Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: IPv4 Superhub Limited

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Mar 11 17:37:36 josie sshd[31987]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.134.147.249  user=r.r
Mar 11 17:37:39 josie sshd[31987]: Failed password for r.r from 45.134.147.249 port 36448 ssh2
Mar 11 17:37:39 josie sshd[31988]: Received disconnect from 45.134.147.249: 11: Bye Bye
Mar 11 17:45:11 josie sshd[927]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.134.147.249  user=r.r
Mar 11 17:45:14 josie sshd[927]: Failed password for r.r from 45.134.147.249 port 44058 ssh2
Mar 11 17:45:14 josie sshd[929]: Received disconnect from 45.134.147.249: 11: Bye Bye
Mar 11 17:48:01 josie sshd[1402]: Invalid user 1 from 45.134.147.249
Mar 11 17:48:01 josie sshd[1402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.134.147.249 
Mar 11 17:48:03 josie sshd[1402]: Failed password for invalid user 1 from 45.134.147.249 port 26760 ssh2
Mar 11 17:48:03 ........
-------------------------------
2020-03-13 17:59:56
Comments on same subnet:
IP Type Details Datetime
45.134.147.120 attackbots
Jul 12 11:04:51 XXX sshd[53636]: Invalid user zhangdy from 45.134.147.120 port 51732
2020-07-12 20:10:34
45.134.147.70 attackbotsspam
Jul  9 16:31:50 server1 sshd\[20346\]: Failed password for invalid user ysw from 45.134.147.70 port 48702 ssh2
Jul  9 16:36:07 server1 sshd\[21804\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.134.147.70  user=mail
Jul  9 16:36:08 server1 sshd\[21804\]: Failed password for mail from 45.134.147.70 port 46050 ssh2
Jul  9 16:40:31 server1 sshd\[23238\]: Invalid user d from 45.134.147.70
Jul  9 16:40:31 server1 sshd\[23238\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.134.147.70 
...
2020-07-10 06:45:29
45.134.147.120 attack
'Fail2Ban'
2020-07-08 12:05:10
45.134.147.120 attack
Jun 29 06:53:33 smtp sshd[8930]: Failed password for r.r from 45.134.147.120 port 54210 ssh2
Jun 29 07:08:23 smtp sshd[11081]: Invalid user kelvin from 45.134.147.120
Jun 29 07:08:25 smtp sshd[11081]: Failed password for invalid user kelvin from 45.134.147.120 port 48080 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.134.147.120
2020-07-06 07:40:43
45.134.147.182 attack
Invalid user oracle from 45.134.147.182 port 50586
2020-07-01 12:02:26
45.134.147.120 attackbotsspam
21 attempts against mh-ssh on water
2020-06-29 16:54:34
45.134.147.80 attackbots
May 22 15:55:09 nextcloud sshd\[26114\]: Invalid user agt from 45.134.147.80
May 22 15:55:09 nextcloud sshd\[26114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.134.147.80
May 22 15:55:11 nextcloud sshd\[26114\]: Failed password for invalid user agt from 45.134.147.80 port 46030 ssh2
2020-05-23 02:42:43
45.134.147.104 attackbots
2020-04-16T08:11:00.240314mail.thespaminator.com sshd[19810]: Invalid user tg from 45.134.147.104 port 38614
2020-04-16T08:11:02.595786mail.thespaminator.com sshd[19810]: Failed password for invalid user tg from 45.134.147.104 port 38614 ssh2
...
2020-04-17 01:30:26
45.134.147.83 attackbots
Mar 20 08:04:50 vserver sshd\[29267\]: Invalid user ftp_test from 45.134.147.83Mar 20 08:04:52 vserver sshd\[29267\]: Failed password for invalid user ftp_test from 45.134.147.83 port 46958 ssh2Mar 20 08:13:52 vserver sshd\[29417\]: Invalid user kiban01 from 45.134.147.83Mar 20 08:13:53 vserver sshd\[29417\]: Failed password for invalid user kiban01 from 45.134.147.83 port 53682 ssh2
...
2020-03-20 15:24:10
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.134.147.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 847
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.134.147.249.			IN	A

;; AUTHORITY SECTION:
.			531	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031300 1800 900 604800 86400

;; Query time: 102 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 17:59:52 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 249.147.134.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 249.147.134.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.105.194.242 attackbotsspam
Jul 30 05:29:56 ip-172-31-62-245 sshd\[18017\]: Invalid user ofisher from 200.105.194.242\
Jul 30 05:29:58 ip-172-31-62-245 sshd\[18017\]: Failed password for invalid user ofisher from 200.105.194.242 port 49329 ssh2\
Jul 30 05:34:20 ip-172-31-62-245 sshd\[18085\]: Invalid user doxjal from 200.105.194.242\
Jul 30 05:34:22 ip-172-31-62-245 sshd\[18085\]: Failed password for invalid user doxjal from 200.105.194.242 port 19554 ssh2\
Jul 30 05:38:42 ip-172-31-62-245 sshd\[18137\]: Invalid user fuyujie from 200.105.194.242\
2020-07-30 14:20:07
106.54.17.235 attack
Jul 30 08:01:28 ip106 sshd[26155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.17.235 
Jul 30 08:01:30 ip106 sshd[26155]: Failed password for invalid user scf from 106.54.17.235 port 60418 ssh2
...
2020-07-30 14:34:29
120.71.145.166 attackbotsspam
Jul 30 11:24:48 gw1 sshd[28088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.71.145.166
Jul 30 11:24:51 gw1 sshd[28088]: Failed password for invalid user wangxiaoxiao from 120.71.145.166 port 54507 ssh2
...
2020-07-30 14:31:05
188.166.208.131 attack
ssh brute force
2020-07-30 14:27:27
104.198.16.231 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-30T03:51:40Z and 2020-07-30T03:53:58Z
2020-07-30 14:21:37
194.26.29.135 attackbotsspam
07/30/2020-01:24:45.876572 194.26.29.135 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-07-30 14:33:28
111.26.172.222 attackspambots
2020-07-30T00:28:59.163888linuxbox-skyline auth[97271]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=info rhost=111.26.172.222
...
2020-07-30 14:39:04
111.229.250.170 attackspam
Jul 30 11:04:11 gw1 sshd[27105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.250.170
Jul 30 11:04:13 gw1 sshd[27105]: Failed password for invalid user fchikwata from 111.229.250.170 port 43818 ssh2
...
2020-07-30 14:25:16
91.237.237.249 attackspam
(smtpauth) Failed SMTP AUTH login from 91.237.237.249 (CZ/Czechia/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-30 08:23:43 plain authenticator failed for ([91.237.237.249]) [91.237.237.249]: 535 Incorrect authentication data (set_id=info@raei-co.com)
2020-07-30 14:33:10
183.238.0.242 attack
Jul 30 02:20:39 ws24vmsma01 sshd[213192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.238.0.242
Jul 30 02:20:42 ws24vmsma01 sshd[213192]: Failed password for invalid user jiaming from 183.238.0.242 port 41581 ssh2
...
2020-07-30 14:12:35
101.91.200.186 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-30 14:29:59
31.170.123.253 attack
REQUESTED PAGE: /wp-content/plugins/wpdiscuz/assets/js/wpdiscuz-mu-backend.js
2020-07-30 14:15:17
185.118.14.203 attackspam
(smtpauth) Failed SMTP AUTH login from 185.118.14.203 (IR/Iran/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-30 08:24:03 plain authenticator failed for ([185.118.14.203]) [185.118.14.203]: 535 Incorrect authentication data (set_id=info@sadrespadana.com)
2020-07-30 14:10:51
103.224.157.233 attackspam
Port Scan
...
2020-07-30 14:09:35
114.143.139.222 attackspam
Lines containing failures of 114.143.139.222
Jul 28 17:06:50 v2hgb sshd[6218]: Invalid user yucen from 114.143.139.222 port 41508
Jul 28 17:06:50 v2hgb sshd[6218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.139.222 
Jul 28 17:06:52 v2hgb sshd[6218]: Failed password for invalid user yucen from 114.143.139.222 port 41508 ssh2
Jul 28 17:06:53 v2hgb sshd[6218]: Received disconnect from 114.143.139.222 port 41508:11: Bye Bye [preauth]
Jul 28 17:06:53 v2hgb sshd[6218]: Disconnected from invalid user yucen 114.143.139.222 port 41508 [preauth]
Jul 28 17:19:27 v2hgb sshd[7568]: Invalid user yihuan from 114.143.139.222 port 54502
Jul 28 17:19:27 v2hgb sshd[7568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.143.139.222 
Jul 28 17:19:30 v2hgb sshd[7568]: Failed password for invalid user yihuan from 114.143.139.222 port 54502 ssh2
Jul 28 17:19:32 v2hgb sshd[7568]: Received disconnect ........
------------------------------
2020-07-30 14:14:20

Recently Reported IPs

205.255.101.53 108.32.255.46 163.113.201.141 103.129.223.22
173.127.123.107 32.36.99.121 64.11.191.169 180.140.75.102
64.142.206.216 228.231.183.150 153.67.116.94 138.255.220.19
181.30.53.78 178.171.90.131 67.100.100.222 154.223.171.100
49.204.36.56 120.3.163.151 209.152.138.34 17.105.225.89