:49:57
45.125.66.205 attackspam
[2020-06-17 08:05:13] NOTICE[1273][C-00001dce] chan_sip.c: Call from '' (45.125.66.205:5070) to extension '442037697412' rejected because extension not found in context 'public'.
[2020-06-17 08:05:13] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-17T08:05:13.562-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="442037697412",SessionID="0x7f31c02f97a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.205/5070",ACLName="no_extension_match"
[2020-06-17 08:05:13] NOTICE[1273][C-00001dcf] chan_sip.c: Call from '' (45.125.66.205:5070) to extension '00442037697412' rejected because extension not found in context 'public'.
[2020-06-17 08:05:13] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-17T08:05:13.905-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00442037697412",SessionID="0x7f31c02f97a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.2
...
2020-06-17 20:44:21
45.125.66.204 attackbotsspam
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=1024)(04301449)
2020-05-01 01:46:02
45.125.66.168 attack
Rude login attack (7 tries in 1d)
2020-02-16 08:11:35
45.125.66.212 attack
Rude login attack (6 tries in 1d)
2020-02-16 08:07:45
45.125.66.68 attack
Rude login attack (4 tries in 1d)
2020-02-16 08:01:43
45.125.66.231 attackbots
Rude login attack (4 tries in 1d)
2020-02-16 07:59:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.125.66.35
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5867
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.125.66.35.			IN	A

;; AUTHORITY SECTION:
.			524	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101700 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 17 22:49:05 CST 2019
;; MSG SIZE  rcvd: 116
Host info
35.66.125.45.in-addr.arpa domain name pointer mx3.superoferta.poa.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
35.66.125.45.in-addr.arpa	name = mx3.superoferta.poa.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.40.187.217 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:07:58
200.164.7.164 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:22:51
201.174.134.201 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:11:19
200.240.238.170 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:19:58
198.108.66.194 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:39:25
201.137.157.215 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:13:19
201.149.57.154 attackbots
Unauthorized connection attempt from IP address 201.149.57.154 on Port 445(SMB)
2020-03-02 07:12:00
201.132.110.82 attackbots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:13:45
198.108.67.40 attackbotsspam
" "
2020-03-02 07:37:48
198.108.67.89 attack
ET DROP Dshield Block Listed Source group 1 - port: 8883 proto: TCP cat: Misc Attack
2020-03-02 07:33:03
198.108.67.88 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:33:29
198.46.135.194 attack
03/01/2020-18:37:54.165131 198.46.135.194 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-02 07:41:39
202.62.8.195 attackspam
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:07:24
201.234.67.235 attack
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:08:38
198.108.67.91 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-03-02 07:32:31

Recently Reported IPs

198.108.67.140 60.10.205.173 185.202.129.2 203.205.195.89
185.243.51.30 117.27.76.55 45.143.220.9 186.67.115.166
177.41.82.118 115.79.193.53 113.231.20.234 157.39.234.18
189.112.63.102 114.95.173.181 190.130.4.212 2001:b07:6469:f280:7051:a0b0:b4cf:a5be
194.50.254.224 195.162.70.105 122.166.159.56 46.187.59.240