Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: ComTrade LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.136.109.219 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 26 - port: 6000 proto: tcp cat: Misc Attackbytes: 60
2020-08-19 23:39:13
45.136.109.219 attackspam
slow and persistent scanner
2020-08-17 20:34:11
45.136.109.251 attackbotsspam
Port scanning [3 denied]
2020-08-14 14:18:15
45.136.109.219 attackbots
 TCP (SYN) 45.136.109.219:50230 -> port 53, len 44
2020-08-07 08:11:38
45.136.109.219 attackbotsspam
[Tue Aug 04 17:47:28 2020] - DDoS Attack From IP: 45.136.109.219 Port: 41096
2020-08-06 18:31:50
45.136.109.219 attack
 TCP (SYN) 45.136.109.219:43869 -> port 53, len 44
2020-08-05 23:34:34
45.136.109.158 attack
Unauthorized connection attempt detected from IP address 45.136.109.158 to port 3389
2020-07-22 15:39:59
45.136.109.87 attack
BruteForce RDP attempts from 45.136.109.175
2020-07-17 14:21:12
45.136.109.158 attack
SmallBizIT.US 2 packets to tcp(3389,3391)
2020-07-07 12:28:14
45.136.109.158 attackbots
Unauthorized connection attempt detected from IP address 45.136.109.158 to port 4489 [T]
2020-07-05 22:47:55
45.136.109.175 attackspambots
Icarus honeypot on github
2020-07-02 08:25:18
45.136.109.251 attackbots
Multiport scan : 15 ports scanned 2888 3381 3382 3402 3420 3501 3502 4003 4018 5909 7926 8093 9000 9261 9833
2020-06-21 07:47:48
45.136.109.219 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 6389 proto: TCP cat: Misc Attack
2020-06-06 08:47:05
45.136.109.222 attackspam
Mar 22 03:57:09 src: 45.136.109.222 signature match: "BACKDOOR NetSphere Connection attempt" (sid: 100044) tcp port: 30100
2020-03-22 12:01:46
45.136.109.222 attackbotsspam
Mar 18 22:14:16 src: 45.136.109.222 signature match: "BACKDOOR Subseven connection attempt" (sid: 100207) tcp port: 27374
2020-03-19 06:22:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.136.109.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53039
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.136.109.241.			IN	A

;; AUTHORITY SECTION:
.			499	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020400 1800 900 604800 86400

;; Query time: 106 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 17:37:23 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 241.109.136.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 241.109.136.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.56.200.234 attackspam
Oct  2 06:21:00 web1 sshd[26081]: Invalid user web from 5.56.200.234 port 44264
Oct  2 06:21:00 web1 sshd[26081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.56.200.234
Oct  2 06:21:00 web1 sshd[26081]: Invalid user web from 5.56.200.234 port 44264
Oct  2 06:21:02 web1 sshd[26081]: Failed password for invalid user web from 5.56.200.234 port 44264 ssh2
Oct  2 06:34:40 web1 sshd[30531]: Invalid user ventas from 5.56.200.234 port 37258
Oct  2 06:34:40 web1 sshd[30531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.56.200.234
Oct  2 06:34:40 web1 sshd[30531]: Invalid user ventas from 5.56.200.234 port 37258
Oct  2 06:34:42 web1 sshd[30531]: Failed password for invalid user ventas from 5.56.200.234 port 37258 ssh2
Oct  2 06:38:24 web1 sshd[31835]: Invalid user usuario from 5.56.200.234 port 46218
...
2020-10-02 06:42:05
139.199.123.152 attackbotsspam
Invalid user system from 139.199.123.152 port 48914
2020-10-02 06:47:50
177.73.3.206 attackbots
Bruteforce detected by fail2ban
2020-10-02 06:51:13
192.35.169.59 attackbotsspam
trying to access non-authorized port
2020-10-02 06:52:27
177.124.201.61 attackspam
Invalid user net from 177.124.201.61 port 50500
2020-10-02 06:31:48
140.224.171.118 attackbotsspam
20 attempts against mh-ssh on soil
2020-10-02 06:53:25
49.234.45.241 attackspambots
2020-10-01T20:51:55.471064abusebot-5.cloudsearch.cf sshd[21740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.45.241  user=root
2020-10-01T20:51:57.058131abusebot-5.cloudsearch.cf sshd[21740]: Failed password for root from 49.234.45.241 port 50174 ssh2
2020-10-01T20:55:02.310690abusebot-5.cloudsearch.cf sshd[21746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.45.241  user=root
2020-10-01T20:55:04.570076abusebot-5.cloudsearch.cf sshd[21746]: Failed password for root from 49.234.45.241 port 60510 ssh2
2020-10-01T20:57:16.366717abusebot-5.cloudsearch.cf sshd[21754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.45.241  user=root
2020-10-01T20:57:19.022546abusebot-5.cloudsearch.cf sshd[21754]: Failed password for root from 49.234.45.241 port 38762 ssh2
2020-10-01T20:59:18.170024abusebot-5.cloudsearch.cf sshd[21761]: Invalid user xq from 49.23
...
2020-10-02 06:50:21
59.56.71.215 attackbotsspam
Port Scan
...
2020-10-02 06:36:55
58.87.120.53 attack
Oct  1 20:38:43 gitlab sshd[2458800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53 
Oct  1 20:38:43 gitlab sshd[2458800]: Invalid user kelvin from 58.87.120.53 port 35684
Oct  1 20:38:44 gitlab sshd[2458800]: Failed password for invalid user kelvin from 58.87.120.53 port 35684 ssh2
Oct  1 20:42:31 gitlab sshd[2459368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.120.53  user=root
Oct  1 20:42:33 gitlab sshd[2459368]: Failed password for root from 58.87.120.53 port 37620 ssh2
...
2020-10-02 06:42:27
134.209.16.185 attackspam
bruteforce detected
2020-10-02 07:01:11
176.99.163.138 attackbotsspam
fell into ViewStateTrap:wien2018
2020-10-02 06:50:52
134.17.94.132 attackspambots
SSH Invalid Login
2020-10-02 07:03:20
203.66.14.161 attack
Oct  1 11:48:13 vps46666688 sshd[14450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.66.14.161
Oct  1 11:48:15 vps46666688 sshd[14450]: Failed password for invalid user botuser from 203.66.14.161 port 46376 ssh2
...
2020-10-02 06:43:18
157.230.244.147 attackbots
Invalid user test4 from 157.230.244.147 port 48180
2020-10-02 06:54:56
115.159.53.71 attack
SSH brute-force attempt
2020-10-02 06:28:39

Recently Reported IPs

199.152.109.17 206.189.140.215 243.246.11.20 81.23.49.239
72.115.123.182 85.99.246.150 82.146.43.93 66.96.237.91
62.171.135.227 122.106.232.141 1.2.129.252 86.141.29.227
101.210.132.14 195.254.12.57 223.155.34.76 223.18.238.153
1.233.152.134 203.195.152.146 242.15.121.113 203.110.85.26