Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.9.148.29 attackbots
Fail2Ban Ban Triggered
2020-09-09 20:28:52
45.9.148.29 attack
Fail2Ban Ban Triggered
2020-09-09 14:26:03
45.9.148.29 attackbots
Fail2Ban Ban Triggered
2020-09-09 06:37:37
45.9.148.82 attackspam
Probable attack : HTTPS hit by IP; not hostname
2020-08-05 05:13:44
45.9.148.125 attack
2020-07-23 15:43:19
45.9.148.194 attack
/adminer/adminer.php
2020-07-08 02:48:46
45.9.148.91 attack
sca
2020-07-05 19:44:20
45.9.148.194 attackbotsspam
404 NOT FOUND
2020-07-04 16:33:20
45.9.148.91 attackspambots
Unauthorized connection attempt detected from IP address 45.9.148.91 to port 53
2020-06-24 12:48:06
45.9.148.213 attackbots
schuetzenmusikanten.de 45.9.148.213 [20/Jun/2020:14:18:46 +0200] "POST /xmlrpc.php HTTP/1.0" 301 511 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
schuetzenmusikanten.de 45.9.148.213 [20/Jun/2020:14:18:48 +0200] "POST /xmlrpc.php HTTP/1.0" 200 3595 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko"
2020-06-20 22:24:58
45.9.148.91 attackspambots
IP: 45.9.148.91
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS49447 Nice IT Services Group Inc.
   Netherlands (NL)
   CIDR 45.9.148.0/23
Log Date: 10/06/2020 8:12:49 AM UTC
2020-06-10 16:38:20
45.9.148.215 attackspambots
xmlrpc attack
2020-06-05 21:27:32
45.9.148.220 attackbotsspam
(mod_security) mod_security (id:210492) triggered by 45.9.148.220 (NL/Netherlands/-): 5 in the last 3600 secs
2020-05-31 07:52:05
45.9.148.131 attack
SSH login attempts.
2020-05-28 14:52:20
45.9.148.213 attackbots
Tor exit node
2020-05-28 02:35:30
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.9.148.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18055
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.9.148.243.			IN	A

;; AUTHORITY SECTION:
.			346	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023041100 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 12 02:38:48 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 243.148.9.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.148.9.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.54.167.13 attackbotsspam
May 14 06:20:14 debian-2gb-nbg1-2 kernel: \[11688869.685473\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.167.13 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=64225 PROTO=TCP SPT=49163 DPT=11263 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-14 12:33:56
92.118.161.61 attack
Connection by 92.118.161.61 on port: 1521 got caught by honeypot at 5/14/2020 4:54:27 AM
2020-05-14 12:32:31
80.13.87.178 attack
May 14 06:30:15 vmd26974 sshd[3766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.13.87.178
May 14 06:30:17 vmd26974 sshd[3766]: Failed password for invalid user duanhw from 80.13.87.178 port 60420 ssh2
...
2020-05-14 12:35:20
71.162.135.225 attackbotsspam
US_MCI_<177>1589428456 [1:2403420:57249] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 61 [Classification: Misc Attack] [Priority: 2]:  {TCP} 71.162.135.225:1029
2020-05-14 12:48:51
37.187.195.209 attackspam
May 14 13:54:18 pihole sshd[23595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.195.209 
...
2020-05-14 12:45:09
167.99.155.36 attack
May 13 22:14:37 server1 sshd\[23415\]: Failed password for invalid user ovenfresh from 167.99.155.36 port 47120 ssh2
May 13 22:18:23 server1 sshd\[24573\]: Invalid user dracula from 167.99.155.36
May 13 22:18:23 server1 sshd\[24573\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.155.36 
May 13 22:18:24 server1 sshd\[24573\]: Failed password for invalid user dracula from 167.99.155.36 port 55472 ssh2
May 13 22:22:20 server1 sshd\[25671\]: Invalid user alejandro from 167.99.155.36
...
2020-05-14 12:24:53
106.75.174.87 attackspam
May 14 05:52:07 ns381471 sshd[12462]: Failed password for root from 106.75.174.87 port 36442 ssh2
May 14 05:54:43 ns381471 sshd[12624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.174.87
2020-05-14 12:25:16
85.204.246.240 attack
CMS (WordPress or Joomla) login attempt.
2020-05-14 12:35:46
106.75.13.213 attackspambots
May 14 05:50:43 MainVPS sshd[2438]: Invalid user meg from 106.75.13.213 port 47307
May 14 05:50:43 MainVPS sshd[2438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.13.213
May 14 05:50:43 MainVPS sshd[2438]: Invalid user meg from 106.75.13.213 port 47307
May 14 05:50:44 MainVPS sshd[2438]: Failed password for invalid user meg from 106.75.13.213 port 47307 ssh2
May 14 05:54:38 MainVPS sshd[5706]: Invalid user event from 106.75.13.213 port 45486
...
2020-05-14 12:29:58
200.40.45.82 attackspambots
May 14 06:06:07 OPSO sshd\[32340\]: Invalid user serverpilot from 200.40.45.82 port 54954
May 14 06:06:07 OPSO sshd\[32340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.40.45.82
May 14 06:06:09 OPSO sshd\[32340\]: Failed password for invalid user serverpilot from 200.40.45.82 port 54954 ssh2
May 14 06:10:04 OPSO sshd\[529\]: Invalid user redis from 200.40.45.82 port 56498
May 14 06:10:04 OPSO sshd\[529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.40.45.82
2020-05-14 12:27:42
51.254.205.6 attack
May 14 03:55:00 ns3033917 sshd[23884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.205.6
May 14 03:55:00 ns3033917 sshd[23884]: Invalid user hxc from 51.254.205.6 port 46898
May 14 03:55:03 ns3033917 sshd[23884]: Failed password for invalid user hxc from 51.254.205.6 port 46898 ssh2
...
2020-05-14 12:11:36
139.59.57.2 attackspam
May 14 13:43:57 web1 sshd[11447]: Invalid user byte from 139.59.57.2 port 46808
May 14 13:43:57 web1 sshd[11447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.57.2
May 14 13:43:57 web1 sshd[11447]: Invalid user byte from 139.59.57.2 port 46808
May 14 13:43:59 web1 sshd[11447]: Failed password for invalid user byte from 139.59.57.2 port 46808 ssh2
May 14 13:50:15 web1 sshd[13081]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.57.2  user=root
May 14 13:50:18 web1 sshd[13081]: Failed password for root from 139.59.57.2 port 51892 ssh2
May 14 13:54:18 web1 sshd[14026]: Invalid user alden from 139.59.57.2 port 60266
May 14 13:54:18 web1 sshd[14026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.57.2
May 14 13:54:18 web1 sshd[14026]: Invalid user alden from 139.59.57.2 port 60266
May 14 13:54:20 web1 sshd[14026]: Failed password for invalid user a
...
2020-05-14 12:43:15
132.232.3.234 attack
May 14 06:10:22 haigwepa sshd[23378]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.3.234 
May 14 06:10:24 haigwepa sshd[23378]: Failed password for invalid user rax from 132.232.3.234 port 34122 ssh2
...
2020-05-14 12:31:59
185.15.74.241 attack
2020-05-14T03:54:40.468009abusebot-7.cloudsearch.cf sshd[27366]: Invalid user pi from 185.15.74.241 port 52214
2020-05-14T03:54:40.479430abusebot-7.cloudsearch.cf sshd[27368]: Invalid user pi from 185.15.74.241 port 52216
2020-05-14T03:54:40.588221abusebot-7.cloudsearch.cf sshd[27366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=xb90f4af1.cust.hiper.dk
2020-05-14T03:54:40.468009abusebot-7.cloudsearch.cf sshd[27366]: Invalid user pi from 185.15.74.241 port 52214
2020-05-14T03:54:42.553158abusebot-7.cloudsearch.cf sshd[27366]: Failed password for invalid user pi from 185.15.74.241 port 52214 ssh2
2020-05-14T03:54:40.618979abusebot-7.cloudsearch.cf sshd[27368]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=xb90f4af1.cust.hiper.dk
2020-05-14T03:54:40.479430abusebot-7.cloudsearch.cf sshd[27368]: Invalid user pi from 185.15.74.241 port 52216
2020-05-14T03:54:42.583471abusebot-7.cloudsearch.cf sshd[27368]: F
...
2020-05-14 12:26:42
120.236.236.219 attackbots
May 14 06:50:27 lukav-desktop sshd\[4134\]: Invalid user dede from 120.236.236.219
May 14 06:50:27 lukav-desktop sshd\[4134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.236.236.219
May 14 06:50:29 lukav-desktop sshd\[4134\]: Failed password for invalid user dede from 120.236.236.219 port 9366 ssh2
May 14 06:54:23 lukav-desktop sshd\[4267\]: Invalid user libuuid from 120.236.236.219
May 14 06:54:23 lukav-desktop sshd\[4267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.236.236.219
2020-05-14 12:39:11

Recently Reported IPs

79.134.139.235 46.232.121.35 82.25.30.88 69.200.255.171
189.111.101.75 10.48.62.23 136.172.70.199 238.74.182.178
24.201.10.105 25.110.59.243 139.99.31.134 139.95.78.32
57.150.190.135 45.153.22.132 43.154.50.209 218.228.158.177
176.103.71.136 218.59.53.27 110.193.199.92 201.51.201.207