Go
81.22.45.148
is a
Hacker
100 %
Report Abuse
975attacks reported
617Port Scan
159Brute-Force
77Hacking
50Port ScanHackingExploited Host
39Port ScanHacking
18HackingBad Web BotWeb App Attack
5uncategorized
4Port ScanBrute-ForceSSH
1Port ScanSSH
1HackingExploited Host
...
30abuse reported
29Web SpamPort ScanBrute-ForceSSHIoT Targeted
1Email SpamBrute-Force
5reputation reported
5uncategorized
1malware reported
1Exploited Host
from 39 distinct reporters
and 5 distinct sources : NormShield.com, GreenSnow.co, Blocklist.de, DShield.org, AbuseIPDB
81.22.45.148 was first signaled at 2019-02-28 03:07 and last record was at 2019-07-29 12:39.
IP

81.22.45.148

NetRange : First & Last IP
81.22.45.0 - 81.22.45.255
Network CIDR
81.22.45.0/24

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-07-29 12:39 attacks Port Scan AbuseIPDB 29.07.2019 21:39:50 Connection to port 3443 blocked by firewall
2019-07-26 17:10 attacks Port Scan AbuseIPDB firewall-block, port(s): 3022/tcp, 3071/tcp, 3087/tcp, 3108/tcp, 3137/tcp, 3186/tcp, 3289/tcp, 3332/tcp, 3380/tcp, 3384/tcp
2019-07-26 17:07 attacks Port Scan AbuseIPDB Port scan on 23 port(s): 3029 3041 3065 3069 3073 3078 3081 3082 3090 3092 3095 3100 3107 3165 3174 3209 3259 3270 3328 3337 3352 3364 3378
2019-07-26 16:59 attacks Brute-Force AbuseIPDB Jul 27 03:59:17 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 16:42 attacks Port Scan AbuseIPDB 27.07.2019 01:40:45 Connection to port 3224 blocked by firewall
2019-07-26 16:27 attacks Brute-Force AbuseIPDB Jul 27 03:27:36 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 16:23 attacks Port Scan AbuseIPDB 27.07.2019 01:23:15 Connection to port 3358 blocked by firewall
2019-07-26 15:34 attacks Port Scan AbuseIPDB 27.07.2019 00:34:20 Connection to port 3072 blocked by firewall
2019-07-26 15:32 attacks Brute-Force AbuseIPDB Jul 27 02:32:26 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 15:14 attacks Brute-Force AbuseIPDB Jul 27 02:14:39 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 15:02 attacks Port Scan AbuseIPDB Unauthorized connection attempt from IP address 81.22.45.148 on Port 3306(MYSQL)
2019-07-26 14:57 attacks Brute-Force AbuseIPDB Jul 27 01:57:49 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 14:53 attacks Port Scan AbuseIPDB 26.07.2019 23:53:10 Connection to port 3191 blocked by firewall
2019-07-26 14:51 attacks Hacking AbuseIPDB Jul 27 01:13:23 h2177944 kernel: \[2506829.031177\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.148 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=
2019-07-26 14:46 attacks Port Scan AbuseIPDB Excessive Port-Scanning
2019-07-26 14:38 attacks Port Scan AbuseIPDB Port scan on 18 port(s): 3005 3051 3055 3067 3078 3084 3090 3103 3112 3118 3210 3230 3266 3299 3307 3313 3324 3328
2019-07-26 14:28 attacks Brute-Force AbuseIPDB Jul 27 01:28:20 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 14:21 attacks Port Scan AbuseIPDB Port scan on 20 port(s): 3029 3041 3065 3069 3073 3078 3081 3082 3090 3092 3100 3107 3174 3209 3259 3270 3328 3352 3364 3378
2019-07-26 14:07 attacks Port Scan AbuseIPDB 26.07.2019 23:07:10 Connection to port 3225 blocked by firewall
2019-07-26 13:27 attacks Brute-Force AbuseIPDB Jul 27 00:27:15 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 13:24 attacks Port Scan AbuseIPDB 26.07.2019 22:24:20 Connection to port 3049 blocked by firewall
2019-07-26 13:10 attacks Hacking AbuseIPDB Jul 26 23:25:43 h2177944 kernel: \[2500370.599449\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.148 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=
2019-07-26 13:08 attacks Brute-Force AbuseIPDB Jul 27 00:08:24 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 12:49 attacks Brute-Force AbuseIPDB Jul 26 23:49:37 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 12:32 attacks Brute-Force AbuseIPDB Jul 26 23:30:38 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 12:11 attacks Brute-Force AbuseIPDB Jul 26 23:11:56 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 12:03 attacks Port Scan AbuseIPDB firewall-block, port(s): 3003/tcp, 3065/tcp, 3082/tcp, 3104/tcp, 3113/tcp, 3135/tcp, 3146/tcp, 3163/tcp, 3291/tcp, 3342/tcp, 3366/tcp, 3372/tcp, 3374/
2019-07-26 11:49 attacks Port Scan AbuseIPDB Port scan on 15 port(s): 3051 3067 3078 3084 3090 3103 3118 3210 3230 3266 3299 3307 3313 3324 3328
2019-07-26 11:45 attacks Port Scan AbuseIPDB 26.07.2019 20:45:55 Connection to port 3054 blocked by firewall
2019-07-26 11:28 attacks Brute-Force AbuseIPDB Jul 26 22:28:37 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 10:57 attacks Brute-Force AbuseIPDB Jul 26 21:57:41 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 10:42 attacks Brute-Force AbuseIPDB Jul 26 21:41:09 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 10:20 attacks Brute-Force AbuseIPDB Jul 26 21:20:11 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 10:19 attacks Port Scan AbuseIPDB 26.07.2019 19:19:15 Connection to port 3130 blocked by firewall
2019-07-26 09:39 attacks Brute-Force AbuseIPDB Jul 26 20:39:37 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 09:36 attacks Port Scan AbuseIPDB 26.07.2019 18:36:40 Connection to port 3337 blocked by firewall
2019-07-26 09:35 attacks Port Scan AbuseIPDB Port scan on 15 port(s): 3029 3065 3069 3078 3081 3082 3090 3092 3107 3259 3270 3328 3352 3364 3378
2019-07-26 09:06 attacks Port Scan AbuseIPDB 26.07.2019 18:06:45 Connection to port 3386 blocked by firewall
2019-07-26 08:37 attacks Brute-Force AbuseIPDB Jul 26 19:37:49 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 08:16 attacks Brute-Force AbuseIPDB Jul 26 19:16:58 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 08:02 attacks Port ScanHackingExploited Host AbuseIPDB Port scan: Attack repeated for 24 hours
2019-07-26 07:42 attacks Port Scan AbuseIPDB Port scan on 12 port(s): 3051 3067 3078 3084 3118 3210 3230 3266 3299 3307 3313 3328
2019-07-26 07:31 attacks Hacking AbuseIPDB Jul 26 17:40:57 h2177944 kernel: \[2479688.339226\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=81.22.45.148 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=
2019-07-26 07:11 attacks Port Scan AbuseIPDB 26.07.2019 16:11:05 Connection to port 3063 blocked by firewall
2019-07-26 06:59 attacks Brute-Force AbuseIPDB Jul 26 17:59:55 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 06:49 attacks Port Scan AbuseIPDB 26.07.2019 15:49:30 Connection to port 3088 blocked by firewall
2019-07-26 06:28 attacks Brute-Force AbuseIPDB Jul 26 17:28:26 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 06:12 attacks Brute-Force AbuseIPDB Jul 26 17:12:37 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 05:42 attacks Brute-Force AbuseIPDB Jul 26 16:42:41 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.148 DST=172.31.1.100 L
2019-07-26 05:36 attacks Port Scan AbuseIPDB 26.07.2019 14:36:35 Connection to port 3098 blocked by firewall
2019-02-28 03:07 attacks Port Scan AbuseIPDB  
2019-03-06 15:43 attacks Port ScanHacking AbuseIPDB Port Scanning or Hacking Attempt
2019-03-06 17:11 attacks Port Scan AbuseIPDB 2019-03-06T10:11:56.641855stt-1.[munged] kernel: [1115179.939767] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:97:36:58:84:78:ac:57:aa:c1:08:00 SR
2019-03-08 23:33 attacks Port Scan AbuseIPDB Port scan attempt detected by AWS-CCS, CTS, India
2019-03-10 14:45 attacks Port Scan AbuseIPDB Port scan attempt detected by AWS-CCS, CTS, India
2019-03-11 03:02 attacks Port ScanHacking AbuseIPDB Mon 11 06:35:01 3399/tcp Mon 11 06:36:48 3401/tcp Mon 11 06:44:33 3400/tcp Mon 11 06:50:29 3399/tcp Mon 11 07:00:32 3397/tcp Mon 11 07:03:34 3393/tcp
2019-03-17 18:43 attacks Port ScanHacking AbuseIPDB Portscan or hack attempt detected by psad/fwsnort
2019-03-27 23:54 attacks Brute-Force AbuseIPDB 3389BruteforceFW21
2019-03-28 12:49 attacks Port Scan AbuseIPDB Port scan
2019-03-28 15:32 attacks Port Scan AbuseIPDB Unauthorized connection attempt from IP address 81.22.45.148 on Port 3389(RDP)
2019-03-29 18:18 reputation alienvault_reputation  
2019-03-29 18:22 reputation ciarmy  
2019-03-29 18:36 reputation iblocklist_ciarmy_malicious  
2019-03-29 18:41 attacks normshield_all_attack NormShield.com  
2019-03-29 18:41 attacks normshield_high_attack NormShield.com  
2019-05-28 23:34 attacks greensnow GreenSnow.co  
2019-05-30 09:30 attacks blocklist_de Blocklist.de  
2019-05-30 09:30 attacks Web App AttackApache Attack blocklist_de_apache Blocklist.de  
2019-06-03 23:04 reputation turris_greylist  
2019-03-29 18:23 attacks dshield DShield.org  
2019-05-28 23:35 reputation iblocklist_ciarmy_malicious  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 81.22.45.0 - 81.22.45.255
netname: RU-INFOTECH-20181015
country: RU
org: ORG-ITL54-RIPE
admin-c: LD5832-RIPE
tech-c: LD5832-RIPE
status: ASSIGNED PA
mnt-by: IP-RIPE
mnt-routes: ru-informtech-1-mnt
mnt-routes: MNT-SELECTEL
created: 2018-10-15T14:52:53Z
last-modified: 2019-04-08T18:52:43Z
source: RIPE

organisation: ORG-ITL54-RIPE
org-name: Information Technologies LLC
org-type: OTHER
address: ul. Professora Popova, 43A, pom. 14n R.M. 2
address: 197022 Saint-Petersburg
address: Russia
abuse-c: ITL17-RIPE
mnt-ref: IP-RIPE
mnt-by: IP-RIPE
created: 2019-04-08T18:49:09Z
last-modified: 2019-04-08T18:49:27Z
source: RIPE # Filtered

person: Lenar Davletshin
address: Information Technologies LLC
address: ul. Professora Popova, 43A, pom. 14n R.M. 2
address: 197022 Saint-Petersburg
address: Russia
phone: +7 981 8068891
nic-hdl: LD5832-RIPE
mnt-by: IP-RIPE
created: 2019-04-08T18:49:08Z
last-modified: 2019-04-08T18:53:26Z
source: RIPE

route: 81.22.45.0/24
descr: Selectel Customer
origin: AS49505
mnt-by: MNT-SELECTEL
created: 2018-11-23T13:48:16Z
last-modified: 2018-11-23T13:48:16Z
source: RIPE
most specific ip range is highlighted
Updated : 2019-08-28