Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: Nova Fibra Telecom

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspambots
Unauthorized connection attempt from IP address 45.165.5.64 on Port 445(SMB)
2019-09-07 05:20:59
attackspam
Port Scan: TCP/445
2019-08-24 15:39:32
Comments on same subnet:
IP Type Details Datetime
45.165.57.105 attack
 TCP (SYN) 45.165.57.105:23448 -> port 8080, len 44
2020-08-13 03:31:12
45.165.5.170 attack
Port Scan detected!
...
2020-08-01 21:47:20
45.165.5.161 attackspambots
Scanning random ports - tries to find possible vulnerable services
2020-03-08 05:56:08
45.165.5.161 attackbots
Unauthorized connection attempt detected from IP address 45.165.5.161 to port 1433 [J]
2020-01-30 23:55:42
45.165.57.130 attackbotsspam
Aug  8 13:53:55 km20725 sshd[5274]: reveeclipse mapping checking getaddrinfo for 130.57.165.45.bazarinfor.com.br [45.165.57.130] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug  8 13:53:55 km20725 sshd[5274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.165.57.130  user=r.r
Aug  8 13:53:58 km20725 sshd[5274]: Failed password for r.r from 45.165.57.130 port 37426 ssh2
Aug  8 13:54:00 km20725 sshd[5274]: Failed password for r.r from 45.165.57.130 port 37426 ssh2
Aug  8 13:54:02 km20725 sshd[5274]: Failed password for r.r from 45.165.57.130 port 37426 ssh2
Aug  8 13:54:05 km20725 sshd[5274]: Failed password for r.r from 45.165.57.130 port 37426 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.165.57.130
2019-08-09 04:33:09
45.165.5.46 attackspambots
Trying to deliver email spam, but blocked by RBL
2019-07-03 16:36:41
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.165.5.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15101
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.165.5.64.			IN	A

;; AUTHORITY SECTION:
.			3063	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082302 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 24 15:39:25 CST 2019
;; MSG SIZE  rcvd: 115
Host info
64.5.165.45.in-addr.arpa domain name pointer 45-165-5-64.novafibra.net.br.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
64.5.165.45.in-addr.arpa	name = 45-165-5-64.novafibra.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.21.119.240 attack
(imapd) Failed IMAP login from 113.21.119.240 (NC/New Caledonia/host-113-21-119-240.canl.nc): 1 in the last 3600 secs
2020-06-28 14:15:09
118.24.82.81 attackbotsspam
Invalid user postgres from 118.24.82.81 port 54925
2020-06-28 14:12:43
89.248.168.244 attackbotsspam
firewall-block, port(s): 2090/tcp, 2092/tcp, 43982/tcp, 43984/tcp, 43987/tcp, 43988/tcp
2020-06-28 14:04:15
202.88.237.15 attackbotsspam
Jun 25 09:55:30 nandi sshd[30327]: reveeclipse mapping checking getaddrinfo for 15.237.88.202.asianet.co.in [202.88.237.15] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 25 09:55:30 nandi sshd[30327]: Invalid user com from 202.88.237.15
Jun 25 09:55:30 nandi sshd[30327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.237.15 
Jun 25 09:55:32 nandi sshd[30327]: Failed password for invalid user com from 202.88.237.15 port 57490 ssh2
Jun 25 09:55:32 nandi sshd[30327]: Received disconnect from 202.88.237.15: 11: Bye Bye [preauth]
Jun 25 10:17:08 nandi sshd[10743]: reveeclipse mapping checking getaddrinfo for 15.237.88.202.asianet.co.in [202.88.237.15] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 25 10:17:08 nandi sshd[10743]: Invalid user samira from 202.88.237.15
Jun 25 10:17:08 nandi sshd[10743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.88.237.15 
Jun 25 10:17:10 nandi sshd[10743]: Fail........
-------------------------------
2020-06-28 13:39:19
101.91.119.132 attackbots
2020-06-28T01:15:46.165359devel sshd[1344]: Invalid user otrs from 101.91.119.132 port 35442
2020-06-28T01:15:48.291416devel sshd[1344]: Failed password for invalid user otrs from 101.91.119.132 port 35442 ssh2
2020-06-28T01:20:36.922709devel sshd[1649]: Invalid user msmith from 101.91.119.132 port 60366
2020-06-28 13:41:58
185.117.215.9 attackspambots
Automatic report - Banned IP Access
2020-06-28 13:42:29
54.37.68.191 attack
Invalid user elena from 54.37.68.191 port 35958
2020-06-28 13:47:00
114.67.110.227 attackspam
$f2bV_matches
2020-06-28 14:07:08
192.99.210.162 attackbots
Invalid user postgres from 192.99.210.162 port 38586
2020-06-28 13:58:38
23.253.109.27 attackspambots
 TCP (SYN) 23.253.109.27:52433 -> port 23620, len 44
2020-06-28 13:41:30
79.137.163.43 attackspambots
(sshd) Failed SSH login from 79.137.163.43 (RU/Russia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 28 05:44:29 grace sshd[3147]: Invalid user ckc from 79.137.163.43 port 52916
Jun 28 05:44:31 grace sshd[3147]: Failed password for invalid user ckc from 79.137.163.43 port 52916 ssh2
Jun 28 05:50:41 grace sshd[4167]: Invalid user nr from 79.137.163.43 port 38102
Jun 28 05:50:43 grace sshd[4167]: Failed password for invalid user nr from 79.137.163.43 port 38102 ssh2
Jun 28 05:55:21 grace sshd[4720]: Invalid user grafana from 79.137.163.43 port 37038
2020-06-28 13:42:48
36.90.178.43 attackbotsspam
Invalid user aaaa from 36.90.178.43 port 50932
2020-06-28 14:11:49
212.102.33.47 attack
(From stubbs.alejandro@outlook.com) Hello,

I’m David Domine, owner of Louisville Historic Tours that operates here in Old Louisville, Kentucky.  
Like many businesses, I’m sure you and your employees have probably been stuck at home because of the Kentucky-wide lockdown. Most restaurants and bars still aren’t accepting large groups. This is making get-togethers or outside team building exercises currently impossible. 

That’s why I’m reaching out today.  I run a Daytime Walking Tour and a Nighttime Ghost Tour right here in Louisville.  Since our tours are outside, we are operating fully, and we are able to take groups of people (as long as we follow the social distancing guidelines.)

I’ve had a huge increase in the amount of organizations booking private tours for their employees since everyone is looking for a way to get together.  I wanted to reach out to you about the same possibility.    

Here’s the Daytime Walking Tour:

https://bit.ly/DaytimeWalkingTour

And here’s a bit of detail on the
2020-06-28 13:36:05
94.23.33.22 attackbotsspam
Jun 28 05:28:59 onepixel sshd[783195]: Invalid user ha from 94.23.33.22 port 50220
Jun 28 05:28:59 onepixel sshd[783195]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.33.22 
Jun 28 05:28:59 onepixel sshd[783195]: Invalid user ha from 94.23.33.22 port 50220
Jun 28 05:29:01 onepixel sshd[783195]: Failed password for invalid user ha from 94.23.33.22 port 50220 ssh2
Jun 28 05:31:00 onepixel sshd[784390]: Invalid user user from 94.23.33.22 port 56310
2020-06-28 13:40:36
118.25.141.194 attackbots
Invalid user libuuid from 118.25.141.194 port 48898
2020-06-28 14:08:02

Recently Reported IPs

113.0.206.51 112.252.17.80 104.248.91.204 94.249.99.20
84.214.64.27 192.43.171.147 82.51.76.108 118.53.24.87
231.231.139.250 44.211.141.70 148.49.250.241 72.20.190.198
124.172.192.85 132.120.208.128 150.183.95.185 70.182.10.24
143.63.195.178 172.86.98.82 212.209.28.253 116.211.226.172