Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: Delha Barbosa de Carvalho - ME

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attackspam
1593057236 - 06/25/2020 10:53:56 Host: 45.162.99.139/45.162.99.139 Port: 23 TCP Blocked
...
2020-06-25 14:54:26
Comments on same subnet:
IP Type Details Datetime
45.162.99.11 attackspambots
Automatic report - Port Scan Attack
2020-04-24 18:00:49
45.162.99.32 attackspam
20/4/23@23:57:22: FAIL: Alarm-Telnet address from=45.162.99.32
...
2020-04-24 12:48:26
45.162.99.212 attack
Automatic report - Port Scan Attack
2020-02-12 02:57:25
45.162.99.74 attack
port scan and connect, tcp 23 (telnet)
2019-12-08 17:38:03
45.162.99.106 attack
port scan/probe/communication attempt; port 23
2019-12-02 07:53:54
45.162.99.50 attackspambots
UTC: 2019-11-30 port: 26/tcp
2019-12-01 18:00:57
45.162.99.223 attack
UTC: 2019-11-30 port: 23/tcp
2019-12-01 16:29:09
45.162.99.108 attackspam
Automatic report - Port Scan Attack
2019-11-29 09:17:06
45.162.99.188 attack
Automatic report - Port Scan Attack
2019-11-27 02:28:04
45.162.99.111 attackspam
Automatic report - Port Scan Attack
2019-11-22 16:34:08
45.162.99.142 attackbots
Automatic report - Port Scan Attack
2019-11-22 16:17:12
45.162.99.126 attackspambots
Automatic report - Port Scan Attack
2019-11-15 18:18:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.162.99.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.162.99.139.			IN	A

;; AUTHORITY SECTION:
.			328	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020062500 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 25 14:54:22 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 139.99.162.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 139.99.162.45.in-addr.arpa.: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
129.28.181.103 attackbotsspam
Invalid user yp from 129.28.181.103 port 35740
2020-03-26 14:18:07
14.29.249.248 attack
Mar 26 05:05:40 srv-ubuntu-dev3 sshd[103170]: Invalid user ofelia from 14.29.249.248
Mar 26 05:05:40 srv-ubuntu-dev3 sshd[103170]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.249.248
Mar 26 05:05:40 srv-ubuntu-dev3 sshd[103170]: Invalid user ofelia from 14.29.249.248
Mar 26 05:05:42 srv-ubuntu-dev3 sshd[103170]: Failed password for invalid user ofelia from 14.29.249.248 port 34687 ssh2
Mar 26 05:09:52 srv-ubuntu-dev3 sshd[103846]: Invalid user bo from 14.29.249.248
Mar 26 05:09:52 srv-ubuntu-dev3 sshd[103846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.249.248
Mar 26 05:09:52 srv-ubuntu-dev3 sshd[103846]: Invalid user bo from 14.29.249.248
Mar 26 05:09:53 srv-ubuntu-dev3 sshd[103846]: Failed password for invalid user bo from 14.29.249.248 port 59179 ssh2
Mar 26 05:14:06 srv-ubuntu-dev3 sshd[104477]: Invalid user verwalter from 14.29.249.248
...
2020-03-26 14:22:58
115.238.44.237 attackbots
port scan and connect, tcp 22 (ssh)
2020-03-26 13:48:10
36.26.72.16 attackspambots
SSH Brute-Forcing (server2)
2020-03-26 14:18:59
91.209.54.54 attackbotsspam
Invalid user lg from 91.209.54.54 port 58863
2020-03-26 14:22:19
179.108.126.114 attack
Invalid user igorb from 179.108.126.114 port 58534
2020-03-26 14:23:27
49.232.132.10 attackbots
Mar 26 04:53:10 vmd17057 sshd[16673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.132.10 
Mar 26 04:53:12 vmd17057 sshd[16673]: Failed password for invalid user honda from 49.232.132.10 port 37876 ssh2
...
2020-03-26 14:15:49
84.17.49.101 attackbotsspam
Wednesday, March 25, 2020 4:28 AM Received from: 84.17.49.101 (unn-84-17-49-101.cdn77.com) From: Anthony How   fifty thousand spam email offer form spam bot
2020-03-26 14:10:02
106.54.102.140 attack
Mar 26 04:29:45 xxxxxxx0 sshd[24892]: Invalid user informix from 106.54.102.140 port 51750
Mar 26 04:29:45 xxxxxxx0 sshd[24892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.102.140
Mar 26 04:29:47 xxxxxxx0 sshd[24892]: Failed password for invalid user informix from 106.54.102.140 port 51750 ssh2
Mar 26 04:42:16 xxxxxxx0 sshd[3450]: Invalid user informix from 106.54.102.140 port 34848
Mar 26 04:42:16 xxxxxxx0 sshd[3450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.102.140

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.54.102.140
2020-03-26 14:25:06
106.12.176.113 attackbotsspam
Mar 26 04:51:35 v22019038103785759 sshd\[18225\]: Invalid user user from 106.12.176.113 port 55695
Mar 26 04:51:35 v22019038103785759 sshd\[18225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.113
Mar 26 04:51:36 v22019038103785759 sshd\[18225\]: Failed password for invalid user user from 106.12.176.113 port 55695 ssh2
Mar 26 05:00:44 v22019038103785759 sshd\[18715\]: Invalid user chuck from 106.12.176.113 port 13604
Mar 26 05:00:44 v22019038103785759 sshd\[18715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.176.113
...
2020-03-26 13:40:49
211.220.21.233 attackbots
20/3/25@23:53:15: FAIL: Alarm-Telnet address from=211.220.21.233
...
2020-03-26 14:11:38
45.55.67.128 attackbots
Invalid user shangzengqiang from 45.55.67.128 port 39640
2020-03-26 14:16:03
106.54.241.222 attackspambots
Invalid user th from 106.54.241.222 port 48994
2020-03-26 14:05:21
125.142.5.61 attackspambots
Mar2604:50:29server4pure-ftpd:\(\?@125.142.5.61\)[WARNING]Authenticationfailedforuser[anonymous]Mar2604:50:49server4pure-ftpd:\(\?@125.142.5.61\)[WARNING]Authenticationfailedforuser[egemonplus]Mar2604:51:09server4pure-ftpd:\(\?@125.142.5.61\)[WARNING]Authenticationfailedforuser[egemonplus]Mar2604:51:29server4pure-ftpd:\(\?@125.142.5.61\)[WARNING]Authenticationfailedforuser[egemonplus]Mar2604:51:39server4pure-ftpd:\(\?@125.142.5.61\)[WARNING]Authenticationfailedforuser[egemonplus]Mar2604:51:56server4pure-ftpd:\(\?@125.142.5.61\)[WARNING]Authenticationfailedforuser[egemonplus]Mar2604:52:06server4pure-ftpd:\(\?@125.142.5.61\)[WARNING]Authenticationfailedforuser[egemonplus]Mar2604:52:45server4pure-ftpd:\(\?@125.142.5.61\)[WARNING]Authenticationfailedforuser[egemonplus]Mar2604:52:53server4pure-ftpd:\(\?@125.142.5.61\)[WARNING]Authenticationfailedforuser[egemonplus]Mar2604:53:10server4pure-ftpd:\(\?@125.142.5.61\)[WARNING]Authenticationfailedforuser[egemonplus]
2020-03-26 14:18:27
51.254.49.100 attackbotsspam
" "
2020-03-26 14:25:25

Recently Reported IPs

182.61.134.157 61.139.119.156 188.138.247.96 156.96.56.151
192.241.236.125 98.146.212.146 181.158.104.70 46.215.39.92
173.120.114.222 14.29.44.12 74.228.163.60 142.32.224.164
89.187.184.243 19.223.124.29 32.121.112.126 246.131.30.70
108.99.3.119 227.130.247.82 161.8.211.173 154.22.143.94