Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Porangatu

Region: Goias

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.70.193.40 attack
Port Scan: TCP/8080
2019-09-25 07:45:31
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.70.193.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21857
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.70.193.71.			IN	A

;; AUTHORITY SECTION:
.			413	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061401 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 08:31:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
71.193.70.45.in-addr.arpa domain name pointer 45-70-193-71.netexpand.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
71.193.70.45.in-addr.arpa	name = 45-70-193-71.netexpand.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.112.44.190 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/92.112.44.190/ 
 UA - 1H : (74)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : UA 
 NAME ASN : ASN6849 
 
 IP : 92.112.44.190 
 
 CIDR : 92.112.0.0/18 
 
 PREFIX COUNT : 1366 
 
 UNIQUE IP COUNT : 1315840 
 
 
 WYKRYTE ATAKI Z ASN6849 :  
  1H - 1 
  3H - 1 
  6H - 4 
 12H - 6 
 24H - 9 
 
 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-23 08:44:09
177.19.187.79 attackspam
Automatic report - Banned IP Access
2019-09-23 08:07:14
118.27.12.50 attackspam
Sep 22 11:14:34 aiointranet sshd\[20477\]: Invalid user roderick from 118.27.12.50
Sep 22 11:14:34 aiointranet sshd\[20477\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-12-50.64eh.static.cnode.io
Sep 22 11:14:35 aiointranet sshd\[20477\]: Failed password for invalid user roderick from 118.27.12.50 port 34526 ssh2
Sep 22 11:19:05 aiointranet sshd\[20881\]: Invalid user gm from 118.27.12.50
Sep 22 11:19:05 aiointranet sshd\[20881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=v118-27-12-50.64eh.static.cnode.io
2019-09-23 08:43:43
5.135.152.97 attackspam
k+ssh-bruteforce
2019-09-23 08:41:08
203.168.1.0 attackspam
Unauthorized connection attempt from IP address 203.168.1.0 on Port 445(SMB)
2019-09-23 08:05:09
52.50.232.130 attackbots
Sep 22 14:11:15 friendsofhawaii sshd\[27660\]: Invalid user odroid from 52.50.232.130
Sep 22 14:11:15 friendsofhawaii sshd\[27660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-50-232-130.eu-west-1.compute.amazonaws.com
Sep 22 14:11:17 friendsofhawaii sshd\[27660\]: Failed password for invalid user odroid from 52.50.232.130 port 50202 ssh2
Sep 22 14:19:03 friendsofhawaii sshd\[28368\]: Invalid user pgadmin from 52.50.232.130
Sep 22 14:19:03 friendsofhawaii sshd\[28368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ec2-52-50-232-130.eu-west-1.compute.amazonaws.com
2019-09-23 08:39:41
222.186.180.21 attack
Attack on synology
2019-09-23 08:09:46
93.42.126.148 attackspam
Sep 22 20:27:28 plusreed sshd[6426]: Invalid user mumbleserver from 93.42.126.148
...
2019-09-23 08:28:30
195.112.117.59 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/195.112.117.59/ 
 RU - 1H : (259)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN8636 
 
 IP : 195.112.117.59 
 
 CIDR : 195.112.116.0/22 
 
 PREFIX COUNT : 34 
 
 UNIQUE IP COUNT : 21504 
 
 
 WYKRYTE ATAKI Z ASN8636 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SERVER - ABB - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-09-23 08:42:23
14.187.97.81 attackspambots
Sep 22 22:59:00 pl3server sshd[2755719]: Address 14.187.97.81 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 22 22:59:00 pl3server sshd[2755719]: Invalid user admin from 14.187.97.81
Sep 22 22:59:00 pl3server sshd[2755719]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.187.97.81
Sep 22 22:59:02 pl3server sshd[2755719]: Failed password for invalid user admin from 14.187.97.81 port 49051 ssh2
Sep 22 22:59:03 pl3server sshd[2755719]: Connection closed by 14.187.97.81 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.187.97.81
2019-09-23 08:18:10
126.113.12.130 attackbotsspam
Unauthorized connection attempt from IP address 126.113.12.130 on Port 445(SMB)
2019-09-23 08:09:29
213.74.203.106 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-09-23 08:06:20
91.183.90.237 attack
Sep 22 22:52:30 XXX sshd[50925]: Invalid user ofsaa from 91.183.90.237 port 57940
2019-09-23 08:31:34
36.79.145.204 attackbots
Unauthorized connection attempt from IP address 36.79.145.204 on Port 445(SMB)
2019-09-23 08:32:57
149.56.177.246 attackspambots
$f2bV_matches
2019-09-23 08:14:12

Recently Reported IPs

38.123.123.234 45.70.193.128 45.70.193.222 5.202.145.2
45.70.194.62 45.70.194.74 45.70.194.116 45.66.209.128
45.66.209.69 38.123.119.206 38.123.121.38 38.123.121.40
38.123.123.28 38.123.122.156 38.123.123.224 38.128.5.206
38.128.8.210 38.128.8.32 38.128.8.12 38.128.11.148