Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Beleggingsmaatschap V5

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackbotsspam
(From eric@talkwithwebvisitor.com) Cool website!

My name’s Eric, and I just found your site - newlifechiropracticcenter.com - while surfing the net. You showed up at the top of the search results, so I checked you out. Looks like what you’re doing is pretty cool.
 
But if you don’t mind me asking – after someone like me stumbles across newlifechiropracticcenter.com, what usually happens?

Is your site generating leads for your business? 
 
I’m guessing some, but I also bet you’d like more… studies show that 7 out 10 who land on a site wind up leaving without a trace.

Not good.

Here’s a thought – what if there was an easy way for every visitor to “raise their hand” to get a phone call from you INSTANTLY… the second they hit your site and said, “call me now.”

You can –
  
Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  It lets you know IMMEDIATELY – so that you can talk to that lead while they’re lite
2020-03-09 20:55:12
Comments on same subnet:
IP Type Details Datetime
45.152.34.186 attackbotsspam
2020-08-14 21:16:13
45.152.34.15 attackbotsspam
Does not respect robots.txt
2020-06-14 07:14:27
45.152.34.24 attack
(From eric@talkwithwebvisitor.com) Good day, 

My name is Eric and unlike a lot of emails you might get, I wanted to instead provide you with a word of encouragement – Congratulations

What for?  

Part of my job is to check out websites and the work you’ve done with plinkechiropractic.com definitely stands out. 

It’s clear you took building a website seriously and made a real investment of time and resources into making it top quality.

There is, however, a catch… more accurately, a question…

So when someone like me happens to find your site – maybe at the top of the search results (nice job BTW) or just through a random link, how do you know? 

More importantly, how do you make a connection with that person?

Studies show that 7 out of 10 visitors don’t stick around – they’re there one second and then gone with the wind.

Here’s a way to create INSTANT engagement that you may not have known about… 

Talk With Web Visitor is a software widget that’s works on your site, ready to capture
2020-04-16 21:53:05
45.152.34.11 attackspam
(From eric@talkwithwebvisitor.com) Hey there, I just found your site, quick question…

My name’s Eric, I found middletonchiropractic.net after doing a quick search – you showed up near the top of the rankings, so whatever you’re doing for SEO, looks like it’s working well.

So here’s my question – what happens AFTER someone lands on your site?  Anything?

Research tells us at least 70% of the people who find your site, after a quick once-over, they disappear… forever.

That means that all the work and effort you put into getting them to show up, goes down the tubes.

Why would you want all that good work – and the great site you’ve built – go to waste?

Because the odds are they’ll just skip over calling or even grabbing their phone, leaving you high and dry.

But here’s a thought… what if you could make it super-simple for someone to raise their hand, say, “okay, let’s talk” without requiring them to even pull their cell phone from their pocket?
  
You can – thanks to revolutionary new softwa
2020-03-22 23:17:37
45.152.34.159 attack
(From eric@talkwithwebvisitor.com) Hey, this is Eric and I ran across poweroflifedartmouth.com a few minutes ago.

Looks great… but now what?

By that I mean, when someone like me finds your website – either through Search or just bouncing around – what happens next?  Do you get a lot of leads from your site, or at least enough to make you happy?

Honestly, most business websites fall a bit short when it comes to generating paying customers. Studies show that 70% of a site’s visitors disappear and are gone forever after just a moment.

Here’s an idea…
 
How about making it really EASY for every visitor who shows up to get a personal phone call you as soon as they hit your site…
 
You can –
  
Talk With Web Visitor is a software widget that’s works on your site, ready to capture any visitor’s Name, Email address and Phone Number.  It signals you the moment they let you know they’re interested – so that you can talk to that lead while they’re literally looking over your site.

CLICK HERE http://
2020-03-22 14:17:44
45.152.34.231 attack
Automatic report - XMLRPC Attack
2020-03-17 07:19:22
45.152.34.16 attack
contact form spam for talkwithcustomer.com
2020-02-19 23:33:34
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.152.34.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.152.34.51.			IN	A

;; AUTHORITY SECTION:
.			568	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030900 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 09 20:55:07 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 51.34.152.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 51.34.152.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.7 attackbotsspam
Oct 10 00:45:14 eventyay sshd[15441]: Failed password for root from 222.186.42.7 port 27452 ssh2
Oct 10 00:45:15 eventyay sshd[15441]: Failed password for root from 222.186.42.7 port 27452 ssh2
Oct 10 00:45:18 eventyay sshd[15441]: Failed password for root from 222.186.42.7 port 27452 ssh2
...
2020-10-10 06:45:39
5.234.173.154 attackspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-10 06:43:06
156.236.72.209 attackspam
fail2ban/Oct  9 22:49:05 h1962932 sshd[11460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.72.209  user=root
Oct  9 22:49:07 h1962932 sshd[11460]: Failed password for root from 156.236.72.209 port 45868 ssh2
Oct  9 22:55:33 h1962932 sshd[13085]: Invalid user vnc from 156.236.72.209 port 53234
Oct  9 22:55:33 h1962932 sshd[13085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.72.209
Oct  9 22:55:33 h1962932 sshd[13085]: Invalid user vnc from 156.236.72.209 port 53234
Oct  9 22:55:35 h1962932 sshd[13085]: Failed password for invalid user vnc from 156.236.72.209 port 53234 ssh2
2020-10-10 06:41:01
106.12.9.40 attack
Oct  7 06:07:35 scivo sshd[22436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.9.40  user=r.r
Oct  7 06:07:37 scivo sshd[22436]: Failed password for r.r from 106.12.9.40 port 59052 ssh2
Oct  7 06:07:37 scivo sshd[22436]: Received disconnect from 106.12.9.40: 11: Bye Bye [preauth]
Oct  7 06:08:12 scivo sshd[22485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.9.40  user=r.r
Oct  7 06:08:14 scivo sshd[22485]: Failed password for r.r from 106.12.9.40 port 37488 ssh2
Oct  7 06:08:14 scivo sshd[22485]: Received disconnect from 106.12.9.40: 11: Bye Bye [preauth]
Oct  7 06:08:42 scivo sshd[22489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.9.40  user=r.r
Oct  7 06:08:43 scivo sshd[22489]: Failed password for r.r from 106.12.9.40 port 42878 ssh2
Oct  7 06:08:43 scivo sshd[22489]: Received disconnect from 106.12.9.40: 11: Bye By........
-------------------------------
2020-10-10 06:54:23
94.237.101.218 attackbotsspam
SP-Scan 59687:3389 detected 2020.10.08 22:49:12
blocked until 2020.11.27 14:51:59
2020-10-10 07:00:08
201.22.95.49 attackbots
Oct 10 00:43:59 nextcloud sshd\[17291\]: Invalid user info2 from 201.22.95.49
Oct 10 00:43:59 nextcloud sshd\[17291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.22.95.49
Oct 10 00:44:01 nextcloud sshd\[17291\]: Failed password for invalid user info2 from 201.22.95.49 port 52239 ssh2
2020-10-10 06:48:09
85.106.196.90 attack
Unauthorized connection attempt from IP address 85.106.196.90 on Port 445(SMB)
2020-10-10 07:02:51
177.53.147.188 attack
Unauthorized connection attempt from IP address 177.53.147.188 on Port 445(SMB)
2020-10-10 06:58:39
110.86.16.254 attack
Port scan: Attack repeated for 24 hours
2020-10-10 07:02:19
51.255.171.172 attack
2020-10-10 00:28:50,471 fail2ban.actions: WARNING [ssh] Ban 51.255.171.172
2020-10-10 07:08:47
118.25.57.184 attackbotsspam
Oct  9 20:59:33 DAAP sshd[9035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.57.184  user=root
Oct  9 20:59:35 DAAP sshd[9035]: Failed password for root from 118.25.57.184 port 16404 ssh2
Oct  9 21:07:10 DAAP sshd[9097]: Invalid user teste from 118.25.57.184 port 41933
Oct  9 21:07:10 DAAP sshd[9097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.57.184
Oct  9 21:07:10 DAAP sshd[9097]: Invalid user teste from 118.25.57.184 port 41933
Oct  9 21:07:12 DAAP sshd[9097]: Failed password for invalid user teste from 118.25.57.184 port 41933 ssh2
...
2020-10-10 06:54:03
90.84.81.29 attack
Port Scan: TCP/23
2020-10-10 06:42:36
51.178.17.63 attackspambots
SSH Invalid Login
2020-10-10 06:47:47
179.189.28.194 attack
20/10/8@16:46:35: FAIL: Alarm-Network address from=179.189.28.194
20/10/8@16:46:35: FAIL: Alarm-Network address from=179.189.28.194
...
2020-10-10 06:44:41
104.174.61.206 attack
DATE:2020-10-10 00:44:13, IP:104.174.61.206, PORT:ssh SSH brute force auth (docker-dc)
2020-10-10 06:46:45

Recently Reported IPs

116.105.211.8 104.168.212.232 114.27.237.139 76.254.113.233
168.184.196.22 9.198.69.0 110.227.216.32 163.172.244.188
171.239.11.119 216.164.32.177 110.78.148.165 168.101.250.194
5.181.90.36 111.91.86.118 83.66.86.205 46.63.74.89
178.171.23.15 177.12.245.94 116.159.123.240 77.9.62.106