Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santana do Livramento

Region: Rio Grande do Sul

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.4.219.192 attackbots
Unauthorized connection attempt detected from IP address 45.4.219.192 to port 80
2020-07-22 21:39:27
45.4.219.213 attackbots
Automatic report - Port Scan Attack
2020-04-19 15:30:03
45.4.218.209 attackbotsspam
W 31101,/var/log/nginx/access.log,-,-
2019-12-23 01:09:33
45.4.216.53 attackspambots
Automatic report - Port Scan Attack
2019-10-27 00:50:49
45.4.219.213 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/45.4.219.213/ 
 AR - 1H : (43)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : AR 
 NAME ASN : ASN265679 
 
 IP : 45.4.219.213 
 
 CIDR : 45.4.219.0/24 
 
 PREFIX COUNT : 4 
 
 UNIQUE IP COUNT : 1024 
 
 
 WYKRYTE ATAKI Z ASN265679 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-22 13:15:04
45.4.219.156 attack
Automatic report - Port Scan Attack
2019-08-03 19:42:47
45.4.219.153 attackbots
firewall-block, port(s): 23/tcp
2019-07-28 09:17:39
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.4.21.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29894
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.4.21.154.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 09:32:14 CST 2022
;; MSG SIZE  rcvd: 104
Host info
154.21.4.45.in-addr.arpa domain name pointer 45-4-21-154.tchenet.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
154.21.4.45.in-addr.arpa	name = 45-4-21-154.tchenet.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
187.209.242.83 attackspam
Unauthorized connection attempt from IP address 187.209.242.83 on Port 445(SMB)
2020-09-20 14:05:39
64.227.77.206 attack
SSH Brute Force
2020-09-20 13:56:57
78.100.6.36 attack
Invalid user tsukamoto from 78.100.6.36 port 33530
2020-09-20 14:09:47
194.165.99.231 attackbots
Sep 20 02:17:58 ift sshd\[40106\]: Invalid user test2 from 194.165.99.231Sep 20 02:18:00 ift sshd\[40106\]: Failed password for invalid user test2 from 194.165.99.231 port 58420 ssh2Sep 20 02:21:34 ift sshd\[42718\]: Failed password for root from 194.165.99.231 port 37268 ssh2Sep 20 02:25:06 ift sshd\[43525\]: Invalid user user from 194.165.99.231Sep 20 02:25:09 ift sshd\[43525\]: Failed password for invalid user user from 194.165.99.231 port 44344 ssh2
...
2020-09-20 14:01:19
62.210.146.26 attack
Hit honeypot r.
2020-09-20 13:51:10
177.207.251.18 attackspam
Invalid user user from 177.207.251.18 port 12568
2020-09-20 14:16:15
122.165.194.191 attack
Sep 20 07:51:54 DAAP sshd[12218]: Invalid user ts3 from 122.165.194.191 port 59788
Sep 20 07:51:54 DAAP sshd[12218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.165.194.191
Sep 20 07:51:54 DAAP sshd[12218]: Invalid user ts3 from 122.165.194.191 port 59788
Sep 20 07:51:56 DAAP sshd[12218]: Failed password for invalid user ts3 from 122.165.194.191 port 59788 ssh2
Sep 20 08:00:33 DAAP sshd[12392]: Invalid user suser from 122.165.194.191 port 41876
...
2020-09-20 14:10:48
23.129.64.181 attackbotsspam
2020-09-20T04:01[Censored Hostname] sshd[5316]: Failed password for root from 23.129.64.181 port 27451 ssh2
2020-09-20T04:01[Censored Hostname] sshd[5316]: Failed password for root from 23.129.64.181 port 27451 ssh2
2020-09-20T04:01[Censored Hostname] sshd[5316]: Failed password for root from 23.129.64.181 port 27451 ssh2[...]
2020-09-20 14:23:21
186.31.21.129 attackspambots
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=20770  .  dstport=23  .     (2309)
2020-09-20 13:52:03
146.0.41.70 attackbots
Sep 20 07:18:27 vpn01 sshd[7592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.0.41.70
Sep 20 07:18:30 vpn01 sshd[7592]: Failed password for invalid user steam from 146.0.41.70 port 35036 ssh2
...
2020-09-20 14:03:20
50.233.148.74 attackspam
 TCP (SYN) 50.233.148.74:48760 -> port 25731, len 44
2020-09-20 13:55:57
186.154.35.163 attackspambots
DATE:2020-09-20 06:35:50, IP:186.154.35.163, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-20 14:19:29
190.90.193.154 attackspam
Unauthorized connection attempt from IP address 190.90.193.154 on Port 445(SMB)
2020-09-20 13:49:28
164.90.202.27 attackbots
Brute-force attempt banned
2020-09-20 14:07:25
80.79.158.29 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-20T04:49:11Z
2020-09-20 14:17:50

Recently Reported IPs

103.171.183.2 103.172.70.180 103.172.46.175 103.174.84.102
103.174.164.209 103.174.4.206 103.175.24.135 103.175.80.10
103.174.164.193 103.176.79.36 103.173.7.96 103.177.184.131
103.174.28.253 103.177.184.17 103.178.169.185 103.177.184.171
103.175.237.71 103.179.247.121 103.194.248.126 103.195.73.145