Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: TrafficTransitSolution LLC

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
Chat Spam
2020-05-14 18:39:45
Comments on same subnet:
IP Type Details Datetime
45.66.208.144 attackbotsspam
Chat Spam
2020-06-05 22:27:58
45.66.208.247 attackbots
Chat Spam
2020-05-14 03:13:55
45.66.208.61 attackspam
Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="
2019-12-27 05:41:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.66.208.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1598
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.66.208.148.			IN	A

;; AUTHORITY SECTION:
.			439	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051400 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 14 18:39:42 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 148.208.66.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.208.66.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.248.126.170 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-04-20 07:05:53
23.91.71.220 attackspambots
Too Many Connections Or General Abuse
2020-04-20 07:10:43
5.34.131.72 attack
Apr 19 23:43:06 v22019038103785759 sshd\[18725\]: Invalid user wk from 5.34.131.72 port 58274
Apr 19 23:43:06 v22019038103785759 sshd\[18725\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.34.131.72
Apr 19 23:43:08 v22019038103785759 sshd\[18725\]: Failed password for invalid user wk from 5.34.131.72 port 58274 ssh2
Apr 19 23:48:35 v22019038103785759 sshd\[19160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.34.131.72  user=root
Apr 19 23:48:37 v22019038103785759 sshd\[19160\]: Failed password for root from 5.34.131.72 port 39116 ssh2
...
2020-04-20 07:08:25
192.210.171.229 attackbotsspam
bruteforce detected
2020-04-20 07:30:28
222.165.186.51 attackspam
Apr 19 23:31:43 : SSH login attempts with invalid user
2020-04-20 07:18:09
51.38.80.208 attack
Apr 19 19:22:18 firewall sshd[2770]: Invalid user admin from 51.38.80.208
Apr 19 19:22:20 firewall sshd[2770]: Failed password for invalid user admin from 51.38.80.208 port 42436 ssh2
Apr 19 19:25:33 firewall sshd[2846]: Invalid user ubuntu from 51.38.80.208
...
2020-04-20 07:24:16
49.72.211.68 attack
SASL broute force
2020-04-20 07:37:33
116.196.101.168 attackbotsspam
Invalid user sj from 116.196.101.168 port 48898
2020-04-20 07:42:18
138.68.233.112 attackbots
138.68.233.112 - - [20/Apr/2020:00:17:07 +0200] "POST /wp-login.php HTTP/1.1" 200 3405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.233.112 - - [20/Apr/2020:00:17:11 +0200] "POST /wp-login.php HTTP/1.1" 200 3383 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-04-20 07:18:53
139.99.40.44 attack
$f2bV_matches
2020-04-20 07:20:32
103.78.215.150 attackspambots
SSHD brute force attack detected by fail2ban
2020-04-20 07:08:10
64.225.42.124 attack
WordPress login Brute force / Web App Attack on client site.
2020-04-20 07:21:36
103.79.90.72 attackbotsspam
3x Failed Password
2020-04-20 07:41:31
142.93.53.214 attackspam
srv02 Mass scanning activity detected Target: 22893  ..
2020-04-20 07:36:35
112.35.33.79 attackbotsspam
Apr 20 04:08:18 webhost01 sshd[2199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.35.33.79
Apr 20 04:08:20 webhost01 sshd[2199]: Failed password for invalid user cent from 112.35.33.79 port 60937 ssh2
...
2020-04-20 07:09:19

Recently Reported IPs

177.95.11.242 14.231.168.237 18.232.1.147 14.173.55.211
200.159.17.146 91.82.214.122 80.254.126.251 78.108.251.140
171.236.123.92 113.161.33.239 73.50.157.67 67.207.103.98
58.182.188.169 118.173.62.155 49.235.232.185 49.213.180.181
211.20.115.106 36.228.45.14 181.213.249.134 171.225.251.81