Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: Intercom LLC

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
 TCP (SYN) 45.145.66.12:47059 -> port 56659, len 44
2020-07-15 14:07:03
attackbotsspam
 TCP (SYN) 45.145.66.12:49178 -> port 23983, len 44
2020-07-11 21:51:44
attackspam
 TCP (SYN) 45.145.66.12:44939 -> port 23680, len 44
2020-07-06 23:39:21
attackbotsspam
 TCP (SYN) 45.145.66.12:49111 -> port 23496, len 44
2020-07-05 23:11:41
attack
[MK-VM2] Blocked by UFW
2020-07-04 12:57:19
attack
SmallBizIT.US 3 packets to tcp(12777,13999,16555)
2020-06-26 12:09:45
attackbots
 TCP (SYN) 45.145.66.12:54405 -> port 5444, len 44
2020-06-21 08:07:37
attackbotsspam
Scanned 333 unique addresses for 20 unique TCP ports in 24 hours
2020-06-19 23:30:42
Comments on same subnet:
IP Type Details Datetime
45.145.66.104 attackbots
Excessive Port-Scanning
2020-10-04 02:34:03
45.145.66.104 attackbotsspam
[HOST2] Port Scan detected
2020-10-03 18:21:49
45.145.66.159 attackbotsspam
RDPBruteGam24
2020-09-29 02:25:57
45.145.66.159 attack
RDPBruteGam24
2020-09-28 18:33:33
45.145.66.67 attack
scans once in preceeding hours on the ports (in chronological order) 20425 resulting in total of 13 scans from 45.145.66.0/23 block.
2020-09-13 22:45:10
45.145.66.67 attackspambots
Fail2Ban Ban Triggered
2020-09-13 14:40:51
45.145.66.67 attackbots
Fail2Ban Ban Triggered
2020-09-13 06:23:54
45.145.66.104 attackbots
Unauthorized connection attempt from IP address 45.145.66.104 on Port 3389(RDP)
2020-09-09 17:11:10
45.145.66.96 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 23 - port: 13947 proto: tcp cat: Misc Attackbytes: 60
2020-09-08 04:18:28
45.145.66.96 attackbots
SmallBizIT.US 20 packets to tcp(13911,13959,13990,14001,14015,14016,14022,14028,14036,14052,14068,14069,14075,14076,14120,14132,14146,14170,14186,14194)
2020-09-07 19:54:56
45.145.66.96 attackspambots
Port scan: Attack repeated for 24 hours
2020-09-06 04:08:16
45.145.66.96 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 23 - port: 14029 proto: tcp cat: Misc Attackbytes: 60
2020-09-05 19:53:35
45.145.66.90 attackbots
9922/tcp 4899/tcp 1022/tcp...
[2020-06-27/08-27]230pkt,86pt.(tcp)
2020-08-29 15:27:53
45.145.66.120 attackbots
[H1.VM8] Blocked by UFW
2020-08-27 07:37:28
45.145.66.21 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 23 - port: 29939 proto: tcp cat: Misc Attackbytes: 60
2020-08-27 02:41:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.145.66.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12152
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.145.66.12.			IN	A

;; AUTHORITY SECTION:
.			200	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061900 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 19 23:30:36 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 12.66.145.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.66.145.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.211.190.2 attackbotsspam
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:12:23
52.243.42.1 attackbots
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:35:38
60.183.39.2 attackbots
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:26:40
104.196.7.246 attackspam
WordPress wp-login brute force :: 104.196.7.246 0.176 - [02/Jan/2020:14:56:40  0000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 1806 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "HTTP/1.1"
2020-01-03 00:37:47
112.85.42.181 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
Failed password for root from 112.85.42.181 port 4517 ssh2
Failed password for root from 112.85.42.181 port 4517 ssh2
Failed password for root from 112.85.42.181 port 4517 ssh2
Failed password for root from 112.85.42.181 port 4517 ssh2
2020-01-03 00:22:01
5.236.193.1 attackspambots
web Attack on Website at 2020-01-02.
2020-01-03 00:42:12
42.113.108.55 attackbotsspam
spam
2020-01-03 00:14:35
2607:5300:60:5d45:: attack
xmlrpc attack
2020-01-03 00:06:45
77.109.147.10 attackbotsspam
Automated report (2020-01-02T14:56:53+00:00). Hack attempt detected.
2020-01-03 00:14:18
61.220.206.1 attack
web Attack on Website at 2020-01-02.
2020-01-03 00:24:48
51.79.70.2 attackspambots
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:38:46
87.66.16.6 attackbots
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:03:35
124.74.111.206 attack
Automatic report - Port Scan Attack
2020-01-03 00:02:18
213.82.217.226 attackbots
1577977010 - 01/02/2020 15:56:50 Host: 213.82.217.226/213.82.217.226 Port: 445 TCP Blocked
2020-01-03 00:18:09
83.180.127.2 attackbotsspam
SSH login attempts with user root at 2020-01-02.
2020-01-03 00:07:01

Recently Reported IPs

196.220.171.7 192.35.168.215 156.216.36.119 125.162.57.245
193.47.61.195 49.146.34.1 2.93.140.44 118.25.106.244
200.52.139.25 79.187.16.142 111.241.104.183 1.186.79.204
176.194.57.111 15.27.82.235 174.234.19.36 177.132.241.131
41.184.35.122 189.7.33.167 174.35.25.129 190.193.135.172