Go
81.22.45.70
is a
Hacker
100 %
Report Abuse
272attacks reported
120Port Scan
74Port ScanHacking
54Brute-Force
13Hacking
5uncategorized
4Port ScanHackingExploited Host
2Port ScanBrute-Force
37abuse reported
34Email SpamBrute-Force
3Web SpamPort ScanBrute-ForceSSHIoT Targeted
5reputation reported
5uncategorized
1malware reported
1Exploited Host
from 27 distinct reporters
and 5 distinct sources : GreenSnow.co, NormShield.com, Taichung Education Center, DShield.org, AbuseIPDB
81.22.45.70 was first signaled at 2019-03-29 18:23 and last record was at 2019-09-26 16:11.
IP

81.22.45.70

NetRange : First & Last IP
81.22.45.0 - 81.22.45.255
Network CIDR
81.22.45.0/24

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-09-26 16:11 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-26 15:31 attacks Hacking AbuseIPDB 09/27/2019-02:31:23.936208 81.22.45.70 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-26 15:15 attacks Brute-Force AbuseIPDB Sep 27 02:15:23 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.70 DST=172.31.1.100 LE
2019-09-26 15:02 attacks Port Scan AbuseIPDB Unauthorized connection attempt from IP address 81.22.45.70 on Port 3389(RDP)
2019-09-26 14:39 attacks Port Scan AbuseIPDB Unauthorised access (Sep 27) SRC=81.22.45.70 LEN=40 TTL=247 ID=6893 TCP DPT=3389 WINDOW=1024 SYN
2019-09-26 13:30 attacks Port Scan AbuseIPDB firewall-block, port(s): 3389/tcp
2019-09-26 02:20 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-26 00:58 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-25 17:13 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=48878 . dpt=3389 . src=81.22.45.70 . dst=xx.xx.4.1 . (Alienvault Sep 26) (98)
2019-09-25 16:04 attacks Brute-Force AbuseIPDB Sep 26 03:04:52 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.70 DST=172.31.1.100 LE
2019-09-25 15:32 attacks Port Scan AbuseIPDB Unauthorized connection attempt from IP address 81.22.45.70 on Port 3389(RDP)
2019-09-25 14:36 attacks Hacking AbuseIPDB 09/26/2019-01:36:54.768000 81.22.45.70 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-25 13:20 attacks Port Scan AbuseIPDB firewall-block, port(s): 3389/tcp
2019-09-25 13:06 attacks Brute-Force AbuseIPDB 3389BruteforceFW23
2019-09-24 14:14 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=57494 . dpt=3389 . src=81.22.45.70 . dst=xx.xx.4.1 . (CINS badguys Sep 24) (42)
2019-09-24 14:10 attacks Port Scan AbuseIPDB firewall-block, port(s): 3389/tcp
2019-09-24 14:05 attacks Hacking AbuseIPDB 09/25/2019-01:05:00.223552 81.22.45.70 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-24 13:26 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-24 13:12 attacks Brute-Force AbuseIPDB Sep 25 00:12:45 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.70 DST=172.31.1.100 LE
2019-09-24 12:31 attacks Port Scan AbuseIPDB Unauthorized connection attempt from IP address 81.22.45.70 on Port 3389(RDP)
2019-09-22 13:10 attacks Port Scan AbuseIPDB firewall-block, port(s): 3389/tcp
2019-09-22 13:03 attacks Hacking AbuseIPDB 09/23/2019-00:03:24.141123 81.22.45.70 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-09-22 11:56 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-22 11:02 attacks Brute-Force AbuseIPDB Sep 22 22:02:05 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.70 DST=172.31.1.100 LE
2019-09-22 11:01 attacks Port Scan AbuseIPDB Unauthorized connection attempt from IP address 81.22.45.70 on Port 3389(RDP)
2019-09-21 15:10 attacks Port Scan AbuseIPDB 3389/tcp 3389/tcp 3389/tcp... [2019-08-02/09-21]92pkt,1pt.(tcp)
2019-09-21 13:15 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=57622 . dpt=3389 . src=81.22.45.70 . dst=xx.xx.4.1 . (listed on CINS badguys Sep 21) (1699)
2019-09-21 11:30 attacks Brute-Force AbuseIPDB Sep 21 22:30:14 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.70 DST=172.31.1.100 LE
2019-09-19 15:50 attacks Brute-Force AbuseIPDB Sep 20 02:50:40 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.70 DST=172.31.1.100 LE
2019-09-19 15:41 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-19 15:15 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=49673 . dpt=3389 . src=81.22.45.70 . dst=xx.xx.4.1 . (listed on CINS badguys Sep 19) (158)
2019-09-19 15:02 attacks Port Scan AbuseIPDB Unauthorised access (Sep 20) SRC=81.22.45.70 LEN=40 TTL=247 ID=62523 TCP DPT=3389 WINDOW=1024 SYN Unauthorised access (Sep 19) SRC=81.22.45.70 LEN=40
2019-09-19 14:31 attacks Port Scan AbuseIPDB TCP 3389 (RDP)
2019-09-19 13:32 attacks Port Scan AbuseIPDB Unauthorized connection attempt from IP address 81.22.45.70 on Port 3389(RDP)
2019-09-19 13:00 attacks Port Scan AbuseIPDB firewall-block, port(s): 3389/tcp
2019-09-18 13:31 attacks Port Scan AbuseIPDB Unauthorized connection attempt from IP address 81.22.45.70 on Port 3389(RDP)
2019-09-18 13:25 attacks Port Scan AbuseIPDB Unauthorised access (Sep 19) SRC=81.22.45.70 LEN=40 TTL=248 ID=43962 TCP DPT=3389 WINDOW=1024 SYN Unauthorised access (Sep 18) SRC=81.22.45.70 LEN=40
2019-09-18 13:11 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-18 12:40 attacks Port Scan AbuseIPDB firewall-block, port(s): 3389/tcp
2019-09-18 10:57 attacks Brute-Force AbuseIPDB Sep 18 21:57:49 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.70 DST=172.31.1.100 LE
2019-09-18 06:09 attacks Port Scan AbuseIPDB Unauthorised access (Sep 18) SRC=81.22.45.70 LEN=40 TTL=247 ID=34376 TCP DPT=3389 WINDOW=1024 SYN Unauthorised access (Sep 17) SRC=81.22.45.70 LEN=40
2019-09-18 05:30 abuse Email SpamBrute-Force AbuseIPDB proto=tcp . spt=48340 . dpt=3389 . src=81.22.45.70 . dst=xx.xx.4.1 . (listed on 81.22.45.0/24 Spamhaus EDROP (Dont Route Or Peer) Sep 18 05:33) (701)
2019-09-18 03:46 attacks Brute-Force AbuseIPDB Sep 18 14:46:27 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.70 DST=172.31.1.100 LE
2019-09-17 13:26 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-09-17 11:32 attacks Port Scan AbuseIPDB Unauthorized connection attempt from IP address 81.22.45.70 on Port 3389(RDP)
2019-09-17 11:02 attacks Port ScanHacking AbuseIPDB Portscan or hack attempt detected by psad/fwsnort
2019-09-17 10:40 attacks Port Scan AbuseIPDB firewall-block, port(s): 3389/tcp
2019-09-17 10:10 attacks Port Scan AbuseIPDB Unauthorised access (Sep 17) SRC=81.22.45.70 LEN=40 TTL=247 ID=26535 TCP DPT=3389 WINDOW=1024 SYN Unauthorised access (Sep 17) SRC=81.22.45.70 LEN=40
2019-09-17 09:52 attacks Port ScanHacking AbuseIPDB Attempt to attack host OS, exploiting network vulnerabilities, on 17-09-2019 19:52:39.
2019-09-17 05:39 attacks Port Scan AbuseIPDB TCP 3389 (RDP)
2019-06-13 01:10 attacks Port Scan AbuseIPDB firewall-block, port(s): 2231/tcp
2019-06-13 01:20 malware Exploited Host AbuseIPDB  
2019-06-13 05:02 attacks Port Scan AbuseIPDB Jun 13 12:50:19 box kernel: [94654.693980] [UFW BLOCK] IN=eth0 OUT= MAC=[munged] SRC=81.22.45.70 DST=[munged] LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=486
2019-06-13 08:13 attacks Port ScanHackingExploited Host AbuseIPDB slow and persistent scanner
2019-06-13 10:00 attacks Port Scan AbuseIPDB firewall-block, port(s): 156/tcp, 641/tcp, 762/tcp, 1205/tcp
2019-06-13 13:35 attacks Port Scan AbuseIPDB port scan/probe/communication attempt
2019-06-13 14:05 attacks Port ScanHackingExploited Host AbuseIPDB Port scan: Attack repeated for 24 hours
2019-06-13 15:30 abuse Web SpamPort ScanBrute-ForceSSH AbuseIPDB ¯\_(ツ)_/¯
2019-06-13 19:56 attacks Port ScanHacking AbuseIPDB MultiHost/MultiPort Probe, Scan, Hack -
2019-06-13 20:10 attacks Port Scan AbuseIPDB firewall-block, port(s): 423/tcp, 1067/tcp, 1095/tcp, 1099/tcp, 1627/tcp, 2797/tcp
2019-06-13 13:37 reputation ciarmy  
2019-06-14 13:52 reputation alienvault_reputation  
2019-06-14 14:03 attacks greensnow GreenSnow.co  
2019-06-14 14:04 reputation iblocklist_ciarmy_malicious  
2019-06-17 09:34 attacks normshield_all_attack NormShield.com  
2019-06-17 09:34 attacks normshield_high_attack NormShield.com  
2019-06-17 09:39 reputation turris_greylist  
2019-08-03 15:21 attacks taichung Taichung Education Center  
2019-03-29 18:23 attacks dshield DShield.org  
2019-07-02 17:33 reputation iblocklist_ciarmy_malicious  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

inetnum: 81.22.45.0 - 81.22.45.255
netname: RU-INFOTECH-20181015
country: RU
org: ORG-ITL54-RIPE
admin-c: LD5832-RIPE
tech-c: LD5832-RIPE
status: ASSIGNED PA
mnt-by: IP-RIPE
mnt-routes: ru-informtech-1-mnt
mnt-routes: MNT-SELECTEL
created: 2018-10-15T14:52:53Z
last-modified: 2019-04-08T18:52:43Z
source: RIPE

organisation: ORG-ITL54-RIPE
org-name: Information Technologies LLC
org-type: OTHER
address: ul. Professora Popova, 43A, pom. 14n R.M. 2
address: 197022 Saint-Petersburg
address: Russia
abuse-c: ITL17-RIPE
mnt-ref: IP-RIPE
mnt-by: IP-RIPE
created: 2019-04-08T18:49:09Z
last-modified: 2019-04-08T18:49:27Z
source: RIPE # Filtered

person: Lenar Davletshin
address: Information Technologies LLC
address: ul. Professora Popova, 43A, pom. 14n R.M. 2
address: 197022 Saint-Petersburg
address: Russia
phone: +7 981 8068891
nic-hdl: LD5832-RIPE
mnt-by: IP-RIPE
created: 2019-04-08T18:49:08Z
last-modified: 2019-04-08T18:53:26Z
source: RIPE

route: 81.22.45.0/24
descr: Selectel Customer
origin: AS49505
mnt-by: MNT-SELECTEL
created: 2018-11-23T13:48:16Z
last-modified: 2018-11-23T13:48:16Z
source: RIPE
most specific ip range is highlighted
Updated : 2019-08-28