Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: ComTrade LLC

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-01 02:15:26
attackspam
Oct 25 13:01:32 mc1 kernel: \[3287632.951781\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.207 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=21979 PROTO=TCP SPT=51124 DPT=9053 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 25 13:06:01 mc1 kernel: \[3287901.360932\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.207 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=23677 PROTO=TCP SPT=51124 DPT=8050 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 25 13:08:23 mc1 kernel: \[3288043.299608\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.207 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=31175 PROTO=TCP SPT=51124 DPT=8065 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-25 19:23:51
attackbots
Oct 12 11:38:15 h2177944 kernel: \[3749122.845379\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.207 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=57897 PROTO=TCP SPT=43777 DPT=3362 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 12 11:42:58 h2177944 kernel: \[3749406.164028\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.207 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=26684 PROTO=TCP SPT=43777 DPT=3327 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 12 11:46:28 h2177944 kernel: \[3749615.765224\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.207 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=26122 PROTO=TCP SPT=43777 DPT=3392 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 12 11:55:46 h2177944 kernel: \[3750174.247894\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.207 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=29351 PROTO=TCP SPT=43777 DPT=3376 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 12 12:09:10 h2177944 kernel: \[3750977.325503\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.207 DST=85.214.
2019-10-12 18:45:36
Comments on same subnet:
IP Type Details Datetime
45.136.109.219 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 26 - port: 6000 proto: tcp cat: Misc Attackbytes: 60
2020-08-19 23:39:13
45.136.109.219 attackspam
slow and persistent scanner
2020-08-17 20:34:11
45.136.109.251 attackbotsspam
Port scanning [3 denied]
2020-08-14 14:18:15
45.136.109.219 attackbots
 TCP (SYN) 45.136.109.219:50230 -> port 53, len 44
2020-08-07 08:11:38
45.136.109.219 attackbotsspam
[Tue Aug 04 17:47:28 2020] - DDoS Attack From IP: 45.136.109.219 Port: 41096
2020-08-06 18:31:50
45.136.109.219 attack
 TCP (SYN) 45.136.109.219:43869 -> port 53, len 44
2020-08-05 23:34:34
45.136.109.158 attack
Unauthorized connection attempt detected from IP address 45.136.109.158 to port 3389
2020-07-22 15:39:59
45.136.109.87 attack
BruteForce RDP attempts from 45.136.109.175
2020-07-17 14:21:12
45.136.109.158 attack
SmallBizIT.US 2 packets to tcp(3389,3391)
2020-07-07 12:28:14
45.136.109.158 attackbots
Unauthorized connection attempt detected from IP address 45.136.109.158 to port 4489 [T]
2020-07-05 22:47:55
45.136.109.175 attackspambots
Icarus honeypot on github
2020-07-02 08:25:18
45.136.109.251 attackbots
Multiport scan : 15 ports scanned 2888 3381 3382 3402 3420 3501 3502 4003 4018 5909 7926 8093 9000 9261 9833
2020-06-21 07:47:48
45.136.109.219 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 6389 proto: TCP cat: Misc Attack
2020-06-06 08:47:05
45.136.109.222 attackspam
Mar 22 03:57:09 src: 45.136.109.222 signature match: "BACKDOOR NetSphere Connection attempt" (sid: 100044) tcp port: 30100
2020-03-22 12:01:46
45.136.109.222 attackbotsspam
Mar 18 22:14:16 src: 45.136.109.222 signature match: "BACKDOOR Subseven connection attempt" (sid: 100207) tcp port: 27374
2020-03-19 06:22:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.136.109.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26556
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.136.109.207.			IN	A

;; AUTHORITY SECTION:
.			568	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019101200 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 12 18:45:33 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 207.109.136.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.109.136.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.121.54.24 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-13 11:36:53
177.129.205.146 attackbots
failed_logins
2019-08-13 11:18:13
155.94.129.83 attackbots
Port Scan: TCP/443
2019-08-13 11:47:03
130.61.229.117 attackbots
SASL PLAIN auth failed: ruser=...
2019-08-13 11:40:43
138.122.37.153 attackbotsspam
SASL PLAIN auth failed: ruser=...
2019-08-13 11:35:22
103.207.11.12 attackbots
Aug 12 20:20:21 vps200512 sshd\[15828\]: Invalid user ya from 103.207.11.12
Aug 12 20:20:21 vps200512 sshd\[15828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.12
Aug 12 20:20:23 vps200512 sshd\[15828\]: Failed password for invalid user ya from 103.207.11.12 port 54466 ssh2
Aug 12 20:26:13 vps200512 sshd\[15965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.207.11.12  user=root
Aug 12 20:26:15 vps200512 sshd\[15965\]: Failed password for root from 103.207.11.12 port 47054 ssh2
2019-08-13 11:58:07
114.34.121.218 attackbotsspam
23/tcp 81/tcp 23/tcp
[2019-07-19/08-12]3pkt
2019-08-13 11:52:23
177.21.196.177 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-13 11:25:30
177.129.206.210 attackspambots
SASL PLAIN auth failed: ruser=...
2019-08-13 11:16:34
185.176.27.186 attack
08/12/2019-22:41:09.586359 185.176.27.186 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-13 11:55:10
177.21.206.80 attackspambots
SASL PLAIN auth failed: ruser=...
2019-08-13 11:25:09
177.11.113.76 attackspam
SASL PLAIN auth failed: ruser=...
2019-08-13 11:26:54
177.154.77.215 attackbots
SASL PLAIN auth failed: ruser=...
2019-08-13 11:09:41
143.0.140.62 attack
SASL PLAIN auth failed: ruser=...
2019-08-13 11:33:17
157.119.28.79 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-13 11:43:50

Recently Reported IPs

92.225.91.169 223.178.167.17 245.183.26.44 80.255.5.219
91.132.139.119 220.144.45.42 89.107.250.14 139.101.147.124
104.248.93.179 176.109.184.155 60.50.121.122 146.169.254.12
114.225.221.100 235.223.9.105 54.36.148.200 93.174.89.190
183.145.60.212 37.212.235.149 68.11.26.186 104.238.120.38