Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Puerto Rico

Internet Service Provider: San Juan Cable LLC

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Unauthorised access (Nov 16) SRC=70.45.104.86 LEN=52 TTL=108 ID=12969 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-16 22:50:02
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 70.45.104.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22512
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;70.45.104.86.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052701 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue May 28 07:55:18 CST 2019
;; MSG SIZE  rcvd: 116

Host info
Host 86.104.45.70.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 86.104.45.70.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
68.183.129.215 attackbots
Lines containing failures of 68.183.129.215
Aug  4 20:36:09 shared02 sshd[20982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.129.215  user=r.r
Aug  4 20:36:11 shared02 sshd[20982]: Failed password for r.r from 68.183.129.215 port 49724 ssh2
Aug  4 20:36:11 shared02 sshd[20982]: Received disconnect from 68.183.129.215 port 49724:11: Bye Bye [preauth]
Aug  4 20:36:11 shared02 sshd[20982]: Disconnected from authenticating user r.r 68.183.129.215 port 49724 [preauth]
Aug  4 20:46:15 shared02 sshd[24459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.129.215  user=r.r
Aug  4 20:46:17 shared02 sshd[24459]: Failed password for r.r from 68.183.129.215 port 55126 ssh2
Aug  4 20:46:17 shared02 sshd[24459]: Received disconnect from 68.183.129.215 port 55126:11: Bye Bye [preauth]
Aug  4 20:46:17 shared02 sshd[24459]: Disconnected from authenticating user r.r 68.183.129.215 port 55126........
------------------------------
2020-08-09 19:23:56
192.35.169.36 attackbotsspam
 TCP (SYN) 192.35.169.36:44082 -> port 139, len 44
2020-08-09 19:18:55
190.96.74.153 attack
Attempted connection to port 445.
2020-08-09 19:41:35
111.72.196.243 attack
Aug  9 06:06:31 srv01 postfix/smtpd\[7676\]: warning: unknown\[111.72.196.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 06:06:43 srv01 postfix/smtpd\[7676\]: warning: unknown\[111.72.196.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 06:07:00 srv01 postfix/smtpd\[7676\]: warning: unknown\[111.72.196.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 06:07:18 srv01 postfix/smtpd\[7676\]: warning: unknown\[111.72.196.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 06:07:30 srv01 postfix/smtpd\[7676\]: warning: unknown\[111.72.196.243\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-09 19:29:31
180.253.125.195 attack
Attempted connection to port 445.
2020-08-09 19:43:55
180.117.114.158 attackspam
 TCP (SYN) 180.117.114.158:38657 -> port 22, len 60
2020-08-09 19:50:41
122.51.161.231 attackspambots
Aug  5 11:47:16 srv05 sshd[27742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.161.231  user=r.r
Aug  5 11:47:18 srv05 sshd[27742]: Failed password for r.r from 122.51.161.231 port 43050 ssh2
Aug  5 11:47:18 srv05 sshd[27742]: Received disconnect from 122.51.161.231: 11: Bye Bye [preauth]
Aug  5 12:03:08 srv05 sshd[28910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.161.231  user=r.r
Aug  5 12:03:10 srv05 sshd[28910]: Failed password for r.r from 122.51.161.231 port 47516 ssh2
Aug  5 12:03:11 srv05 sshd[28910]: Received disconnect from 122.51.161.231: 11: Bye Bye [preauth]
Aug  5 12:08:17 srv05 sshd[29169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.161.231  user=r.r
Aug  5 12:08:18 srv05 sshd[29169]: Failed password for r.r from 122.51.161.231 port 42634 ssh2
Aug  5 12:08:18 srv05 sshd[29169]: Received disconnect from........
-------------------------------
2020-08-09 19:37:19
123.126.77.34 attackbots
 TCP (SYN) 123.126.77.34:31817 -> port 221, len 44
2020-08-09 19:35:00
138.197.217.164 attackspambots
Aug  9 05:28:53 ns382633 sshd\[10394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164  user=root
Aug  9 05:28:55 ns382633 sshd\[10394\]: Failed password for root from 138.197.217.164 port 60172 ssh2
Aug  9 05:42:38 ns382633 sshd\[13246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164  user=root
Aug  9 05:42:40 ns382633 sshd\[13246\]: Failed password for root from 138.197.217.164 port 45484 ssh2
Aug  9 05:46:31 ns382633 sshd\[14067\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.217.164  user=root
2020-08-09 19:26:49
167.99.131.243 attack
Brute-force attempt banned
2020-08-09 19:15:30
111.72.193.32 attackbots
Aug  9 05:45:12 srv01 postfix/smtpd\[536\]: warning: unknown\[111.72.193.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 05:45:24 srv01 postfix/smtpd\[536\]: warning: unknown\[111.72.193.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 05:45:40 srv01 postfix/smtpd\[536\]: warning: unknown\[111.72.193.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 05:45:59 srv01 postfix/smtpd\[536\]: warning: unknown\[111.72.193.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  9 05:46:12 srv01 postfix/smtpd\[536\]: warning: unknown\[111.72.193.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-09 19:37:40
94.102.51.29 attackbotsspam
Aug  9 13:53:30 venus kernel: [161514.858958] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:66:8f:ed:d2:74:7f:6e:37:e3:08:00 SRC=94.102.51.29 DST=78.47.70.226 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=25435 PROTO=TCP SPT=40011 DPT=19099 WINDOW=1024 RES=0x00 SYN URGP=0
2020-08-09 19:31:15
27.147.209.215 attackspambots
Attempted connection to port 80.
2020-08-09 19:40:17
213.33.157.204 attack
Dovecot Invalid User Login Attempt.
2020-08-09 19:49:56
47.91.123.166 attack
Aug  9 12:52:56 server sshd[16381]: Failed password for root from 47.91.123.166 port 60188 ssh2
Aug  9 12:58:46 server sshd[23556]: Failed password for root from 47.91.123.166 port 43708 ssh2
Aug  9 13:04:36 server sshd[31278]: Failed password for root from 47.91.123.166 port 55466 ssh2
2020-08-09 19:35:39

Recently Reported IPs

157.230.38.113 78.188.110.70 85.209.0.141 13.92.254.50
157.230.119.235 103.218.229.2 196.163.153.174 50.117.47.253
167.86.107.125 62.234.72.154 103.27.119.58 94.230.141.253
59.125.120.118 121.58.244.228 185.2.4.145 188.78.24.147
106.215.27.203 27.179.240.157 106.75.17.91 127.68.84.22