Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Infolink LLC

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
81.22.45.152 was recorded 51 times by 19 hosts attempting to connect to the following ports: 3376,3399,3396,3395,3370,3375,4089,5589,5989,489,3089,4189,3384,5389,4489,12000,5089,4989,3403,589,5489,2489,4589,3390,3689,3789,5689,2189,4389,1689,1889,3989,3889,5789,3090,13000,4289,3398,5000,3377,3388,3392. Incident counter (4h, 24h, all-time): 51, 364, 1192
2019-11-12 07:07:51
attackbots
ET DROP Dshield Block Listed Source group 1 - port: 5689 proto: TCP cat: Misc Attack
2019-11-12 05:02:59
attackbotsspam
81.22.45.152 was recorded 58 times by 19 hosts attempting to connect to the following ports: 2089,3397,3989,1389,3289,3410,4689,1989,3333,3090,4000,3399,4389,3373,1000,3405,1189,1589,3589,6389,989,3381,13000,5689,3386,3391,2189,5289,1089,3384,2989,3388,3372,3408,4489,3392,2589,389,3398,6489,489,3382,3403,3390,3401,3406,3385. Incident counter (4h, 24h, all-time): 58, 374, 952
2019-11-11 17:00:00
attackspambots
81.22.45.152 was recorded 50 times by 18 hosts attempting to connect to the following ports: 2289,3402,2789,1189,4489,3373,3392,3388,4989,789,2689,3378,3789,4589,1289,1689,3387,689,1489,1389,3401,3382,3385,5989,3384,889,2089,2989,3400,1589,489,389,4389,1000,4689,3089,3386,2489,4189. Incident counter (4h, 24h, all-time): 50, 347, 750
2019-11-11 03:05:48
attackspambots
Automatic report - Port Scan
2019-10-09 01:22:08
attackbots
firewall-block, port(s): 789/tcp, 1337/tcp, 2089/tcp, 2889/tcp, 3321/tcp, 10793/tcp, 14000/tcp, 18875/tcp, 23813/tcp, 45000/tcp
2019-10-07 06:19:48
Comments on same subnet:
IP Type Details Datetime
81.22.45.71 attackspam
suspicious action Sat, 29 Feb 2020 11:28:01 -0300
2020-02-29 22:46:31
81.22.45.133 attack
2020-02-19T00:19:18.463055+01:00 lumpi kernel: [7357790.238387] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.133 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=60679 PROTO=TCP SPT=50449 DPT=7000 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-19 07:37:59
81.22.45.133 attack
2020-02-18T20:40:14.685548+01:00 lumpi kernel: [7344646.660249] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.133 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=12495 PROTO=TCP SPT=50449 DPT=7777 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-19 03:45:04
81.22.45.106 attackspam
02/17/2020-20:00:28.393431 81.22.45.106 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 83
2020-02-18 09:54:53
81.22.45.100 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 5322 proto: TCP cat: Misc Attack
2020-02-18 01:32:12
81.22.45.106 attackspam
Fail2Ban Ban Triggered
2020-02-17 05:29:15
81.22.45.100 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 01:03:51
81.22.45.182 attack
Feb  8 10:02:23 mail kernel: [562000.917378] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=56258 PROTO=TCP SPT=42357 DPT=16115 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-08 17:07:08
81.22.45.71 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 3389 proto: TCP cat: Misc Attack
2020-02-08 08:03:25
81.22.45.80 attack
3388/tcp 3377/tcp 3385/tcp...
[2019-12-09/2020-02-07]121pkt,33pt.(tcp)
2020-02-08 08:02:22
81.22.45.83 attack
Unauthorized connection attempt from IP address 81.22.45.83 on Port 3389(RDP)
2020-02-07 22:43:48
81.22.45.182 attackspam
Feb  6 17:32:05 mail kernel: [416183.709828] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=30608 PROTO=TCP SPT=50336 DPT=10904 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-07 00:32:25
81.22.45.182 attackspambots
Feb  6 08:44:36 mail kernel: [384534.949997] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=55760 PROTO=TCP SPT=50336 DPT=10994 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-06 15:48:06
81.22.45.104 attackbotsspam
Unauthorised access (Feb  6) SRC=81.22.45.104 LEN=40 TTL=249 ID=41689 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Feb  4) SRC=81.22.45.104 LEN=40 TTL=249 ID=63055 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Feb  2) SRC=81.22.45.104 LEN=40 TTL=248 ID=40974 TCP DPT=3389 WINDOW=1024 SYN
2020-02-06 08:35:53
81.22.45.182 attackspambots
Feb  6 01:19:32 mail kernel: [357831.266667] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=40878 PROTO=TCP SPT=50336 DPT=10137 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-06 08:29:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.22.45.152
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38628
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.22.45.152.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100601 1800 900 604800 86400

;; Query time: 307 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 07 06:19:44 CST 2019
;; MSG SIZE  rcvd: 116
Host info
Host 152.45.22.81.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 152.45.22.81.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.104.61.246 attackspambots
badbot
2019-11-23 23:42:20
85.143.216.212 attackspam
Nov 23 15:28:15 web8 sshd\[32709\]: Invalid user dq from 85.143.216.212
Nov 23 15:28:15 web8 sshd\[32709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.143.216.212
Nov 23 15:28:17 web8 sshd\[32709\]: Failed password for invalid user dq from 85.143.216.212 port 35292 ssh2
Nov 23 15:32:01 web8 sshd\[2429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.143.216.212  user=root
Nov 23 15:32:04 web8 sshd\[2429\]: Failed password for root from 85.143.216.212 port 42966 ssh2
2019-11-23 23:33:07
128.199.58.60 attackbots
128.199.58.60 - - \[23/Nov/2019:15:26:19 +0100\] "POST /wp-login.php HTTP/1.0" 200 4404 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
128.199.58.60 - - \[23/Nov/2019:15:26:25 +0100\] "POST /wp-login.php HTTP/1.0" 200 4236 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
128.199.58.60 - - \[23/Nov/2019:15:26:31 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-11-24 00:02:35
213.251.41.52 attackbots
Nov 23 10:17:04 TORMINT sshd\[31370\]: Invalid user bezard from 213.251.41.52
Nov 23 10:17:04 TORMINT sshd\[31370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.251.41.52
Nov 23 10:17:06 TORMINT sshd\[31370\]: Failed password for invalid user bezard from 213.251.41.52 port 51060 ssh2
...
2019-11-23 23:20:22
222.186.175.212 attackspambots
Nov 23 10:23:29 mail sshd\[21859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.212  user=root
...
2019-11-23 23:28:20
112.64.170.178 attackbots
Nov 23 16:27:53 DAAP sshd[5749]: Invalid user corbet from 112.64.170.178 port 23410
Nov 23 16:27:53 DAAP sshd[5749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.64.170.178
Nov 23 16:27:53 DAAP sshd[5749]: Invalid user corbet from 112.64.170.178 port 23410
Nov 23 16:27:55 DAAP sshd[5749]: Failed password for invalid user corbet from 112.64.170.178 port 23410 ssh2
...
2019-11-23 23:39:15
46.229.168.162 attackbots
Joomla User : try to access forms...
2019-11-23 23:17:54
91.142.222.245 attackbots
SSH bruteforce
2019-11-23 23:45:35
51.83.33.156 attackbotsspam
Nov 23 05:52:20 web1 sshd\[22105\]: Invalid user dan from 51.83.33.156
Nov 23 05:52:20 web1 sshd\[22105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.33.156
Nov 23 05:52:22 web1 sshd\[22105\]: Failed password for invalid user dan from 51.83.33.156 port 52430 ssh2
Nov 23 05:56:02 web1 sshd\[22436\]: Invalid user chivalry from 51.83.33.156
Nov 23 05:56:02 web1 sshd\[22436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.33.156
2019-11-23 23:59:48
106.13.117.241 attackbotsspam
Nov 23 20:34:02 gw1 sshd[17922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.117.241
Nov 23 20:34:04 gw1 sshd[17922]: Failed password for invalid user iiiiiiii from 106.13.117.241 port 37311 ssh2
...
2019-11-23 23:57:38
223.215.11.22 attackspambots
badbot
2019-11-23 23:16:58
3.82.193.28 attack
Automatic report - XMLRPC Attack
2019-11-23 23:32:19
222.186.175.202 attackspambots
2019-11-23T15:38:47.717659shield sshd\[27306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.202  user=root
2019-11-23T15:38:49.349248shield sshd\[27306\]: Failed password for root from 222.186.175.202 port 51714 ssh2
2019-11-23T15:38:52.630473shield sshd\[27306\]: Failed password for root from 222.186.175.202 port 51714 ssh2
2019-11-23T15:38:55.991560shield sshd\[27306\]: Failed password for root from 222.186.175.202 port 51714 ssh2
2019-11-23T15:38:58.901076shield sshd\[27306\]: Failed password for root from 222.186.175.202 port 51714 ssh2
2019-11-23 23:45:13
156.227.67.12 attack
2019-11-23T16:49:41.041811scmdmz1 sshd\[12474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.227.67.12  user=root
2019-11-23T16:49:43.456156scmdmz1 sshd\[12474\]: Failed password for root from 156.227.67.12 port 37934 ssh2
2019-11-23T16:54:00.838457scmdmz1 sshd\[12794\]: Invalid user oernulf from 156.227.67.12 port 45422
...
2019-11-24 00:00:50
35.196.239.92 attackbotsspam
Nov 23 17:58:22 www sshd\[11521\]: Invalid user dell from 35.196.239.92
Nov 23 17:58:22 www sshd\[11521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.196.239.92
Nov 23 17:58:24 www sshd\[11521\]: Failed password for invalid user dell from 35.196.239.92 port 43650 ssh2
...
2019-11-23 23:59:29

Recently Reported IPs

181.97.13.120 1.10.176.24 139.155.117.15 103.1.239.112
241.69.73.60 82.6.175.238 197.26.107.94 174.251.161.108
246.86.43.32 105.10.143.124 129.147.30.2 44.4.58.222
85.216.114.239 226.212.147.65 113.92.245.176 74.242.49.48
221.143.209.96 166.245.120.48 149.132.36.116 171.105.13.156