Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Argentina

Internet Service Provider: Elda Salerno

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackspam
Jun 13 22:53:02 mail.srvfarm.net postfix/smtpd[1295647]: warning: unknown[45.162.20.154]: SASL PLAIN authentication failed: 
Jun 13 22:53:03 mail.srvfarm.net postfix/smtpd[1295647]: lost connection after AUTH from unknown[45.162.20.154]
Jun 13 22:55:30 mail.srvfarm.net postfix/smtpd[1295658]: warning: unknown[45.162.20.154]: SASL PLAIN authentication failed: 
Jun 13 22:55:31 mail.srvfarm.net postfix/smtpd[1295658]: lost connection after AUTH from unknown[45.162.20.154]
Jun 13 23:01:14 mail.srvfarm.net postfix/smtps/smtpd[1293481]: warning: unknown[45.162.20.154]: SASL PLAIN authentication failed:
2020-06-14 08:42:58
attack
Jun  6 01:31:47 mail.srvfarm.net postfix/smtps/smtpd[3446935]: warning: unknown[45.162.20.154]: SASL PLAIN authentication failed: 
Jun  6 01:31:48 mail.srvfarm.net postfix/smtps/smtpd[3446935]: lost connection after AUTH from unknown[45.162.20.154]
Jun  6 01:34:02 mail.srvfarm.net postfix/smtps/smtpd[3460261]: warning: unknown[45.162.20.154]: SASL PLAIN authentication failed: 
Jun  6 01:34:03 mail.srvfarm.net postfix/smtps/smtpd[3460261]: lost connection after AUTH from unknown[45.162.20.154]
Jun  6 01:40:33 mail.srvfarm.net postfix/smtps/smtpd[3463322]: warning: unknown[45.162.20.154]: SASL PLAIN authentication failed:
2020-06-08 00:28:46
Comments on same subnet:
IP Type Details Datetime
45.162.20.189 attackspam
Brute force attempt
2020-08-15 07:28:43
45.162.20.68 attackspam
Unauthorized connection attempt from IP address 45.162.20.68 on Port 25(SMTP)
2020-08-03 02:36:41
45.162.20.100 attackspam
Jul 24 09:03:37 mail.srvfarm.net postfix/smtps/smtpd[2137410]: warning: unknown[45.162.20.100]: SASL PLAIN authentication failed: 
Jul 24 09:03:38 mail.srvfarm.net postfix/smtps/smtpd[2137410]: lost connection after AUTH from unknown[45.162.20.100]
Jul 24 09:03:53 mail.srvfarm.net postfix/smtpd[2140857]: warning: unknown[45.162.20.100]: SASL PLAIN authentication failed: 
Jul 24 09:03:53 mail.srvfarm.net postfix/smtpd[2140857]: lost connection after AUTH from unknown[45.162.20.100]
Jul 24 09:07:40 mail.srvfarm.net postfix/smtps/smtpd[2140084]: warning: unknown[45.162.20.100]: SASL PLAIN authentication failed:
2020-07-25 03:52:53
45.162.20.249 attack
failed_logins
2020-07-09 15:33:29
45.162.20.191 attackspam
Jun 15 17:15:43 mail.srvfarm.net postfix/smtps/smtpd[332286]: warning: unknown[45.162.20.191]: SASL PLAIN authentication failed: 
Jun 15 17:19:48 mail.srvfarm.net postfix/smtpd[350758]: warning: unknown[45.162.20.191]: SASL PLAIN authentication failed: 
Jun 15 17:19:48 mail.srvfarm.net postfix/smtpd[350758]: lost connection after AUTH from unknown[45.162.20.191]
Jun 15 17:24:11 mail.srvfarm.net postfix/smtpd[354813]: warning: unknown[45.162.20.191]: SASL PLAIN authentication failed: 
Jun 15 17:24:11 mail.srvfarm.net postfix/smtpd[354813]: lost connection after AUTH from unknown[45.162.20.191]
2020-07-02 05:38:26
45.162.20.65 attack
(AR/Argentina/-) SMTP Bruteforcing attempts
2020-06-19 15:43:33
45.162.20.128 attackspam
Jun 18 18:01:43 mail.srvfarm.net postfix/smtpd[1562467]: warning: unknown[45.162.20.128]: SASL PLAIN authentication failed: 
Jun 18 18:01:44 mail.srvfarm.net postfix/smtpd[1562467]: lost connection after AUTH from unknown[45.162.20.128]
Jun 18 18:03:31 mail.srvfarm.net postfix/smtpd[1562515]: warning: unknown[45.162.20.128]: SASL PLAIN authentication failed: 
Jun 18 18:03:32 mail.srvfarm.net postfix/smtpd[1562515]: lost connection after AUTH from unknown[45.162.20.128]
Jun 18 18:04:30 mail.srvfarm.net postfix/smtpd[1565799]: warning: unknown[45.162.20.128]: SASL PLAIN authentication failed:
2020-06-19 01:33:33
45.162.20.52 attackspambots
Jun 16 05:04:48 mail.srvfarm.net postfix/smtps/smtpd[915909]: warning: unknown[45.162.20.52]: SASL PLAIN authentication failed: 
Jun 16 05:04:49 mail.srvfarm.net postfix/smtps/smtpd[915909]: lost connection after AUTH from unknown[45.162.20.52]
Jun 16 05:08:26 mail.srvfarm.net postfix/smtpd[935947]: warning: unknown[45.162.20.52]: SASL PLAIN authentication failed: 
Jun 16 05:08:27 mail.srvfarm.net postfix/smtpd[935947]: lost connection after AUTH from unknown[45.162.20.52]
Jun 16 05:13:48 mail.srvfarm.net postfix/smtps/smtpd[938133]: warning: unknown[45.162.20.52]: SASL PLAIN authentication failed:
2020-06-16 17:29:26
45.162.20.174 attackspambots
Jun 13 22:51:44 mail.srvfarm.net postfix/smtps/smtpd[1294952]: warning: unknown[45.162.20.174]: SASL PLAIN authentication failed: 
Jun 13 22:51:45 mail.srvfarm.net postfix/smtps/smtpd[1294952]: lost connection after AUTH from unknown[45.162.20.174]
Jun 13 22:52:27 mail.srvfarm.net postfix/smtpd[1296189]: warning: unknown[45.162.20.174]: SASL PLAIN authentication failed: 
Jun 13 22:52:28 mail.srvfarm.net postfix/smtpd[1296189]: lost connection after AUTH from unknown[45.162.20.174]
Jun 13 23:01:18 mail.srvfarm.net postfix/smtpd[1295647]: warning: unknown[45.162.20.174]: SASL PLAIN authentication failed:
2020-06-14 08:42:42
45.162.20.60 attackbotsspam
Jun  5 17:43:24 mail.srvfarm.net postfix/smtpd[3156526]: warning: unknown[45.162.20.60]: SASL PLAIN authentication failed: 
Jun  5 17:43:25 mail.srvfarm.net postfix/smtpd[3156526]: lost connection after AUTH from unknown[45.162.20.60]
Jun  5 17:43:40 mail.srvfarm.net postfix/smtpd[3156527]: warning: unknown[45.162.20.60]: SASL PLAIN authentication failed: 
Jun  5 17:43:41 mail.srvfarm.net postfix/smtpd[3156527]: lost connection after AUTH from unknown[45.162.20.60]
Jun  5 17:46:18 mail.srvfarm.net postfix/smtps/smtpd[3154996]: warning: unknown[45.162.20.60]: SASL PLAIN authentication failed:
2020-06-08 00:20:37
45.162.20.191 attackbotsspam
(AR/Argentina/-) SMTP Bruteforcing attempts
2020-06-05 14:35:56
45.162.20.249 attack
(AR/Argentina/-) SMTP Bruteforcing attempts
2020-06-05 14:31:29
45.162.20.251 attackbotsspam
(AR/Argentina/-) SMTP Bruteforcing attempts
2020-06-05 14:29:16
45.162.20.171 attackbots
SSH invalid-user multiple login try
2020-05-26 19:32:02
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.162.20.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42827
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.162.20.154.			IN	A

;; AUTHORITY SECTION:
.			321	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060700 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 08 00:28:41 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 154.20.162.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.20.162.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
154.127.32.116 attackspambots
Aug  5 22:57:31 vps sshd[11560]: Failed password for root from 154.127.32.116 port 41980 ssh2
Aug  5 23:00:06 vps sshd[11712]: Failed password for root from 154.127.32.116 port 46192 ssh2
...
2020-08-06 06:31:01
218.92.0.248 attackspam
2020-08-05T22:55:22.492902shield sshd\[10902\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.248  user=root
2020-08-05T22:55:24.667347shield sshd\[10902\]: Failed password for root from 218.92.0.248 port 45560 ssh2
2020-08-05T22:55:27.835653shield sshd\[10902\]: Failed password for root from 218.92.0.248 port 45560 ssh2
2020-08-05T22:55:31.213254shield sshd\[10902\]: Failed password for root from 218.92.0.248 port 45560 ssh2
2020-08-05T22:55:34.351228shield sshd\[10902\]: Failed password for root from 218.92.0.248 port 45560 ssh2
2020-08-06 06:55:52
49.235.83.156 attack
Aug  5 23:38:23 rancher-0 sshd[821936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.83.156  user=root
Aug  5 23:38:25 rancher-0 sshd[821936]: Failed password for root from 49.235.83.156 port 59638 ssh2
...
2020-08-06 06:33:08
23.24.9.57 attackbots
2020-08-05T22:39[Censored Hostname] sshd[24945]: Failed password for invalid user admin from 23.24.9.57 port 58697 ssh2
2020-08-05T22:39[Censored Hostname] sshd[24971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23-24-9-57-static.hfc.comcastbusiness.net  user=root
2020-08-05T22:39[Censored Hostname] sshd[24971]: Failed password for root from 23.24.9.57 port 58803 ssh2[...]
2020-08-06 06:36:33
112.85.42.174 attack
Aug  6 00:21:56 melroy-server sshd[18338]: Failed password for root from 112.85.42.174 port 36654 ssh2
Aug  6 00:22:00 melroy-server sshd[18338]: Failed password for root from 112.85.42.174 port 36654 ssh2
...
2020-08-06 06:28:32
13.81.248.153 attackbots
Aug  5 16:39:29 mail sshd\[9307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.81.248.153  user=root
...
2020-08-06 06:27:10
112.85.42.195 attack
Aug  5 22:46:44 game-panel sshd[28473]: Failed password for root from 112.85.42.195 port 54534 ssh2
Aug  5 22:47:36 game-panel sshd[28513]: Failed password for root from 112.85.42.195 port 16485 ssh2
Aug  5 22:47:38 game-panel sshd[28513]: Failed password for root from 112.85.42.195 port 16485 ssh2
2020-08-06 06:56:47
49.233.92.34 attackbots
$f2bV_matches
2020-08-06 06:59:05
46.105.132.55 attack
Icarus honeypot on github
2020-08-06 06:20:51
37.120.145.163 attackspam
SMTP blocked logins 22. Dates: 5-8-2020 / 5-8-2020
2020-08-06 06:38:23
72.213.236.195 attackspam
port scan and connect, tcp 443 (https)
2020-08-06 06:48:18
103.3.76.211 attackspam
Port scan detected on ports: 60001[TCP], 60001[TCP], 60001[TCP]
2020-08-06 06:42:11
180.164.167.41 attackspambots
Automatic report - Port Scan Attack
2020-08-06 06:50:42
211.24.100.128 attackbotsspam
Aug  5 22:09:11 server sshd[25320]: Failed password for root from 211.24.100.128 port 53180 ssh2
Aug  5 22:32:24 server sshd[31217]: Failed password for root from 211.24.100.128 port 36900 ssh2
Aug  5 22:39:04 server sshd[9255]: Failed password for root from 211.24.100.128 port 44730 ssh2
2020-08-06 06:51:32
34.80.223.251 attackbotsspam
SSH Bruteforce
2020-08-06 06:43:42

Recently Reported IPs

191.53.223.105 189.89.211.157 186.216.92.87 186.216.64.202
185.243.174.22 185.47.184.14 178.217.115.154 177.154.227.191
176.111.113.131 149.72.43.118 138.94.210.69 109.196.240.132
78.8.160.171 62.182.151.46 46.163.60.196 45.228.254.31
45.162.21.217 217.112.142.198 186.216.71.50 186.216.71.26