Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Lithuania

Internet Service Provider: UAB Baltnetos komunikacijos

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Autoban   45.82.34.229 AUTH/CONNECT
2019-09-14 15:16:15
Comments on same subnet:
IP Type Details Datetime
45.82.34.224 attackspam
Mar  8 05:44:14 mail.srvfarm.net postfix/smtpd[3234583]: NOQUEUE: reject: RCPT from unknown[45.82.34.224]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  8 05:44:24 mail.srvfarm.net postfix/smtpd[3235189]: NOQUEUE: reject: RCPT from unknown[45.82.34.224]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  8 05:46:47 mail.srvfarm.net postfix/smtpd[3235189]: NOQUEUE: reject: RCPT from unknown[45.82.34.224]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  8 05:47:46 mail.srvfarm.net postfix/smtpd[
2020-03-08 18:24:48
45.82.34.144 attackspam
Mar  7 05:24:21 mail.srvfarm.net postfix/smtpd[2589509]: NOQUEUE: reject: RCPT from unknown[45.82.34.144]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  7 05:24:35 mail.srvfarm.net postfix/smtpd[2589509]: NOQUEUE: reject: RCPT from unknown[45.82.34.144]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  7 05:28:44 mail.srvfarm.net postfix/smtpd[2593157]: NOQUEUE: reject: RCPT from unknown[45.82.34.144]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  7 05:29:09 mail.srvfarm.net postfix/smtpd[2591616]: NOQUEUE: reject: RCPT from unknown[45.82.34.1
2020-03-07 18:58:40
45.82.34.191 attackspambots
Mar  6 05:29:23 mail.srvfarm.net postfix/smtpd[1923012]: NOQUEUE: reject: RCPT from unknown[45.82.34.191]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 05:30:30 mail.srvfarm.net postfix/smtpd[1924591]: NOQUEUE: reject: RCPT from unknown[45.82.34.191]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 05:31:17 mail.srvfarm.net postfix/smtpd[1924585]: NOQUEUE: reject: RCPT from unknown[45.82.34.191]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 05:33:14 mail.srvfarm.net postfix/smtpd[1924
2020-03-06 18:50:39
45.82.34.238 attackspambots
Mar  5 05:28:44 web01 postfix/smtpd[25364]: connect from dance.geomaticvista.com[45.82.34.238]
Mar  5 05:28:44 web01 policyd-spf[25367]: None; identhostnamey=helo; client-ip=45.82.34.238; helo=dance.premchandsharma.co; envelope-from=x@x
Mar  5 05:28:44 web01 policyd-spf[25367]: Pass; identhostnamey=mailfrom; client-ip=45.82.34.238; helo=dance.premchandsharma.co; envelope-from=x@x
Mar x@x
Mar  5 05:28:44 web01 postfix/smtpd[25364]: disconnect from dance.geomaticvista.com[45.82.34.238]
Mar  5 05:32:36 web01 postfix/smtpd[25361]: connect from dance.geomaticvista.com[45.82.34.238]
Mar  5 05:32:36 web01 policyd-spf[25366]: None; identhostnamey=helo; client-ip=45.82.34.238; helo=dance.premchandsharma.co; envelope-from=x@x
Mar  5 05:32:36 web01 policyd-spf[25366]: Pass; identhostnamey=mailfrom; client-ip=45.82.34.238; helo=dance.premchandsharma.co; envelope-from=x@x
Mar x@x
Mar  5 05:32:36 web01 postfix/smtpd[25361]: disconnect from dance.geomaticvista.com[45.82.34.238]
Mar  5........
-------------------------------
2020-03-05 15:59:02
45.82.34.245 attackbotsspam
[ER hit] Tried to deliver spam. Already well known.
2020-01-26 13:53:14
45.82.34.212 attack
Autoban   45.82.34.212 AUTH/CONNECT
2020-01-24 19:16:41
45.82.34.178 attackspam
Autoban   45.82.34.178 AUTH/CONNECT
2020-01-08 20:07:18
45.82.34.90 attack
Brute force attempt
2020-01-08 19:29:55
45.82.34.85 attackspambots
Autoban   45.82.34.85 AUTH/CONNECT
2019-12-29 15:54:00
45.82.34.74 attackbotsspam
Email Spam
2019-12-23 18:28:30
45.82.34.239 attackbotsspam
Autoban   45.82.34.239 AUTH/CONNECT
2019-12-23 02:11:57
45.82.34.25 attackbots
Autoban   45.82.34.25 AUTH/CONNECT
2019-12-13 06:49:31
45.82.34.251 attackbots
Autoban   45.82.34.251 AUTH/CONNECT
2019-12-13 06:49:16
45.82.34.252 attack
Autoban   45.82.34.252 AUTH/CONNECT
2019-12-13 06:48:19
45.82.34.253 attack
Autoban   45.82.34.253 AUTH/CONNECT
2019-12-13 06:47:50
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.82.34.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16785
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.82.34.229.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091400 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Sep 14 15:16:04 CST 2019
;; MSG SIZE  rcvd: 116
Host info
229.34.82.45.in-addr.arpa domain name pointer plenteous.geomaticvista.com.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
229.34.82.45.in-addr.arpa	name = plenteous.geomaticvista.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.107.187.162 attackspam
Jul  6 13:59:20 bchgang sshd[2374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.107.187.162
Jul  6 13:59:22 bchgang sshd[2374]: Failed password for invalid user marketing from 93.107.187.162 port 43282 ssh2
Jul  6 14:02:37 bchgang sshd[2466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.107.187.162
...
2020-07-06 22:15:32
111.229.34.121 attack
Bruteforce detected by fail2ban
2020-07-06 22:24:01
219.250.188.165 attackspambots
Jul  6 15:56:43 hosting sshd[2002]: Invalid user yuzhonghang from 219.250.188.165 port 59719
...
2020-07-06 21:52:13
37.187.73.206 attackspambots
Automatic report - Banned IP Access
2020-07-06 22:02:57
218.92.0.220 attack
Jul  6 20:53:13 itv-usvr-02 sshd[12794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.220  user=root
Jul  6 20:53:15 itv-usvr-02 sshd[12794]: Failed password for root from 218.92.0.220 port 55791 ssh2
2020-07-06 21:56:13
185.234.219.227 attackspam
2020-07-06T08:14:28.932436linuxbox-skyline auth[647076]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=sharp rhost=185.234.219.227
...
2020-07-06 22:19:20
46.101.81.132 attack
46.101.81.132 - - [06/Jul/2020:13:56:28 +0100] "POST /wp-login.php HTTP/1.1" 200 1948 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
46.101.81.132 - - [06/Jul/2020:13:56:29 +0100] "POST /wp-login.php HTTP/1.1" 200 1929 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
46.101.81.132 - - [06/Jul/2020:13:56:30 +0100] "POST /wp-login.php HTTP/1.1" 200 1926 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-06 22:03:09
54.37.159.12 attackspambots
$f2bV_matches
2020-07-06 22:18:01
182.61.27.149 attack
Jul  6 15:42:59 lnxweb62 sshd[3077]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.27.149
2020-07-06 22:17:02
185.116.194.36 attackbotsspam
Jul  6 16:57:06 lukav-desktop sshd\[29608\]: Invalid user prueba from 185.116.194.36
Jul  6 16:57:06 lukav-desktop sshd\[29608\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.116.194.36
Jul  6 16:57:08 lukav-desktop sshd\[29608\]: Failed password for invalid user prueba from 185.116.194.36 port 57750 ssh2
Jul  6 17:00:45 lukav-desktop sshd\[29677\]: Invalid user minecraft from 185.116.194.36
Jul  6 17:00:45 lukav-desktop sshd\[29677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.116.194.36
2020-07-06 22:05:42
107.172.249.10 attack
Jul  6 14:56:11 debian-2gb-nbg1-2 kernel: \[16298779.700522\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=107.172.249.10 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=TCP SPT=41694 DPT=8088 WINDOW=65535 RES=0x00 SYN URGP=0
2020-07-06 22:16:47
144.22.95.234 attackspam
port scan and connect, tcp 80 (http)
2020-07-06 22:15:50
122.228.19.79 attack
Mon Jul  6 16:31:43 2020 122.228.19.79:5255 TLS Error: TLS handshake failed
2020-07-06 22:33:23
78.138.188.187 attackbotsspam
Jul  6 13:56:17 ajax sshd[15008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.138.188.187 
Jul  6 13:56:19 ajax sshd[15008]: Failed password for invalid user catherine from 78.138.188.187 port 37230 ssh2
2020-07-06 22:10:26
94.79.7.4 attack
Jul  6 14:56:32 mail postfix/postscreen[3754]: PREGREET 275 after 0 from [94.79.7.4]:12828: GET / HTTP/1.1
Host: 188.68.39.4:25
Accept: text/html,application/xhtml+xml,application/xml;q=
...
2020-07-06 22:01:41

Recently Reported IPs

167.220.201.132 225.149.175.2 196.46.220.225 45.34.201.206
127.243.74.241 112.211.228.141 83.129.222.96 229.236.107.200
180.202.221.63 233.69.204.54 103.217.117.23 103.192.76.72
125.167.237.204 3.17.172.171 59.56.89.95 166.62.44.215
53.129.59.227 150.25.224.126 190.104.246.114 95.67.114.52