NOTE: Due to excessive queries, page processing has been limited to 10 per minute. Please contact us for bulk data access or try out our API. Do not use this data as a blocklist.
To lookup several IP addresses at the same time, or to just copy/paste a section of a log, use our "Color My Logs" feature.
General Information
Submitter Diversity: | Very High |
Risk (0-10)details: | 6 |
IP Address (click for more detail): | 45.148.10.242 |
Hostname: | 45.148.10.242 |
Country: | RO |
AS: | 48090 |
AS Name: | DMZHOST, GB |
Network: | 45.148.10.0/24 (45.148.10.0-45.148.10.255) 45.148.11.0 |
Reports: | 13235 |
Targets: | 530 |
First Reported: | 2024-09-05 |
Most Recent Report: | 2024-10-06 |
Comment: | - none - |
Abuse POC Email: | abuse@vegatele.com |
Note: We update the data once an hour. To refresh the data, click here. Not all source IPs in our database are "attackers". There are a few common false positives. For example, hosts that participate in P2P networks, mail servers, load balancers and DNS servers are some of the most common issues. For details, click on the number of reports. Clicking on the number of reports may allow you to conclude if a report is a false positive or not. Scroll down for information from other data feeds.
SSH/Telnet Logs
no ssh logs.Web Honeypot Logs
Date | Reports | Different URLs | Different User Agents |
---|---|---|---|
2024-10-07 | 133 | 1 | 3 |
2024-10-06 | 20 | 1 | 1 |
2024-10-05 | 2 | 1 | 1 |
2024-10-02 | 1741 | 7 | 5 |
2024-10-01 | 6229 | 7 | 4 |
2024-09-30 | 2735 | 7 | 4 |
2024-09-29 | 2813 | 6 | 4 |
2024-09-28 | 3049 | 7 | 4 |
2024-09-27 | 5380 | 7 | 4 |
2024-09-26 | 6506 | 6 | 4 |
2024-09-25 | 5691 | 6 | 4 |
2024-09-24 | 6421 | 6 | 4 |
2024-09-23 | 6382 | 6 | 4 |
2024-09-22 | 5570 | 6 | 4 |
For more details about the web honeypot, see the Weblogs Page. Do not use these reports to identify IP addresses as "bad" for now.
External Threat Feeds
This data was retrieved from various external threat feeds
First Seen | Last Seen | Feed |
---|---|---|
2022-03-07 | 2024-10-06 | Port 110 Scanner |
2022-03-07 | 2024-10-06 | Port 143 Scanner |
2024-09-08 | 2024-10-06 | Port 22 Scanner |
2022-03-07 | 2024-10-06 | Port 25 Scanner |
2024-09-05 | 2024-10-07 | Port 443 Scanner |
2024-09-06 | 2024-10-07 | Port 80 Scanner |
2022-03-07 | 2024-10-06 | Port 993 Scanner |
2024-09-05 | 2024-10-07 | Apache Web Server Scanner |
2024-09-05 | 2024-10-06 | Bruteforce |
2022-03-07 | 2024-10-06 | courier imap attacker |
2024-09-05 | 2024-10-07 | CI Army List |
2024-09-11 | 2024-10-07 | Emergingthreats |
Whois Info
Sorry, but RIPE blocks our requests. Please check directly at whois.ripe.net NetRange: 45.138.168.0 - 45.150.57.255 CIDR: 45.148.0.0/15, 45.138.168.0/21, 45.138.192.0/18, 45.139.0.0/16, 45.150.0.0/19, 45.138.176.0/20, 45.140.0.0/14, 45.150.32.0/20, 45.144.0.0/14, 45.150.48.0/21, 45.150.56.0/23 NetName: RIPE NetHandle: NET-45-138-168-0-1 Parent: NET45 (NET-45-0-0-0-0) NetType: Early Registrations, Transferred to RIPE NCC OriginAS: Organization: RIPE Network Coordination Centre (RIPE) RegDate: 2014-05-22 Updated: 2021-12-13 Ref: https://rdap.arin.net/registry/ip/45.138.168.0 ResourceLink: https://apps.db.ripe.net/search/query.html ResourceLink: whois.ripe.net OrgName: RIPE Network Coordination Centre OrgId: RIPE Address: P.O. Box 10096 City: Amsterdam StateProv: PostalCode: 1001EB Country: NL RegDate: Updated: 2013-07-29 Ref: https://rdap.arin.net/registry/entity/RIPE ReferralServer: whois://whois.ripe.net ResourceLink: https://apps.db.ripe.net/search/query.html OrgTechHandle: RNO29-ARIN OrgTechName: RIPE NCC Operations OrgTechPhone: +31 20 535 4444 OrgTechEmail: hostmaster@ripe.net OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN OrgAbuseHandle: ABUSE3850-ARIN OrgAbuseName: Abuse Contact OrgAbusePhone: +31205354444 OrgAbuseEmail: abuse@ripe.net OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN