Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: Nice IT Services Group Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
DATE:2019-12-09 07:32:27, IP:45.9.148.134, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-12-09 15:32:28
Comments on same subnet:
IP Type Details Datetime
45.9.148.29 attackbots
Fail2Ban Ban Triggered
2020-09-09 20:28:52
45.9.148.29 attack
Fail2Ban Ban Triggered
2020-09-09 14:26:03
45.9.148.29 attackbots
Fail2Ban Ban Triggered
2020-09-09 06:37:37
45.9.148.82 attackspam
Probable attack : HTTPS hit by IP; not hostname
2020-08-05 05:13:44
45.9.148.125 attack
2020-07-23 15:43:19
45.9.148.194 attack
/adminer/adminer.php
2020-07-08 02:48:46
45.9.148.91 attack
sca
2020-07-05 19:44:20
45.9.148.194 attackbotsspam
404 NOT FOUND
2020-07-04 16:33:20
45.9.148.91 attackspambots
Unauthorized connection attempt detected from IP address 45.9.148.91 to port 53
2020-06-24 12:48:06
45.9.148.213 attackbots
schuetzenmusikanten.de 45.9.148.213 [20/Jun/2020:14:18:46 +0200] "POST /xmlrpc.php HTTP/1.0" 301 511 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
schuetzenmusikanten.de 45.9.148.213 [20/Jun/2020:14:18:48 +0200] "POST /xmlrpc.php HTTP/1.0" 200 3595 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
2020-06-20 22:24:58
45.9.148.91 attackspambots
IP: 45.9.148.91
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS49447 Nice IT Services Group Inc.
   Netherlands (NL)
   CIDR 45.9.148.0/23
Log Date: 10/06/2020 8:12:49 AM UTC
2020-06-10 16:38:20
45.9.148.215 attackspambots
xmlrpc attack
2020-06-05 21:27:32
45.9.148.220 attackbotsspam
(mod_security) mod_security (id:210492) triggered by 45.9.148.220 (NL/Netherlands/-): 5 in the last 3600 secs
2020-05-31 07:52:05
45.9.148.131 attack
SSH login attempts.
2020-05-28 14:52:20
45.9.148.213 attackbots
Tor exit node
2020-05-28 02:35:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.9.148.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3187
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.9.148.134.			IN	A

;; AUTHORITY SECTION:
.			555	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120900 1800 900 604800 86400

;; Query time: 139 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 09 15:32:25 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 134.148.9.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.148.9.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.28.227.153 attackbots
SSH-BRUTEFORCE
2019-06-26 06:13:32
213.85.31.143 attackspam
Unauthorized connection attempt from IP address 213.85.31.143 on Port 445(SMB)
2019-06-26 06:41:10
187.213.234.93 attack
Unauthorised access (Jun 25) SRC=187.213.234.93 LEN=40 TTL=242 ID=29115 TCP DPT=445 WINDOW=1024 SYN
2019-06-26 06:41:55
88.99.145.83 attack
Only those who intend to destroy a site makes "all day" attempts like this below, so if this ip appears on your website block immediately 88.99.0.0/16 is high risk:

88.99.145.83/25/06/2019 02:10/error 403/GET/HTTP/1.1/9/
88.99.145.83/25/06/2019 12:21/9/error 403/GET/HTTP/1.1/
2019-06-26 06:13:01
68.183.127.176 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-06-26 06:36:06
85.93.18.108 attackspambots
2019-06-25 12:14:35 H=sv5.4seo.cc [85.93.18.108]:59324 I=[192.147.25.65]:25 sender verify fail for : Unrouteable address
2019-06-25 12:14:35 H=sv5.4seo.cc [85.93.18.108]:59324 I=[192.147.25.65]:25 F= rejected RCPT : Sender verify failed
2019-06-25 12:14:36 H=sv5.4seo.cc [85.93.18.108]:59409 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in zen.spamhaus.org (127.0.0.4) (https://www.spamhaus.org/query/ip/85.93.18.108)
...
2019-06-26 06:10:46
188.0.191.81 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-04-27/06-25]24pkt,1pt.(tcp)
2019-06-26 06:39:04
68.183.139.127 attack
2222/tcp 2222/tcp 22/tcp
[2019-06-15/25]3pkt
2019-06-26 06:12:02
74.82.47.27 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-06-26 06:48:18
104.236.94.202 attackspambots
Jun 25 19:11:20 h2177944 sshd\[19420\]: Invalid user shuan from 104.236.94.202 port 40148
Jun 25 19:11:20 h2177944 sshd\[19420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.94.202
Jun 25 19:11:22 h2177944 sshd\[19420\]: Failed password for invalid user shuan from 104.236.94.202 port 40148 ssh2
Jun 25 19:14:19 h2177944 sshd\[19462\]: Invalid user vagrant from 104.236.94.202 port 39852
...
2019-06-26 06:20:09
193.187.255.24 attack
445/tcp 445/tcp 445/tcp...
[2019-05-04/06-25]17pkt,1pt.(tcp)
2019-06-26 06:12:43
202.101.232.120 attack
445/tcp 445/tcp 445/tcp...
[2019-05-06/06-25]4pkt,1pt.(tcp)
2019-06-26 06:26:20
88.127.172.14 attackbotsspam
22/tcp 22/tcp
[2019-06-23/25]2pkt
2019-06-26 06:36:53
190.85.50.62 attackbotsspam
445/tcp 445/tcp
[2019-05-28/06-25]2pkt
2019-06-26 06:47:47
181.174.102.111 attackspambots
445/tcp 445/tcp
[2019-05-05/06-25]2pkt
2019-06-26 06:41:32

Recently Reported IPs

189.181.198.255 188.254.0.2 176.36.2.197 88.86.81.176
187.32.254.202 182.72.170.186 134.249.157.239 92.15.37.75
78.13.213.10 45.237.239.245 113.173.84.220 113.53.29.163
72.113.208.95 254.51.204.73 103.76.22.118 201.121.120.13
91.192.40.67 73.216.194.209 49.234.201.90 45.189.74.183