Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: ComTrade LLC

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackbots
Multiport scan : 10 ports scanned 3364 3371 3372 3375 3377 3384 3388 3391 3395 3396
2019-12-11 06:54:51
attackspam
12/04/2019-23:57:38.623806 45.136.109.95 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-05 13:06:22
attack
12/01/2019-13:38:35.985165 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 40
2019-12-02 03:43:56
attack
Portscan or hack attempt detected by psad/fwsnort
2019-11-30 23:11:49
attackbots
11/28/2019-12:49:46.863890 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 40
2019-11-29 01:59:42
attackspambots
11/27/2019-19:36:02.048773 45.136.109.95 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-28 08:59:30
attack
Unauthorized connection attempt from IP address 45.136.109.95 on Port 3389(RDP)
2019-11-27 17:58:49
attackspam
11/26/2019-12:41:45.668476 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 42
2019-11-26 20:33:10
attack
ET CINS Active Threat Intelligence Poor Reputation IP group 33 - port: 3371 proto: TCP cat: Misc Attack
2019-11-26 02:24:51
attackspambots
11/24/2019-13:53:23.379988 45.136.109.95 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-25 02:55:02
attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-11-24 15:00:40
attack
45.136.109.95 was recorded 109 times by 32 hosts attempting to connect to the following ports: 3383,3381,3382,3388,3379,3368,3361,3399,3396,3378,3363,3395,3375,3385,3384,3398,3360,3373,3387,3374,3367,3386,3365,3393,3369,3376,3391,3389,3371,3377,3380,3370,3392,3394. Incident counter (4h, 24h, all-time): 109, 697, 10238
2019-11-22 03:18:36
attackspam
11/19/2019-18:20:55.746839 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 40
2019-11-20 07:25:46
attack
11/19/2019-09:46:20.550512 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 40
2019-11-19 23:18:18
attack
11/18/2019-22:55:09.883916 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 42
2019-11-19 06:22:27
attackbotsspam
11/17/2019-15:23:11.769395 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 40
2019-11-18 04:37:08
attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-11-14 15:32:55
attack
11/12/2019-07:53:33.257933 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 42
2019-11-12 15:07:59
attack
11/11/2019-23:44:08.042992 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 42
2019-11-12 06:57:11
attackspam
TCP 3389 (RDP)
2019-11-11 01:02:56
attack
11/10/2019-07:33:20.049605 45.136.109.95 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-10 20:41:42
attackbots
11/08/2019-08:52:08.150154 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 42
2019-11-08 16:05:46
attackbotsspam
11/07/2019-19:06:04.110759 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 40
2019-11-08 08:25:18
attackspambots
11/06/2019-11:39:42.032804 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 40
2019-11-07 01:19:49
attackspambots
Nov  6 06:50:09 h2177944 kernel: \[5895047.672265\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.95 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=46554 PROTO=TCP SPT=48022 DPT=3399 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  6 07:17:47 h2177944 kernel: \[5896705.266391\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.95 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=42578 PROTO=TCP SPT=48022 DPT=3374 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  6 07:17:53 h2177944 kernel: \[5896711.325657\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.95 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=18354 PROTO=TCP SPT=48022 DPT=3354 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  6 07:21:27 h2177944 kernel: \[5896925.825704\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.95 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=48139 PROTO=TCP SPT=48022 DPT=3352 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  6 07:29:54 h2177944 kernel: \[5897432.417203\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.95 DST=85.214.117.9
2019-11-06 15:10:05
attackspambots
Nov  6 06:14:24 mc1 kernel: \[4303564.823461\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.95 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=5863 PROTO=TCP SPT=48022 DPT=3385 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  6 06:23:08 mc1 kernel: \[4304088.770931\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.95 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=26683 PROTO=TCP SPT=48022 DPT=3382 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  6 06:23:22 mc1 kernel: \[4304103.105272\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=45.136.109.95 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=31332 PROTO=TCP SPT=48022 DPT=3398 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-06 13:28:57
attackbots
11/03/2019-15:57:55.828970 45.136.109.95 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-04 06:00:48
attackbotsspam
11/03/2019-11:55:51.453575 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 42
2019-11-03 18:59:57
attackspambots
11/03/2019-01:29:38.840420 45.136.109.95 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 40
2019-11-03 13:47:13
attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 31 - port: 3399 proto: TCP cat: Misc Attack
2019-11-03 13:01:05
Comments on same subnet:
IP Type Details Datetime
45.136.109.219 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 26 - port: 6000 proto: tcp cat: Misc Attackbytes: 60
2020-08-19 23:39:13
45.136.109.219 attackspam
slow and persistent scanner
2020-08-17 20:34:11
45.136.109.251 attackbotsspam
Port scanning [3 denied]
2020-08-14 14:18:15
45.136.109.219 attackbots
 TCP (SYN) 45.136.109.219:50230 -> port 53, len 44
2020-08-07 08:11:38
45.136.109.219 attackbotsspam
[Tue Aug 04 17:47:28 2020] - DDoS Attack From IP: 45.136.109.219 Port: 41096
2020-08-06 18:31:50
45.136.109.219 attack
 TCP (SYN) 45.136.109.219:43869 -> port 53, len 44
2020-08-05 23:34:34
45.136.109.158 attack
Unauthorized connection attempt detected from IP address 45.136.109.158 to port 3389
2020-07-22 15:39:59
45.136.109.87 attack
BruteForce RDP attempts from 45.136.109.175
2020-07-17 14:21:12
45.136.109.158 attack
SmallBizIT.US 2 packets to tcp(3389,3391)
2020-07-07 12:28:14
45.136.109.158 attackbots
Unauthorized connection attempt detected from IP address 45.136.109.158 to port 4489 [T]
2020-07-05 22:47:55
45.136.109.175 attackspambots
Icarus honeypot on github
2020-07-02 08:25:18
45.136.109.251 attackbots
Multiport scan : 15 ports scanned 2888 3381 3382 3402 3420 3501 3502 4003 4018 5909 7926 8093 9000 9261 9833
2020-06-21 07:47:48
45.136.109.219 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 27 - port: 6389 proto: TCP cat: Misc Attack
2020-06-06 08:47:05
45.136.109.222 attackspam
Mar 22 03:57:09 src: 45.136.109.222 signature match: "BACKDOOR NetSphere Connection attempt" (sid: 100044) tcp port: 30100
2020-03-22 12:01:46
45.136.109.222 attackbotsspam
Mar 18 22:14:16 src: 45.136.109.222 signature match: "BACKDOOR Subseven connection attempt" (sid: 100207) tcp port: 27374
2020-03-19 06:22:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.136.109.95
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32254
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.136.109.95.			IN	A

;; AUTHORITY SECTION:
.			547	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091802 1800 900 604800 86400

;; Query time: 129 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 19 18:57:36 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 95.109.136.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 95.109.136.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.240.224.14 attackbotsspam
" "
2019-09-29 21:23:16
198.108.66.231 attackbotsspam
8088/tcp 1911/tcp 502/tcp...
[2019-08-01/09-29]11pkt,8pt.(tcp),1pt.(udp),1tp.(icmp)
2019-09-29 21:58:44
181.49.117.166 attackspam
ssh failed login
2019-09-29 21:50:06
51.91.249.178 attackbotsspam
Sep 29 15:20:46 dedicated sshd[18407]: Invalid user gpadmin from 51.91.249.178 port 43726
2019-09-29 21:26:49
158.69.113.39 attack
2019-09-29T13:20:19.657466abusebot-5.cloudsearch.cf sshd\[30297\]: Invalid user oracle from 158.69.113.39 port 59656
2019-09-29 21:49:37
149.202.250.179 attack
Spam (brainsuperpro.xyz, Sep 29 14:11)
2019-09-29 21:19:08
94.191.20.179 attackspambots
Sep 29 13:11:32 game-panel sshd[17381]: Failed password for root from 94.191.20.179 port 41426 ssh2
Sep 29 13:13:10 game-panel sshd[17435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.20.179
Sep 29 13:13:12 game-panel sshd[17435]: Failed password for invalid user mainz from 94.191.20.179 port 42492 ssh2
2019-09-29 21:19:23
23.229.84.90 attackbots
Forged login request.
2019-09-29 21:44:20
222.186.175.212 attack
Automated report - ssh fail2ban:
Sep 29 15:53:29 wrong password, user=root, port=44236, ssh2
Sep 29 15:53:33 wrong password, user=root, port=44236, ssh2
Sep 29 15:53:40 wrong password, user=root, port=44236, ssh2
Sep 29 15:53:45 wrong password, user=root, port=44236, ssh2
2019-09-29 21:57:09
103.9.159.59 attackspambots
Fail2Ban Ban Triggered
2019-09-29 21:55:40
128.199.58.191 attackspambots
Sep 29 18:41:03 areeb-Workstation sshd[6361]: Failed password for news from 128.199.58.191 port 45862 ssh2
...
2019-09-29 21:28:34
164.68.120.40 attackbots
Sep 29 12:08:55 anodpoucpklekan sshd[41761]: Invalid user felipe from 164.68.120.40 port 39774
Sep 29 12:08:56 anodpoucpklekan sshd[41761]: Failed password for invalid user felipe from 164.68.120.40 port 39774 ssh2
...
2019-09-29 21:20:25
175.148.67.70 attackbotsspam
Automated reporting of FTP Brute Force
2019-09-29 21:30:00
200.153.178.241 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/200.153.178.241/ 
 BR - 1H : (1244)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN27699 
 
 IP : 200.153.178.241 
 
 CIDR : 200.153.128.0/18 
 
 PREFIX COUNT : 267 
 
 UNIQUE IP COUNT : 6569728 
 
 
 WYKRYTE ATAKI Z ASN27699 :  
  1H - 3 
  3H - 7 
  6H - 14 
 12H - 26 
 24H - 57 
 
 INFO : Port SERVER 80 Scan Detected and Blocked by ADMIN  - data recovery
2019-09-29 21:30:26
184.105.139.70 attackspambots
SMB Server BruteForce Attack
2019-09-29 21:40:41

Recently Reported IPs

58.132.183.19 46.17.101.235 57.193.80.252 26.251.22.92
43.224.180.206 49.53.246.178 59.136.71.198 187.54.88.213
31.25.158.20 10.93.110.200 95.107.24.3 59.255.123.46
114.220.64.143 1.192.218.141 206.189.158.228 200.46.77.219
191.35.139.49 143.201.77.161 183.141.55.179 180.105.234.14