Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: Infolink LLC

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
01/05/2020-17:36:34.294881 81.22.45.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-06 07:11:35
attackspambots
01/04/2020-11:57:58.245932 81.22.45.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-05 01:08:09
attackbots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-22 15:44:49
attackspambots
2019-11-06T20:12:10.510184+01:00 lumpi kernel: [2889914.279815] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.18 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=13053 PROTO=TCP SPT=46618 DPT=13389 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-07 04:11:04
attackspam
Sep 25 17:38:41 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.18 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=23222 PROTO=TCP SPT=46403 DPT=13389 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-09-26 00:08:00
Comments on same subnet:
IP Type Details Datetime
81.22.45.71 attackspam
suspicious action Sat, 29 Feb 2020 11:28:01 -0300
2020-02-29 22:46:31
81.22.45.133 attack
2020-02-19T00:19:18.463055+01:00 lumpi kernel: [7357790.238387] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.133 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=60679 PROTO=TCP SPT=50449 DPT=7000 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-19 07:37:59
81.22.45.133 attack
2020-02-18T20:40:14.685548+01:00 lumpi kernel: [7344646.660249] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.133 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=12495 PROTO=TCP SPT=50449 DPT=7777 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-19 03:45:04
81.22.45.106 attackspam
02/17/2020-20:00:28.393431 81.22.45.106 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 83
2020-02-18 09:54:53
81.22.45.100 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 5322 proto: TCP cat: Misc Attack
2020-02-18 01:32:12
81.22.45.106 attackspam
Fail2Ban Ban Triggered
2020-02-17 05:29:15
81.22.45.100 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-11 01:03:51
81.22.45.182 attack
Feb  8 10:02:23 mail kernel: [562000.917378] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=56258 PROTO=TCP SPT=42357 DPT=16115 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-08 17:07:08
81.22.45.71 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 77 - port: 3389 proto: TCP cat: Misc Attack
2020-02-08 08:03:25
81.22.45.80 attack
3388/tcp 3377/tcp 3385/tcp...
[2019-12-09/2020-02-07]121pkt,33pt.(tcp)
2020-02-08 08:02:22
81.22.45.83 attack
Unauthorized connection attempt from IP address 81.22.45.83 on Port 3389(RDP)
2020-02-07 22:43:48
81.22.45.182 attackspam
Feb  6 17:32:05 mail kernel: [416183.709828] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=30608 PROTO=TCP SPT=50336 DPT=10904 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-07 00:32:25
81.22.45.182 attackspambots
Feb  6 08:44:36 mail kernel: [384534.949997] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=55760 PROTO=TCP SPT=50336 DPT=10994 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-06 15:48:06
81.22.45.104 attackbotsspam
Unauthorised access (Feb  6) SRC=81.22.45.104 LEN=40 TTL=249 ID=41689 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Feb  4) SRC=81.22.45.104 LEN=40 TTL=249 ID=63055 TCP DPT=3389 WINDOW=1024 SYN 
Unauthorised access (Feb  2) SRC=81.22.45.104 LEN=40 TTL=248 ID=40974 TCP DPT=3389 WINDOW=1024 SYN
2020-02-06 08:35:53
81.22.45.182 attackspambots
Feb  6 01:19:32 mail kernel: [357831.266667] [UFW BLOCK] IN=eth0 OUT= MAC=00:16:3c:05:0d:89:f8:66:f2:68:66:ff:08:00 SRC=81.22.45.182 DST=77.73.69.240 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=40878 PROTO=TCP SPT=50336 DPT=10137 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-02-06 08:29:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.22.45.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61408
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;81.22.45.18.			IN	A

;; AUTHORITY SECTION:
.			2860	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090201 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 03 06:33:53 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 18.45.22.81.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 18.45.22.81.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.143.44.122 attackbotsspam
SSH Authentication Attempts Exceeded
2020-03-18 12:25:18
222.186.42.75 attack
Mar 18 04:56:40 eventyay sshd[11350]: Failed password for root from 222.186.42.75 port 24595 ssh2
Mar 18 04:59:59 eventyay sshd[11449]: Failed password for root from 222.186.42.75 port 55074 ssh2
Mar 18 05:00:01 eventyay sshd[11449]: Failed password for root from 222.186.42.75 port 55074 ssh2
...
2020-03-18 12:03:48
103.240.204.35 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 03:55:09.
2020-03-18 12:23:10
45.151.254.218 attackbots
03/18/2020-00:03:38.120236 45.151.254.218 Protocol: 17 ET SCAN Sipvicious Scan
2020-03-18 12:09:48
208.71.172.46 attackspam
Mar 17 23:55:19 plusreed sshd[32348]: Invalid user zjcl from 208.71.172.46
...
2020-03-18 12:12:01
106.12.27.213 attackbotsspam
Mar 18 05:06:33 legacy sshd[31609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.213
Mar 18 05:06:35 legacy sshd[31609]: Failed password for invalid user adm from 106.12.27.213 port 52746 ssh2
Mar 18 05:10:18 legacy sshd[31732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.213
...
2020-03-18 12:28:15
218.92.0.195 attack
03/18/2020-00:14:20.700313 218.92.0.195 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-18 12:45:41
51.68.188.186 attackspambots
xmlrpc attack
2020-03-18 12:33:41
168.228.192.154 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 03:55:10.
2020-03-18 12:19:32
34.240.104.50 attackspam
amazon=crap
2020-03-18 12:12:48
62.33.103.24 attackbots
Mar 18 04:54:29 mail.srvfarm.net postfix/smtpd[1298074]: NOQUEUE: reject: RCPT from unknown[62.33.103.24]: 554 5.7.1 Service unavailable; Client host [62.33.103.24] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?62.33.103.24; from= to= proto=ESMTP helo=
Mar 18 04:54:30 mail.srvfarm.net postfix/smtpd[1298074]: NOQUEUE: reject: RCPT from unknown[62.33.103.24]: 554 5.7.1 Service unavailable; Client host [62.33.103.24] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?62.33.103.24; from= to= proto=ESMTP helo=
Mar 18 04:54:31 mail.srvfarm.net postfix/smtpd[1298074]: NOQUEUE: reject: RCPT from unknown[62.33.103.24]: 554 5.7.1 Service unavailable; Client host [62.33.103.24] blocked using bl.spamcop.net; Blocked - see https://www.spamcop.net/bl.shtml?62.33.103.24; from= to= proto=ESMTP helo=
Mar 18 04:54:
2020-03-18 12:44:36
222.186.180.147 attackspam
Mar 18 03:36:41 v22018086721571380 sshd[13292]: Failed password for root from 222.186.180.147 port 16268 ssh2
Mar 18 03:36:42 v22018086721571380 sshd[13292]: Failed password for root from 222.186.180.147 port 16268 ssh2
Mar 18 03:36:42 v22018086721571380 sshd[13292]: error: maximum authentication attempts exceeded for root from 222.186.180.147 port 16268 ssh2 [preauth]
2020-03-18 10:53:31
103.91.181.25 attackbotsspam
2020-03-18T03:47:23.996029abusebot-3.cloudsearch.cf sshd[3373]: Invalid user bob from 103.91.181.25 port 50382
2020-03-18T03:47:24.002471abusebot-3.cloudsearch.cf sshd[3373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.91.181.25
2020-03-18T03:47:23.996029abusebot-3.cloudsearch.cf sshd[3373]: Invalid user bob from 103.91.181.25 port 50382
2020-03-18T03:47:25.966320abusebot-3.cloudsearch.cf sshd[3373]: Failed password for invalid user bob from 103.91.181.25 port 50382 ssh2
2020-03-18T03:54:10.163817abusebot-3.cloudsearch.cf sshd[3862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.91.181.25  user=root
2020-03-18T03:54:12.197952abusebot-3.cloudsearch.cf sshd[3862]: Failed password for root from 103.91.181.25 port 54344 ssh2
2020-03-18T03:55:25.452709abusebot-3.cloudsearch.cf sshd[3933]: Invalid user rootme from 103.91.181.25 port 42962
...
2020-03-18 12:07:45
178.171.46.80 attack
Chat Spam
2020-03-18 12:38:42
222.186.30.209 attackbots
SSH bruteforce
2020-03-18 12:11:34

Recently Reported IPs

109.209.237.180 10.204.85.135 169.201.226.184 51.68.93.65
35.205.38.10 59.120.75.168 41.145.138.88 177.72.142.65
94.237.72.235 178.17.131.228 49.230.56.229 112.197.2.11
200.57.224.43 186.26.83.49 79.119.207.111 120.84.121.253
193.112.219.176 32.194.164.241 153.226.237.200 190.58.198.46