Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Severínia

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.70.141.210
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43837
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.70.141.210.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 00:04:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
210.141.70.45.in-addr.arpa domain name pointer 45-70-141-210-cliente.megalinkwifi.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
210.141.70.45.in-addr.arpa	name = 45-70-141-210-cliente.megalinkwifi.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
178.128.201.224 attack
$f2bV_matches
2019-06-26 21:20:35
2607:5300:60:2bb::1 attack
wp brute-force
2019-06-26 20:51:33
123.140.114.252 attack
Reported by AbuseIPDB proxy server.
2019-06-26 21:40:32
92.91.60.249 attackbotsspam
Jun 26 15:17:21 dev sshd\[14855\]: Invalid user db2inst1 from 92.91.60.249 port 40702
Jun 26 15:17:21 dev sshd\[14855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.91.60.249
...
2019-06-26 21:35:07
222.186.174.72 attackspambots
26.06.2019 13:19:04 HTTP access blocked by firewall
2019-06-26 21:19:46
79.167.152.171 attackspam
23/tcp
[2019-06-26]1pkt
2019-06-26 21:07:32
120.229.42.59 attack
Jun 26 05:33:48 mxgate1 postfix/postscreen[23334]: CONNECT from [120.229.42.59]:1139 to [176.31.12.44]:25
Jun 26 05:33:48 mxgate1 postfix/dnsblog[23338]: addr 120.229.42.59 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 26 05:33:48 mxgate1 postfix/dnsblog[23339]: addr 120.229.42.59 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 26 05:33:54 mxgate1 postfix/postscreen[23334]: DNSBL rank 3 for [120.229.42.59]:1139
Jun x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=120.229.42.59
2019-06-26 21:10:49
1.174.58.222 attack
2222/tcp
[2019-06-26]1pkt
2019-06-26 20:57:22
196.46.20.132 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 01:24:20,967 INFO [shellcode_manager] (196.46.20.132) no match, writing hexdump (640edc3c5ca606772315982a3a6d51a1 :2158476) - MS17010 (EternalBlue)
2019-06-26 21:34:10
176.9.0.19 attack
WordPress
2019-06-26 21:15:07
188.165.137.168 attackspambots
Jun 26 15:17:05 s1 wordpress\(www.programmpunkt.de\)\[8207\]: Authentication attempt for unknown user fehst from 188.165.137.168
...
2019-06-26 21:39:43
179.165.132.133 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-06-26 21:41:44
113.182.51.34 attackspambots
Unauthorized connection attempt from IP address 113.182.51.34 on Port 445(SMB)
2019-06-26 21:23:55
51.75.248.164 attackspambots
Triggered by Fail2Ban
2019-06-26 21:03:39
183.157.173.98 attack
TCP port 22 (SSH) attempt blocked by firewall. [2019-06-26 13:19:13]
2019-06-26 20:50:45

Recently Reported IPs

138.209.126.92 159.22.205.52 132.233.158.71 174.27.118.80
177.55.83.9 125.94.182.194 251.244.15.14 108.175.138.20
81.110.224.120 95.204.168.103 77.15.120.157 54.36.187.182
68.124.81.12 223.139.190.35 129.100.188.148 244.44.33.245
142.141.222.108 212.106.165.103 200.15.190.23 25.171.64.189