Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sao Pedro

Region: Sao Paulo

Country: Brazil

Internet Service Provider: Expresso Fibra Optica Ltda

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attack
445/tcp 445/tcp 445/tcp
[2019-06-16/07-19]3pkt
2019-07-20 02:51:58
Comments on same subnet:
IP Type Details Datetime
45.160.233.75 attackbots
SMB Server BruteForce Attack
2020-07-28 05:43:05
45.160.254.217 attack
(smtpauth) Failed SMTP AUTH login from 45.160.254.217 (BR/Brazil/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-07-08 08:10:04 plain authenticator failed for ([45.160.254.217]) [45.160.254.217]: 535 Incorrect authentication data (set_id=info@mehrbaftedehagh.com)
2020-07-08 19:23:32
45.160.26.130 attackspambots
Unauthorized connection attempt from IP address 45.160.26.130 on Port 445(SMB)
2020-05-31 05:41:18
45.160.26.124 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 14:54:01
45.160.238.177 attackspambots
Automatic report - Port Scan Attack
2020-02-17 23:11:01
45.160.222.195 attackbotsspam
Automatic report - Banned IP Access
2019-12-25 04:41:24
45.160.26.94 attackbots
Unauthorized connection attempt detected from IP address 45.160.26.94 to port 445
2019-12-25 03:48:28
45.160.252.222 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/45.160.252.222/ 
 
 BR - 1H : (254)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN268445 
 
 IP : 45.160.252.222 
 
 CIDR : 45.160.252.0/24 
 
 PREFIX COUNT : 4 
 
 UNIQUE IP COUNT : 1024 
 
 
 ATTACKS DETECTED ASN268445 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-21 13:40:31 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-22 00:36:54
45.160.26.19 attackbotsspam
Sep 14 01:28:28 kapalua sshd\[12139\]: Invalid user operador from 45.160.26.19
Sep 14 01:28:28 kapalua sshd\[12139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.26.19
Sep 14 01:28:29 kapalua sshd\[12139\]: Failed password for invalid user operador from 45.160.26.19 port 24521 ssh2
Sep 14 01:33:51 kapalua sshd\[12666\]: Invalid user nu from 45.160.26.19
Sep 14 01:33:51 kapalua sshd\[12666\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.26.19
2019-09-14 20:01:47
45.160.26.19 attack
2019-09-12T14:48:14.466005abusebot-5.cloudsearch.cf sshd\[8407\]: Invalid user steam from 45.160.26.19 port 31441
2019-09-13 04:55:47
45.160.26.150 attackbots
Sep  7 09:33:17 vps200512 sshd\[27060\]: Invalid user diablo from 45.160.26.150
Sep  7 09:33:17 vps200512 sshd\[27060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.26.150
Sep  7 09:33:20 vps200512 sshd\[27060\]: Failed password for invalid user diablo from 45.160.26.150 port 22375 ssh2
Sep  7 09:38:45 vps200512 sshd\[27123\]: Invalid user teamspeak3-user from 45.160.26.150
Sep  7 09:38:45 vps200512 sshd\[27123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.160.26.150
2019-09-08 04:29:41
45.160.26.25 attack
2019-09-03T12:00:19.982099abusebot.cloudsearch.cf sshd\[6787\]: Invalid user ashton from 45.160.26.25 port 28682
2019-09-03 23:13:50
45.160.222.1 attack
23/tcp 23/tcp
[2019-08-15/09-02]2pkt
2019-09-02 13:18:17
45.160.222.1 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-18 13:08:23
45.160.26.15 attackspam
Automatic report - SSH Brute-Force Attack
2019-08-18 12:29:27
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.160.2.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9481
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.160.2.20.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071900 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Jul 20 02:51:53 CST 2019
;; MSG SIZE  rcvd: 115
Host info
20.2.160.45.in-addr.arpa domain name pointer 20.2.160.45.static.expressofibra.com.br.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
20.2.160.45.in-addr.arpa	name = 20.2.160.45.static.expressofibra.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.29.166.226 attack
Auto Fail2Ban report, multiple SSH login attempts.
2020-06-09 01:25:39
222.186.173.154 attackbotsspam
Jun  8 14:11:13 firewall sshd[13020]: Failed password for root from 222.186.173.154 port 15424 ssh2
Jun  8 14:11:16 firewall sshd[13020]: Failed password for root from 222.186.173.154 port 15424 ssh2
Jun  8 14:11:19 firewall sshd[13020]: Failed password for root from 222.186.173.154 port 15424 ssh2
...
2020-06-09 01:33:02
138.197.73.177 attack
 TCP (SYN) 138.197.73.177:44562 -> port 29625, len 44
2020-06-09 01:30:50
92.43.104.99 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-06-09 01:57:18
202.137.154.118 attackspambots
Dovecot Invalid User Login Attempt.
2020-06-09 01:55:30
36.83.140.174 attack
Unauthorised access (Jun  8) SRC=36.83.140.174 LEN=44 TTL=53 ID=49323 TCP DPT=8080 WINDOW=61912 SYN
2020-06-09 01:50:43
61.5.111.130 attackspam
Honeypot attack, port: 445, PTR: ppp-jember.telkom.net.id.
2020-06-09 01:37:31
181.40.122.2 attackspambots
Jun  8 16:09:21 sso sshd[15561]: Failed password for root from 181.40.122.2 port 58365 ssh2
...
2020-06-09 01:25:14
183.88.234.235 attackspambots
Unauthorized connection attempt from IP address 183.88.234.235 on port 993
2020-06-09 01:27:59
106.12.209.81 attackspambots
Jun  6 22:31:08 tuxlinux sshd[45583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.209.81  user=root
Jun  6 22:31:10 tuxlinux sshd[45583]: Failed password for root from 106.12.209.81 port 42076 ssh2
Jun  6 22:31:08 tuxlinux sshd[45583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.209.81  user=root
Jun  6 22:31:10 tuxlinux sshd[45583]: Failed password for root from 106.12.209.81 port 42076 ssh2
Jun  6 22:36:20 tuxlinux sshd[46430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.209.81  user=root
...
2020-06-09 01:33:52
195.54.167.116 attackspam
scans once in preceeding hours on the ports (in chronological order) 5900 resulting in total of 30 scans from 195.54.166.0/23 block.
2020-06-09 01:32:03
62.210.205.141 attackspam
62.210.205.141 - - [08/Jun/2020:18:13:40 +0100] "POST /wp-login.php HTTP/1.1" 200 6669 "http://cubscouts.org/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 Safari/537.36"
62.210.205.141 - - [08/Jun/2020:18:13:41 +0100] "POST /wp-login.php HTTP/1.1" 200 6669 "http://cubscouts.org/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 Safari/537.36"
62.210.205.141 - - [08/Jun/2020:18:13:42 +0100] "POST /wp-login.php HTTP/1.1" 200 6662 "http://cubscouts.org/wp-login.php" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 Safari/537.36"
...
2020-06-09 01:50:10
134.209.250.37 attackspambots
Jun  8 12:02:45 ws19vmsma01 sshd[20040]: Failed password for root from 134.209.250.37 port 51596 ssh2
...
2020-06-09 01:26:20
5.147.173.226 attackspambots
Jun  8 15:17:35 vmd17057 sshd[841]: Failed password for root from 5.147.173.226 port 39152 ssh2
...
2020-06-09 01:57:45
200.122.249.203 attack
Jun  8 14:07:10 *** sshd[25053]: User root from 200.122.249.203 not allowed because not listed in AllowUsers
2020-06-09 01:23:06

Recently Reported IPs

142.166.28.63 69.57.57.58 58.146.210.70 84.85.106.22
224.126.3.226 246.153.255.3 217.190.7.5 41.169.254.109
121.177.83.193 86.248.108.147 23.99.124.231 74.21.248.228
103.95.98.75 100.159.35.26 200.23.235.245 9.77.79.133
60.228.79.161 198.70.28.110 170.98.19.133 84.208.15.42