Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: 3NT Solutions LLP

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspambots
"Unrouteable address"
2020-03-28 08:32:57
Comments on same subnet:
IP Type Details Datetime
5.45.68.133 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 5 - port: 55611 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:26:06
5.45.68.133 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 5 - port: 55608 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:53:40
5.45.68.133 attackspambots
(PERMBLOCK) 5.45.68.133 (NL/Netherlands/-) has had more than 4 temp blocks in the last 86400 secs; Ports: *; Direction: inout; Trigger: LF_PERMBLOCK_COUNT; Logs:
2020-09-30 16:19:14
5.45.68.189 attackbotsspam
Dear Sir / Madam, 
Yesterday, my close friend (Simona Simova) was contacted via fake Facebook profile to be informed that she has a profile on a escort website. While researching via the German phone number used in the advert, we have came across more ads. These profiles are created without her permission and she is now very upset. 

Here is a list of the profiles we have found: 

- https://escortsofia.info/de/sia-11/ (5.45.68.189)
- https://escortsofia.info/de/eleonora-8/ (5.45.68.189)
- https://escortinberlin.info/eleonora-3/ (5.45.68.189)
- https://escortinberlin.info/sia-2/ (5.45.68.189)

We have already hired a lawyer in Germany who will escalate the issue to the authorities.
2020-04-24 03:31:08
5.45.68.19 attackspam
WP Authentication failure
2019-07-15 18:24:20
5.45.68.19 attackspam
SQL Injection Exploit Attempts
2019-07-01 05:07:03
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.45.68.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16852
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;5.45.68.15.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032800 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 08:32:54 CST 2020
;; MSG SIZE  rcvd: 114
Host info
15.68.45.5.in-addr.arpa domain name pointer darkhost.pro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
15.68.45.5.in-addr.arpa	name = darkhost.pro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
12.228.211.6 attackbotsspam
Dec 26 09:29:22 server sshd\[31586\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.228.211.6  user=root
Dec 26 09:29:24 server sshd\[31586\]: Failed password for root from 12.228.211.6 port 54037 ssh2
Dec 26 09:29:26 server sshd\[31596\]: Invalid user elision from 12.228.211.6
Dec 26 09:29:26 server sshd\[31596\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.228.211.6 
Dec 26 09:29:28 server sshd\[31596\]: Failed password for invalid user elision from 12.228.211.6 port 55584 ssh2
...
2019-12-26 15:16:57
140.143.206.216 attackspam
Dec 26 03:57:26 firewall sshd[27320]: Invalid user vagrant from 140.143.206.216
Dec 26 03:57:28 firewall sshd[27320]: Failed password for invalid user vagrant from 140.143.206.216 port 33366 ssh2
Dec 26 04:01:38 firewall sshd[27394]: Invalid user gmodserver from 140.143.206.216
...
2019-12-26 15:21:05
113.220.230.211 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-26 15:01:12
150.95.153.82 attackbots
Dec 26 02:15:19 plusreed sshd[9581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.153.82  user=mysql
Dec 26 02:15:22 plusreed sshd[9581]: Failed password for mysql from 150.95.153.82 port 40084 ssh2
...
2019-12-26 15:30:33
116.239.33.22 attackbots
2019-12-26T06:21:25.645597abusebot-3.cloudsearch.cf sshd[10150]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.239.33.22  user=root
2019-12-26T06:21:27.373749abusebot-3.cloudsearch.cf sshd[10150]: Failed password for root from 116.239.33.22 port 43564 ssh2
2019-12-26T06:23:58.890961abusebot-3.cloudsearch.cf sshd[10209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.239.33.22  user=root
2019-12-26T06:24:00.623956abusebot-3.cloudsearch.cf sshd[10209]: Failed password for root from 116.239.33.22 port 34668 ssh2
2019-12-26T06:26:37.291700abusebot-3.cloudsearch.cf sshd[10216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.239.33.22  user=root
2019-12-26T06:26:39.521585abusebot-3.cloudsearch.cf sshd[10216]: Failed password for root from 116.239.33.22 port 54004 ssh2
2019-12-26T06:29:12.664082abusebot-3.cloudsearch.cf sshd[10261]: pam_unix(sshd:auth): authe
...
2019-12-26 15:28:38
223.215.174.234 attackspambots
Dec 26 01:22:19 esmtp postfix/smtpd[8499]: lost connection after AUTH from unknown[223.215.174.234]
Dec 26 01:22:31 esmtp postfix/smtpd[8510]: lost connection after AUTH from unknown[223.215.174.234]
Dec 26 01:22:50 esmtp postfix/smtpd[8510]: lost connection after AUTH from unknown[223.215.174.234]
Dec 26 01:23:01 esmtp postfix/smtpd[8510]: lost connection after AUTH from unknown[223.215.174.234]
Dec 26 01:28:53 esmtp postfix/smtpd[8527]: lost connection after AUTH from unknown[223.215.174.234]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=223.215.174.234
2019-12-26 15:41:03
45.82.153.85 attackspam
Dec 26 07:57:50 s1 postfix/submission/smtpd\[16229\]: warning: unknown\[45.82.153.85\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 07:58:10 s1 postfix/submission/smtpd\[16229\]: warning: unknown\[45.82.153.85\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 07:58:12 s1 postfix/submission/smtpd\[16237\]: warning: unknown\[45.82.153.85\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 07:58:35 s1 postfix/submission/smtpd\[16237\]: warning: unknown\[45.82.153.85\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 07:59:14 s1 postfix/submission/smtpd\[16235\]: warning: unknown\[45.82.153.85\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 07:59:33 s1 postfix/submission/smtpd\[16237\]: warning: unknown\[45.82.153.85\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 07:59:34 s1 postfix/submission/smtpd\[16235\]: warning: unknown\[45.82.153.85\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 07:59:53 s1 postfix/submission/smtpd\[16229\]: warning: unknown\[45.82.1
2019-12-26 15:01:52
201.253.195.243 attackbotsspam
firewall-block, port(s): 23/tcp
2019-12-26 15:37:25
46.38.144.57 attackbots
Dec 26 08:10:17 relay postfix/smtpd\[14718\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 08:10:35 relay postfix/smtpd\[27700\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 08:11:44 relay postfix/smtpd\[14723\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 08:12:03 relay postfix/smtpd\[27700\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 26 08:13:11 relay postfix/smtpd\[14718\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-26 15:26:15
154.90.9.37 attack
This IP Address sent many spam to @bit.co.id
mhamdanrifai@gmail.com is administrator
2019-12-26 15:19:36
51.68.124.181 attackbotsspam
Dec 26 07:26:26 legacy sshd[5023]: Failed password for root from 51.68.124.181 port 49414 ssh2
Dec 26 07:29:12 legacy sshd[5130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.124.181
Dec 26 07:29:14 legacy sshd[5130]: Failed password for invalid user media from 51.68.124.181 port 48484 ssh2
...
2019-12-26 15:29:03
45.55.225.152 attackbots
2019-12-26T06:44:19.262780shield sshd\[23951\]: Invalid user sirevicius from 45.55.225.152 port 53639
2019-12-26T06:44:19.267759shield sshd\[23951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.225.152
2019-12-26T06:44:21.291265shield sshd\[23951\]: Failed password for invalid user sirevicius from 45.55.225.152 port 53639 ssh2
2019-12-26T06:45:34.695833shield sshd\[24659\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.225.152  user=sshd
2019-12-26T06:45:36.683979shield sshd\[24659\]: Failed password for sshd from 45.55.225.152 port 58352 ssh2
2019-12-26 15:10:13
80.211.75.33 attack
Dec 26 02:18:05 plusreed sshd[10260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.75.33  user=root
Dec 26 02:18:07 plusreed sshd[10260]: Failed password for root from 80.211.75.33 port 40728 ssh2
...
2019-12-26 15:31:45
104.194.50.71 attack
Dec 26 05:49:31 kmh-mb-001 sshd[22323]: Did not receive identification string from 104.194.50.71 port 53966
Dec 26 07:22:13 kmh-mb-001 sshd[3235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.194.50.71  user=r.r
Dec 26 07:22:15 kmh-mb-001 sshd[3235]: Failed password for r.r from 104.194.50.71 port 33502 ssh2
Dec 26 07:22:15 kmh-mb-001 sshd[3235]: Connection closed by 104.194.50.71 port 33502 [preauth]
Dec 26 07:22:16 kmh-mb-001 sshd[3344]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.194.50.71  user=r.r
Dec 26 07:22:18 kmh-mb-001 sshd[3344]: Failed password for r.r from 104.194.50.71 port 33666 ssh2
Dec 26 07:22:18 kmh-mb-001 sshd[3344]: Connection closed by 104.194.50.71 port 33666 [preauth]
Dec 26 07:22:19 kmh-mb-001 sshd[3346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.194.50.71  user=r.r


........
-----------------------------------------------
https://www.blockl
2019-12-26 15:21:34
49.88.112.117 attackbots
Dec 26 07:26:47 * sshd[13100]: Failed password for root from 49.88.112.117 port 53649 ssh2
2019-12-26 15:22:50

Recently Reported IPs

178.184.64.180 159.233.113.58 185.86.210.78 196.193.0.16
18.122.147.130 104.88.112.82 245.146.140.238 236.244.232.232
123.20.127.34 149.166.62.44 124.20.133.119 153.39.165.232
188.214.39.61 107.221.159.123 119.65.16.221 239.102.192.185
147.243.232.252 90.181.161.1 171.239.212.106 76.95.131.242