Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Colorado Springs

Region: Colorado

Country: United States

Internet Service Provider: Law Office of Stephen H Swift

Hostname: unknown

Organization: unknown

Usage Type: Commercial

Comments:
Type Details Datetime
attack
2019-11-23T05:46:20.386984ns386461 sshd\[31829\]: Invalid user brinkmann from 65.153.45.34 port 38422
2019-11-23T05:46:20.393314ns386461 sshd\[31829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.153.45.34
2019-11-23T05:46:22.490557ns386461 sshd\[31829\]: Failed password for invalid user brinkmann from 65.153.45.34 port 38422 ssh2
2019-11-23T07:28:25.257827ns386461 sshd\[24732\]: Invalid user jazayeri from 65.153.45.34 port 38352
2019-11-23T07:28:25.262567ns386461 sshd\[24732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.153.45.34
...
2019-11-23 16:06:33
attack
Nov 14 13:29:40 auw2 sshd\[30859\]: Invalid user ftpuser from 65.153.45.34
Nov 14 13:29:40 auw2 sshd\[30859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.153.45.34
Nov 14 13:29:42 auw2 sshd\[30859\]: Failed password for invalid user ftpuser from 65.153.45.34 port 58530 ssh2
Nov 14 13:33:30 auw2 sshd\[31150\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.153.45.34  user=root
Nov 14 13:33:32 auw2 sshd\[31150\]: Failed password for root from 65.153.45.34 port 39294 ssh2
2019-11-15 07:47:57
attackspambots
Automatic report - SSH Brute-Force Attack
2019-11-15 03:38:44
attackbotsspam
2019-11-08T23:39:04.475009abusebot-8.cloudsearch.cf sshd\[9732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.153.45.34  user=root
2019-11-09 08:08:30
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.153.45.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;65.153.45.34.			IN	A

;; AUTHORITY SECTION:
.			587	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110801 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 09 08:08:27 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 34.45.153.65.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 34.45.153.65.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.174.193 attackbots
Autoban   89.248.174.193 AUTH/CONNECT
2019-08-05 13:53:06
89.237.192.167 attackbotsspam
Autoban   89.237.192.167 AUTH/CONNECT
2019-08-05 13:55:30
138.122.4.217 attackspam
proto=tcp  .  spt=55605  .  dpt=25  .     (listed on Blocklist de  Aug 04)     (704)
2019-08-05 14:06:02
37.187.0.20 attack
Aug  5 08:32:20 vps647732 sshd[16686]: Failed password for root from 37.187.0.20 port 50430 ssh2
...
2019-08-05 14:37:41
89.64.10.55 attackspambots
Autoban   89.64.10.55 AUTH/CONNECT
2019-08-05 13:49:44
103.212.128.152 attackspam
proto=tcp  .  spt=35305  .  dpt=25  .     (listed on Blocklist de  Aug 04)     (700)
2019-08-05 14:26:34
88.87.233.246 attackspambots
Autoban   88.87.233.246 AUTH/CONNECT
2019-08-05 14:31:54
88.86.212.11 attackbots
Autoban   88.86.212.11 AUTH/CONNECT
2019-08-05 14:33:43
134.209.114.225 attackbots
port 23 attempt blocked
2019-08-05 14:41:40
177.182.245.204 attack
email spam
2019-08-05 13:53:36
89.217.110.31 attackbots
Autoban   89.217.110.31 AUTH/CONNECT
2019-08-05 13:58:59
121.160.21.6 attackbots
Aug  5 00:47:19 sshgateway sshd\[20050\]: Invalid user HDP from 121.160.21.6
Aug  5 00:47:19 sshgateway sshd\[20050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.160.21.6
Aug  5 00:47:21 sshgateway sshd\[20050\]: Failed password for invalid user HDP from 121.160.21.6 port 56712 ssh2
2019-08-05 14:16:59
88.4.213.14 attack
Autoban   88.4.213.14 AUTH/CONNECT
2019-08-05 14:34:00
88.255.160.162 attackbotsspam
Autoban   88.255.160.162 AUTH/CONNECT
2019-08-05 14:34:52
159.203.177.53 attack
ssh failed login
2019-08-05 14:24:11

Recently Reported IPs

45.182.165.27 114.255.59.100 189.46.143.136 182.48.114.11
2604:a880:400:d0::4b69:3001 5.2.142.130 5.54.133.160 186.225.61.178
95.178.241.222 47.201.56.13 46.191.137.89 49.68.147.63
159.255.164.194 207.246.119.98 100.15.40.165 175.5.114.211
136.169.214.255 63.80.88.204 164.68.104.74 153.228.109.99