Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Araçatuba

Region: Sao Paulo

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.70.85.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53229
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.70.85.20.			IN	A

;; AUTHORITY SECTION:
.			568	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101002 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 18:36:26 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 20.85.70.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.85.70.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.24.178.224 attackspambots
Oct 11 13:56:16 legacy sshd[1473]: Failed password for root from 118.24.178.224 port 39690 ssh2
Oct 11 14:00:39 legacy sshd[1602]: Failed password for root from 118.24.178.224 port 40292 ssh2
...
2019-10-11 23:15:54
222.186.169.192 attackspam
Oct 11 20:19:22 gw1 sshd[29161]: Failed password for root from 222.186.169.192 port 6440 ssh2
Oct 11 20:19:38 gw1 sshd[29161]: error: maximum authentication attempts exceeded for root from 222.186.169.192 port 6440 ssh2 [preauth]
...
2019-10-11 23:36:40
203.146.170.167 attackspam
2019-10-11T17:27:59.884756tmaserv sshd\[13459\]: Invalid user P@r0la0101 from 203.146.170.167 port 60326
2019-10-11T17:27:59.889875tmaserv sshd\[13459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.146.170.167
2019-10-11T17:28:02.092577tmaserv sshd\[13459\]: Failed password for invalid user P@r0la0101 from 203.146.170.167 port 60326 ssh2
2019-10-11T18:31:11.902002tmaserv sshd\[16231\]: Invalid user P@ssw0rt1q from 203.146.170.167 port 45236
2019-10-11T18:31:11.905723tmaserv sshd\[16231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.146.170.167
2019-10-11T18:31:13.349763tmaserv sshd\[16231\]: Failed password for invalid user P@ssw0rt1q from 203.146.170.167 port 45236 ssh2
...
2019-10-11 23:39:47
85.240.40.120 attackbots
SSH Brute Force, server-1 sshd[2489]: Failed password for invalid user Guest from 85.240.40.120 port 50244 ssh2
2019-10-11 23:02:48
46.101.142.17 attackspam
Oct  9 08:04:18 rb06 sshd[5227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.142.17  user=r.r
Oct  9 08:04:19 rb06 sshd[5227]: Failed password for r.r from 46.101.142.17 port 39902 ssh2
Oct  9 08:04:19 rb06 sshd[5227]: Received disconnect from 46.101.142.17: 11: Bye Bye [preauth]
Oct  9 08:23:57 rb06 sshd[15483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.142.17  user=r.r
Oct  9 08:24:00 rb06 sshd[15483]: Failed password for r.r from 46.101.142.17 port 54320 ssh2
Oct  9 08:24:00 rb06 sshd[15483]: Received disconnect from 46.101.142.17: 11: Bye Bye [preauth]
Oct  9 08:27:37 rb06 sshd[15809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.142.17  user=r.r
Oct  9 08:27:39 rb06 sshd[15809]: Failed password for r.r from 46.101.142.17 port 39172 ssh2
Oct  9 08:27:39 rb06 sshd[15809]: Received disconnect from 46.101.142.17: 11: ........
-------------------------------
2019-10-11 23:21:18
175.211.112.246 attack
(sshd) Failed SSH login from 175.211.112.246 (KR/South Korea/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Oct 11 07:58:11 host sshd[39717]: Invalid user vali from 175.211.112.246 port 60298
2019-10-11 23:25:00
223.167.237.73 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/223.167.237.73/ 
 CN - 1H : (519)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN17621 
 
 IP : 223.167.237.73 
 
 CIDR : 223.167.128.0/17 
 
 PREFIX COUNT : 677 
 
 UNIQUE IP COUNT : 946176 
 
 
 WYKRYTE ATAKI Z ASN17621 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-10-11 13:58:21 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-11 23:11:09
92.63.194.26 attack
Oct 11 17:31:06 srv206 sshd[5805]: Invalid user admin from 92.63.194.26
Oct 11 17:31:06 srv206 sshd[5805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26
Oct 11 17:31:06 srv206 sshd[5805]: Invalid user admin from 92.63.194.26
Oct 11 17:31:08 srv206 sshd[5805]: Failed password for invalid user admin from 92.63.194.26 port 37964 ssh2
...
2019-10-11 23:31:45
211.214.150.34 attackspam
Unauthorised access (Oct 11) SRC=211.214.150.34 LEN=40 TTL=53 ID=24136 TCP DPT=23 WINDOW=30773 SYN
2019-10-11 23:05:02
218.29.42.219 attack
Oct 11 16:00:18 bouncer sshd\[25728\]: Invalid user Star@2017 from 218.29.42.219 port 35639
Oct 11 16:00:18 bouncer sshd\[25728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.29.42.219 
Oct 11 16:00:21 bouncer sshd\[25728\]: Failed password for invalid user Star@2017 from 218.29.42.219 port 35639 ssh2
...
2019-10-11 23:01:50
178.128.215.150 attack
Automatic report - XMLRPC Attack
2019-10-11 23:13:52
183.134.199.68 attackspambots
$f2bV_matches
2019-10-11 22:49:31
220.171.48.39 attack
Dovecot Brute-Force
2019-10-11 23:37:38
222.186.42.241 attackspam
Oct 11 17:06:19 localhost sshd\[21911\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.241  user=root
Oct 11 17:06:21 localhost sshd\[21911\]: Failed password for root from 222.186.42.241 port 12780 ssh2
Oct 11 17:06:24 localhost sshd\[21911\]: Failed password for root from 222.186.42.241 port 12780 ssh2
2019-10-11 23:07:40
212.159.47.250 attack
Invalid user test from 212.159.47.250 port 48242
2019-10-11 22:52:27

Recently Reported IPs

39.72.53.10 34.82.189.23 103.189.102.3 123.160.221.63
65.2.128.19 193.56.64.243 149.28.68.189 40.127.96.150
103.144.139.112 202.112.51.77 39.185.192.151 42.54.157.82
39.81.43.23 157.245.221.116 31.223.51.119 103.250.11.100
222.93.248.93 58.219.77.34 139.162.45.238 213.108.128.232