Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santana do Livramento

Region: Rio Grande do Sul

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.4.237.72 attackspam
Brute forcing email accounts
2020-07-27 16:19:32
45.4.238.227 attackbotsspam
Attempted connection to port 445.
2020-05-31 19:48:24
45.4.238.108 attackspam
Port probing on unauthorized port 445
2020-02-18 03:15:50
45.4.238.172 attackspam
Jan 31 07:58:33 mxgate1 postfix/postscreen[8597]: CONNECT from [45.4.238.172]:58023 to [176.31.12.44]:25
Jan 31 07:58:33 mxgate1 postfix/dnsblog[8602]: addr 45.4.238.172 listed by domain cbl.abuseat.org as 127.0.0.2
Jan 31 07:58:33 mxgate1 postfix/dnsblog[8599]: addr 45.4.238.172 listed by domain zen.spamhaus.org as 127.0.0.4
Jan 31 07:58:33 mxgate1 postfix/dnsblog[8599]: addr 45.4.238.172 listed by domain zen.spamhaus.org as 127.0.0.3
Jan 31 07:58:33 mxgate1 postfix/dnsblog[8598]: addr 45.4.238.172 listed by domain bl.spamcop.net as 127.0.0.2
Jan 31 07:58:39 mxgate1 postfix/postscreen[8597]: DNSBL rank 4 for [45.4.238.172]:58023
Jan x@x
Jan 31 07:58:40 mxgate1 postfix/postscreen[8597]: HANGUP after 1.5 from [45.4.238.172]:58023 in tests after SMTP handshake
Jan 31 07:58:40 mxgate1 postfix/postscreen[8597]: DISCONNECT [45.4.238.172]:58023


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=45.4.238.172
2020-01-31 15:44:55
45.4.237.114 attackspambots
Telnet Server BruteForce Attack
2019-10-02 23:59:35
45.4.239.5 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-06 02:20:50,906 INFO [amun_request_handler] PortScan Detected on Port: 445 (45.4.239.5)
2019-07-06 11:30:33
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.4.23.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.4.23.141.			IN	A

;; AUTHORITY SECTION:
.			513	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022120502 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 06 11:19:44 CST 2022
;; MSG SIZE  rcvd: 104
Host info
141.23.4.45.in-addr.arpa domain name pointer 45-4-23-141.tchenet.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.23.4.45.in-addr.arpa	name = 45-4-23-141.tchenet.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
39.64.229.103 attack
Scanning
2019-12-13 21:37:57
222.186.169.194 attack
Dec 13 14:42:02 localhost sshd\[8728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194  user=root
Dec 13 14:42:04 localhost sshd\[8728\]: Failed password for root from 222.186.169.194 port 26256 ssh2
Dec 13 14:42:07 localhost sshd\[8728\]: Failed password for root from 222.186.169.194 port 26256 ssh2
2019-12-13 21:45:31
138.121.14.201 attack
1576222983 - 12/13/2019 08:43:03 Host: 138.121.14.201/138.121.14.201 Port: 445 TCP Blocked
2019-12-13 22:01:51
103.43.6.211 attackspam
Unauthorized connection attempt detected from IP address 103.43.6.211 to port 445
2019-12-13 21:57:19
62.162.103.206 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-12-13 21:44:03
218.253.193.235 attackbots
2019-12-13T14:09:18.789394  sshd[23707]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.193.235  user=root
2019-12-13T14:09:20.772588  sshd[23707]: Failed password for root from 218.253.193.235 port 54674 ssh2
2019-12-13T14:15:24.032498  sshd[23825]: Invalid user dovecot from 218.253.193.235 port 35330
2019-12-13T14:15:24.045867  sshd[23825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.253.193.235
2019-12-13T14:15:24.032498  sshd[23825]: Invalid user dovecot from 218.253.193.235 port 35330
2019-12-13T14:15:25.943367  sshd[23825]: Failed password for invalid user dovecot from 218.253.193.235 port 35330 ssh2
...
2019-12-13 21:32:42
106.12.185.54 attackbots
$f2bV_matches
2019-12-13 21:43:47
34.73.39.215 attack
$f2bV_matches
2019-12-13 21:57:32
94.102.52.28 attackbots
[12/Dec/2019:14:36:49 -0500] "\x16\x03\x02\x01o\x01" Blank UA
2019-12-13 21:59:01
62.183.45.90 attack
Unauthorized connection attempt detected from IP address 62.183.45.90 to port 445
2019-12-13 22:02:40
178.62.95.122 attackbotsspam
Dec 13 14:55:40 dedicated sshd[16288]: Invalid user gery from 178.62.95.122 port 40577
2019-12-13 22:05:59
61.148.16.162 attackbots
$f2bV_matches
2019-12-13 21:52:16
203.195.201.128 attackspambots
Dec 13 03:50:12 wbs sshd\[23738\]: Invalid user host from 203.195.201.128
Dec 13 03:50:12 wbs sshd\[23738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.201.128
Dec 13 03:50:14 wbs sshd\[23738\]: Failed password for invalid user host from 203.195.201.128 port 56876 ssh2
Dec 13 03:55:47 wbs sshd\[24266\]: Invalid user ammie from 203.195.201.128
Dec 13 03:55:47 wbs sshd\[24266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.201.128
2019-12-13 22:03:13
66.96.233.31 attackbotsspam
Dec 13 14:18:38 mail sshd\[3937\]: Invalid user jashly from 66.96.233.31
Dec 13 14:18:38 mail sshd\[3937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.96.233.31
Dec 13 14:18:40 mail sshd\[3937\]: Failed password for invalid user jashly from 66.96.233.31 port 53609 ssh2
...
2019-12-13 21:27:40
118.70.233.163 attack
Invalid user user from 118.70.233.163 port 48366
2019-12-13 21:44:57

Recently Reported IPs

61.154.142.74 67.172.49.127 227.113.62.231 207.198.210.65
228.38.209.135 187.25.144.42 151.29.191.228 244.178.71.74
199.195.254.123 24.47.188.151 99.95.251.66 160.217.178.179
110.228.146.24 214.178.25.3 246.6.199.80 251.180.118.94
254.28.222.71 170.114.111.254 154.30.15.242 103.157.117.105