Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Argentina

Internet Service Provider: Fernando German Fischer

Hostname: unknown

Organization: Fernando German Fischer (FIBERNET TELECOM)

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
1596314880 - 08/02/2020 03:48:00 Host: ip-45-4-252-4.fibernet.net.ar/45.4.252.4 Port: 8080 TCP Blocked
...
2020-08-02 06:16:53
attackspam
Automatic report - Banned IP Access
2020-05-30 00:14:21
attack
Unauthorized connection attempt detected from IP address 45.4.252.4 to port 23 [J]
2020-01-06 04:28:04
attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-05 19:24:16
Comments on same subnet:
IP Type Details Datetime
45.4.252.7 attack
Unauthorized connection attempt detected from IP address 45.4.252.7 to port 80
2020-05-13 04:21:27
45.4.252.3 attackspambots
Automatic report - Port Scan Attack
2019-08-13 04:44:00
45.4.252.2 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-06 04:12:46
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.4.252.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50335
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.4.252.4.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 15 01:02:30 +08 2019
;; MSG SIZE  rcvd: 114

Host info
Host 4.252.4.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 4.252.4.45.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
157.245.137.211 attackspambots
Invalid user chong from 157.245.137.211 port 36672
2020-07-19 02:53:50
192.42.116.24 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-07-19 03:18:11
88.102.244.211 attackbotsspam
Invalid user caldera from 88.102.244.211 port 38854
2020-07-19 03:06:28
203.143.20.89 attack
Invalid user sonny from 203.143.20.89 port 34345
2020-07-19 03:16:57
192.141.84.67 attackspambots
Port Scan
...
2020-07-19 02:46:17
164.132.98.75 attackspam
Jul 18 19:25:44 minden010 sshd[24147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75
Jul 18 19:25:46 minden010 sshd[24147]: Failed password for invalid user qyb from 164.132.98.75 port 39595 ssh2
Jul 18 19:30:06 minden010 sshd[25561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75
...
2020-07-19 02:52:49
95.78.251.116 attack
Invalid user ftpuser from 95.78.251.116 port 34778
2020-07-19 03:05:55
182.53.154.226 attackbotsspam
Invalid user avanthi from 182.53.154.226 port 6037
2020-07-19 03:22:36
152.136.178.37 attack
Jul 18 20:16:28 fhem-rasp sshd[1256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.178.37
Jul 18 20:16:30 fhem-rasp sshd[1256]: Failed password for invalid user sysadmin from 152.136.178.37 port 33478 ssh2
...
2020-07-19 02:54:19
129.211.124.29 attackbotsspam
Invalid user shibo from 129.211.124.29 port 37852
2020-07-19 02:57:33
51.254.141.211 attack
Jul 18 19:06:57 rotator sshd\[22915\]: Invalid user jasmin from 51.254.141.211Jul 18 19:06:58 rotator sshd\[22915\]: Failed password for invalid user jasmin from 51.254.141.211 port 45808 ssh2Jul 18 19:10:53 rotator sshd\[23707\]: Invalid user testuser2 from 51.254.141.211Jul 18 19:10:54 rotator sshd\[23707\]: Failed password for invalid user testuser2 from 51.254.141.211 port 52198 ssh2Jul 18 19:14:56 rotator sshd\[23756\]: Invalid user 123 from 51.254.141.211Jul 18 19:14:58 rotator sshd\[23756\]: Failed password for invalid user 123 from 51.254.141.211 port 58585 ssh2
...
2020-07-19 03:08:42
186.151.197.189 attack
Jul 18 16:45:37 ns392434 sshd[21681]: Invalid user paypal from 186.151.197.189 port 54000
Jul 18 16:45:37 ns392434 sshd[21681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.151.197.189
Jul 18 16:45:37 ns392434 sshd[21681]: Invalid user paypal from 186.151.197.189 port 54000
Jul 18 16:45:39 ns392434 sshd[21681]: Failed password for invalid user paypal from 186.151.197.189 port 54000 ssh2
Jul 18 16:53:53 ns392434 sshd[21908]: Invalid user got from 186.151.197.189 port 38780
Jul 18 16:53:53 ns392434 sshd[21908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.151.197.189
Jul 18 16:53:53 ns392434 sshd[21908]: Invalid user got from 186.151.197.189 port 38780
Jul 18 16:53:55 ns392434 sshd[21908]: Failed password for invalid user got from 186.151.197.189 port 38780 ssh2
Jul 18 16:59:51 ns392434 sshd[22242]: Invalid user sakshi from 186.151.197.189 port 53700
2020-07-19 03:19:31
106.12.151.250 attackspam
Invalid user vdc from 106.12.151.250 port 46874
2020-07-19 03:03:17
195.206.105.217 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-19 03:17:10
220.130.10.13 attackbotsspam
Jul 18 19:50:07 serwer sshd\[8867\]: Invalid user exit from 220.130.10.13 port 36606
Jul 18 19:50:07 serwer sshd\[8867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.10.13
Jul 18 19:50:09 serwer sshd\[8867\]: Failed password for invalid user exit from 220.130.10.13 port 36606 ssh2
...
2020-07-19 03:14:24

Recently Reported IPs

122.246.244.253 144.217.61.189 109.252.108.88 87.61.232.98
94.191.20.179 189.126.202.22 111.201.170.118 62.176.27.26
186.195.113.61 91.244.252.52 61.246.39.105 79.166.215.134
211.157.148.85 5.202.149.37 198.108.67.78 36.225.158.2
115.79.50.168 217.182.228.22 81.130.245.143 178.221.105.238