Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.125.66.22 attackbots
(ftpd) Failed FTP login from 45.125.66.22 (LT/Republic of Lithuania/-): 5 in the last 3600 secs; Ports: 20,21; Direction: in; Trigger: LF_FTPD; Logs: Oct 14 01:10:24 hostingremote proftpd[702140]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading (Login failed): Incorrect password
Oct 14 01:10:25 hostingremote proftpd[702141]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21
Oct 14 01:10:25 hostingremote proftpd[702142]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER admin@akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21
Oct 14 01:10:25 hostingremote proftpd[702144]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttrading@akttrading.com: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21
Oct 14 01:10:25 hostingremote proftpd[702145]: 0.0.0.0 (45.125.66.22[45.125.66.22]) - USER akttradi: no such user found from 45.125.66.22 [45.125.66.22] to 88.99.147.18:21
2020-10-14 03:56:58
45.125.66.22 attackspambots
proto=tcp  .  spt=61669  .  dpt=110  .  src=45.125.66.22  .  dst=xx.xx.4.1  .       Found on   Github Combined on 3 lists      (58)
2020-10-13 19:17:53
45.125.66.21 attackspambots
Tried our host z.
2020-09-28 02:06:03
45.125.66.21 attackbots
Tried our host z.
2020-09-27 18:10:29
45.125.66.137 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018
2020-09-26 08:00:09
45.125.66.137 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018
2020-09-26 01:15:10
45.125.66.137 attackspambots
lfd: (smtpauth) Failed SMTP AUTH login from 45.125.66.137 (mex.creativityconsultation.com): 5 in the last 3600 secs - Wed Aug 29 11:51:07 2018
2020-09-25 16:52:35
45.125.66.26 attackbotsspam
Firewall Dropped Connection
2020-08-26 02:29:25
45.125.66.22 attackbots
(ftpd) Failed FTP login from 45.125.66.22 (LT/Republic of Lithuania/-): 10 in the last 3600 secs
2020-08-13 19:49:57
45.125.66.205 attackspam
[2020-06-17 08:05:13] NOTICE[1273][C-00001dce] chan_sip.c: Call from '' (45.125.66.205:5070) to extension '442037697412' rejected because extension not found in context 'public'.
[2020-06-17 08:05:13] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-17T08:05:13.562-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="442037697412",SessionID="0x7f31c02f97a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.205/5070",ACLName="no_extension_match"
[2020-06-17 08:05:13] NOTICE[1273][C-00001dcf] chan_sip.c: Call from '' (45.125.66.205:5070) to extension '00442037697412' rejected because extension not found in context 'public'.
[2020-06-17 08:05:13] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-17T08:05:13.905-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00442037697412",SessionID="0x7f31c02f97a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.2
...
2020-06-17 20:44:21
45.125.66.204 attackbotsspam
[portscan] tcp/81 [alter-web/web-proxy]
*(RWIN=1024)(04301449)
2020-05-01 01:46:02
45.125.66.168 attack
Rude login attack (7 tries in 1d)
2020-02-16 08:11:35
45.125.66.212 attack
Rude login attack (6 tries in 1d)
2020-02-16 08:07:45
45.125.66.68 attack
Rude login attack (4 tries in 1d)
2020-02-16 08:01:43
45.125.66.231 attackbots
Rude login attack (4 tries in 1d)
2020-02-16 07:59:20
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.125.66.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.125.66.64.			IN	A

;; AUTHORITY SECTION:
.			113	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062402 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 25 11:23:49 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 64.66.125.45.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 64.66.125.45.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
67.205.135.127 attack
Aug 29 06:29:47 OPSO sshd\[30762\]: Invalid user libuuid from 67.205.135.127 port 47438
Aug 29 06:29:47 OPSO sshd\[30762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.127
Aug 29 06:29:49 OPSO sshd\[30762\]: Failed password for invalid user libuuid from 67.205.135.127 port 47438 ssh2
Aug 29 06:33:38 OPSO sshd\[31542\]: Invalid user jupiter from 67.205.135.127 port 35362
Aug 29 06:33:38 OPSO sshd\[31542\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.135.127
2019-08-29 12:37:09
212.248.126.226 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-28 22:04:24,773 INFO [amun_request_handler] PortScan Detected on Port: 445 (212.248.126.226)
2019-08-29 12:11:23
177.184.245.86 attackbotsspam
Currently 7 failed/unauthorized logins attempts via SMTP/IMAP whostnameh 7 different usernames and wrong password:
2019-08-29T01:13:20+02:00 x@x
2019-08-16T07:22:59+02:00 x@x
2019-08-06T01:27:19+02:00 x@x
2019-08-04T12:25:36+02:00 x@x
2019-08-01T05:05:57+02:00 x@x
2019-07-29T13:51:16+02:00 x@x
2019-07-08T02:46:29+02:00 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=177.184.245.86
2019-08-29 12:41:40
68.183.124.72 attackspambots
Aug 29 05:36:14 icinga sshd[21615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.72 
Aug 29 05:36:16 icinga sshd[21615]: Failed password for invalid user dq from 68.183.124.72 port 57984 ssh2
Aug 29 05:40:14 icinga sshd[24450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.124.72 
...
2019-08-29 12:46:41
66.249.65.112 attackspam
Automatic report - Banned IP Access
2019-08-29 12:32:43
119.61.26.165 attackspambots
Aug 28 18:00:27 auw2 sshd\[29966\]: Invalid user maximilian from 119.61.26.165
Aug 28 18:00:27 auw2 sshd\[29966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.61.26.165
Aug 28 18:00:29 auw2 sshd\[29966\]: Failed password for invalid user maximilian from 119.61.26.165 port 37783 ssh2
Aug 28 18:05:36 auw2 sshd\[30490\]: Invalid user ritmo from 119.61.26.165
Aug 28 18:05:36 auw2 sshd\[30490\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.61.26.165
2019-08-29 12:21:08
159.65.81.187 attackspam
Aug 29 06:02:18 vpn01 sshd\[6494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.81.187  user=root
Aug 29 06:02:20 vpn01 sshd\[6494\]: Failed password for root from 159.65.81.187 port 48930 ssh2
Aug 29 06:07:17 vpn01 sshd\[6510\]: Invalid user test from 159.65.81.187
2019-08-29 12:24:04
94.226.255.121 attackspambots
2019-08-29T01:49:17.662506centos sshd\[32742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94-226-255-121.access.telenet.be  user=root
2019-08-29T01:49:19.517307centos sshd\[32742\]: Failed password for root from 94.226.255.121 port 33788 ssh2
2019-08-29T01:49:22.834275centos sshd\[32742\]: Failed password for root from 94.226.255.121 port 33788 ssh2
2019-08-29 12:40:39
14.189.165.17 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-28 22:01:03,059 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.189.165.17)
2019-08-29 12:40:02
45.55.187.39 attackspambots
Aug 29 04:07:00 mail sshd\[1667\]: Invalid user admin from 45.55.187.39
Aug 29 04:07:00 mail sshd\[1667\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.187.39
Aug 29 04:07:02 mail sshd\[1667\]: Failed password for invalid user admin from 45.55.187.39 port 60594 ssh2
...
2019-08-29 12:14:00
107.170.200.60 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-28 22:05:07,260 INFO [amun_request_handler] unknown vuln (Attacker: 107.170.200.60 Port: 587, Mess: ['\x16\x03\x01\x00\x9a\x01\x00\x00\x96\x03\x03\xa0xPz!]\x9e\x9cN\x00RG\xad[\xe8\xb6\xdavi\xa1M\xe2\x11"\xa5\xe7\x8d\xc4>n\xf6\xa2\x00\x00\x1a\xc0/\xc0 \xc0\x11\xc0\x07\xc0\x13\xc0\t\xc0\x14\xc0\n\x00\x05\x00/\x005\xc0\x12\x00\n\x01\x00\x00S\x00\x05\x00\x05\x01\x00\x00\x00\x00\x00\n\x00\x08\x00\x06\x00\x17\x00\x18\x00\x19\x00\x0b\x00\x02\x01\x00\x00\r\x00
2019-08-29 12:06:18
200.116.195.122 attackbotsspam
Aug 28 18:10:39 hiderm sshd\[2227\]: Invalid user oracle from 200.116.195.122
Aug 28 18:10:39 hiderm sshd\[2227\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.195.122
Aug 28 18:10:41 hiderm sshd\[2227\]: Failed password for invalid user oracle from 200.116.195.122 port 51162 ssh2
Aug 28 18:15:17 hiderm sshd\[2657\]: Invalid user loop from 200.116.195.122
Aug 28 18:15:17 hiderm sshd\[2657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.116.195.122
2019-08-29 12:25:35
138.197.147.233 attackspambots
Aug 28 18:30:56 lcprod sshd\[511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.233  user=root
Aug 28 18:30:58 lcprod sshd\[511\]: Failed password for root from 138.197.147.233 port 56166 ssh2
Aug 28 18:35:04 lcprod sshd\[940\]: Invalid user bz from 138.197.147.233
Aug 28 18:35:04 lcprod sshd\[940\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.147.233
Aug 28 18:35:06 lcprod sshd\[940\]: Failed password for invalid user bz from 138.197.147.233 port 45038 ssh2
2019-08-29 12:39:43
148.71.186.43 attackspambots
Aug 29 05:49:08 server sshd\[2146\]: Invalid user admin from 148.71.186.43 port 40632
Aug 29 05:49:08 server sshd\[2146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.71.186.43
Aug 29 05:49:10 server sshd\[2146\]: Failed password for invalid user admin from 148.71.186.43 port 40632 ssh2
Aug 29 05:54:42 server sshd\[30806\]: User root from 148.71.186.43 not allowed because listed in DenyUsers
Aug 29 05:54:42 server sshd\[30806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.71.186.43  user=root
2019-08-29 12:08:04
118.96.190.163 attackbots
MYH,DEF GET /downloader/
2019-08-29 12:16:28

Recently Reported IPs

137.226.55.9 192.241.222.20 137.226.54.160 137.226.55.31
137.226.70.140 124.221.82.113 137.226.152.98 137.226.55.47
137.226.88.169 43.156.0.113 137.226.25.88 61.156.91.162
61.175.121.210 167.179.162.50 137.226.110.209 137.226.12.184
137.226.88.234 137.226.152.112 137.226.155.228 143.198.78.62